Narrow your search

Library

LUCA School of Arts (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

VIVES (3)

VUB (3)

Vlerick Business School (2)

KU Leuven (1)

UGent (1)

More...

Resource type

book (3)


Language

English (3)


Year
From To Submit

2016 (1)

2010 (1)

2008 (1)

Listing 1 - 3 of 3
Sort by
Securing information and communications systems : principles, technologies, and applications
Author:
ISBN: 1596932295 9781596932296 1596932287 Year: 2008 Publisher: Boston ; London : Artech House,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems.


Book
Network performance and security : testing and analyzing using open source and low-cost tools
Authors: ---
ISBN: 012803601X 0128035846 9780128036013 9780128035849 9780128035849 Year: 2016 Publisher: Cambridge, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices. Offers coherent, consistent guidance for those tasked with securing the network within an organization and ensuring that it is appropriately tested Focuses on practical, real world implementation and testing Employs a vetted "security testing by example" style to demonstrate best practices and minimize false positive testing Gives practical advice for securing BYOD devices on the network, how to test and defend against internal threats, and how to continuously validate a firewall device, software, and configuration Provides analysis in addition to step by step methodologies


Book
E-mail security : a pocket guide
Authors: ---
ISBN: 128300643X 9786613006431 1849280975 9781849280976 1849280967 9781849280969 1849280967 9781849280969 9781283006439 Year: 2010 Publisher: Ely, Cambridgeshire : IT Governance Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.

Listing 1 - 3 of 3
Sort by