Listing 1 - 10 of 16 | << page >> |
Sort by
|
Choose an application
The grandest accomplishments of engineering took place in the twentieth century. The widespread development and distribution of electricity and clean water, automobiles and airplanes, radio and television, spacecraft and lasers, antibiotics and medical imaging, computers and the Internet are just some of the highlights from a century in which engineering revolutionized and improved virtually every aspect of human life. In this book, the authors provide a glimpse of the new trends of technologies pertaining to control, management, computational intelligence and network systems.
Computer networks --- Access control. --- Data sovereignty --- Network management
Choose an application
Computer networks --- Security measures. --- Access control. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data sovereignty
Choose an application
Computer networks --- Security measures. --- Access control. --- Data sovereignty --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric
Computer networks --- Internet --- Security measures. --- Access control. --- Information Technology --- General and Others --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data sovereignty
Choose an application
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's For
Computer networks --- Security measures. --- Access control. --- Information Technology --- General and Others --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data sovereignty
Choose an application
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of ServiceWar DialingPenetration ""Test
Computer networks --- Security measures. --- Access control. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Information Technology --- General and Others --- Data sovereignty
Choose an application
'Data Sovereignty' explores the attempts by governments to place limits on the free movement of data across a global internet. Drawing on theories in political economy, international law, human rights, and data protection, this volume offers new theoretical perspectives and thought-provoking ideas about the nature and scope of digital sovereignty.
Internet --- Data protection --- Data transmission systems --- Digital media --- Privacy, Right of. --- Computer networks --- Law and legislation. --- Data sovereignty. --- Law. --- Laws of specific jurisdictions & specific areas of law.
Choose an application
"This book is a history of U.S. regulations governing media and distribution infrastructures that support the cloud"--
Choose an application
This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.-
Computer networks --- Wide area networks (Computer networks) --- Access control. --- Security measures. --- Access. --- Access to wide area computer networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data sovereignty
Choose an application
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners the very latest details on this popular network security model.
Computer networks --- Computer security. --- Computers --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Access control. --- Protection --- Security measures --- Data sovereignty
Listing 1 - 10 of 16 | << page >> |
Sort by
|