Listing 1 - 10 of 171 | << page >> |
Sort by
|
Choose an application
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.
Computer networks - Security measures. --- Multicasting (Computer networks) - Security measures. --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Multicasting (Computer networks) - Security measures --- Computer networks - Security measures
Choose an application
This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u
Computer networks - Security measures. --- Computer networks.
Choose an application
Personnel Protection: Concepts of Executive Security serves as an introduction to the concepts of executive security and as a guide for developing an executive security program. In this 16-minute video presentation of narrated slides, the two approaches to executive security, proactive and reactive, are defined. It also includes information about the selection of security personnel for the executive security team, security advance procedures, and executive security program objectives. This presentation is one of 11 modules in the Personnel Protection presentation series
Computer networks -- Security measures. --- Computer security. --- Data protection.
Choose an application
Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense.
Computer networks -- Security measures -- Congresses. --- Computer networks -- Security measures. --- Computer networks. --- Computer networks --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Electrical Engineering --- Security measures --- Computer security
Choose an application
In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security programme.
Choose an application
This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in
Computer networks -- Security measures. --- Computer networks. --- Computer security. --- Computer security --- Computer networks --- Security measures
Choose an application
Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, fromboth an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization.The book covers a broad range of issues, starting with an assessment of network security, including the financial implications of security breaches, and moving on to discuss the diff
Choose an application
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Choose an application
Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however, the details surrounding these systems has been obscured by marketing hype, numerous acronyms, and theoretical complexities. Policy-Based Network Management: Solutions for the Next Generation cuts through the hype surrounding PBNM and makes i
Choose an application
This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.
Computer networks -- Security measures. --- Computer science. --- Kali linux. --- Penetration testing (Computer security). --- Computer Science --- Engineering & Applied Sciences --- Linux. --- Slackware Linux --- SUSE Linux
Listing 1 - 10 of 171 | << page >> |
Sort by
|