Listing 1 - 10 of 78 | << page >> |
Sort by
|
Choose an application
Choose an application
Advances in Computers, Volume 108 , the latest volume in a series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. This book provides contributors with a medium in which they can explore subjects in greater depth and breadth than similar topics in journal articles allow. Provides in-depth surveys and tutorials on new computer technology Covers well-known authors and researchers in the field Presents extensive bibliographies with most chapters Includes volumes that are devoted to single themes or subfields of computer science
Choose an application
Choose an application
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate se
Computer security. --- Computers --- Access control --- Passwords.
Choose an application
Freedom of information --- Government information --- Access control --- Great Britain.
Choose an application
This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.* Corporate spending for Intrusion Prevention systems increased dramatically by 11% in the last quarter of 2004 alone * Lead author, Michael Rash, is
Computer. Automation --- Computer networks --- Computer security. --- Access control. --- Security measures.
Choose an application
In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society. This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analysis on the digital ID issue, it describes the different technical and legal approaches to protect digital identities with a focus on authentication systems, identity federation techniques and privacy preservation solutions. The limitations of these solutions and research issues in this field are also discussed to further understand the changes that are taking place. Offers a state of the discussions and work places on the management of digital identities in various contexts, such as social networking, cloud computing and the Internet of Things Describes the advanced technical and legal measures to protect digital identities Contains a strong emphasis of authentication techniques, identity federation tools and technical protection of privacy.
Data protection. --- Computer networks --- Access control. --- Security measures.
Choose an application
Protect your organization's security at all levels by introducing the latest strategies for securing DevOps Key Features Integrate security at each layer of the DevOps pipeline Discover security practices to protect your cloud services by detecting fraud and intrusion Explore solutions to infrastructure security using DevOps principles Book Description DevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security of an entire organization. Hands-On Security in DevOps shows you how to adopt DevOps techniques to continuously improve your organization's security at every level, rather than just focusing on protecting your infrastructure. This guide combines DevOps and security to help you to protect cloud services, and teaches you how to use techniques to integrate security directly in your product. You will learn how to implement security at every layer, such as for the web application, cloud infrastructure, communication, and the delivery pipeline layers. With the help of practical examples, you'll explore the core security aspects, such as blocking attacks, fraud detection, cloud forensics, and incident response. In the concluding chapters, you will cover topics on extending DevOps security, such as risk assessment, threat modeling, and continuous security. By the end of this book, you will be well-versed in implementing security in all layers of your organization and be confident in monitoring and blocking attacks throughout your cloud services. What you will learn Understand DevSecOps culture and organization Learn security requirements, management, and metrics Secure your architecture design by looking at threat modeling, coding tools and practices Handle most common security issues and explore black and white-box testing tools and practices Work with security monitoring toolkits and online fraud detection rules Explore GDPR and PII handling case studies to understand the DevSecOps lifecycle Who this book is for Hands-On Security in DevOps is for system administrators, security consultants, and DevOps engineers who want to secure their entire organization. Basic understanding of Cloud computing, automation frameworks, and programming is necessary.
Information technology --- Computer networks --- Management. --- Security measures. --- Access control.
Choose an application
Electronic Health Records: An Audit and Internal Control Guide describes the infrastructure of electronic health records and the impact that the government's new criteria will have on the private and public marketplace. Understand what to look for in a health care record management system and find tips and helpful guidance for implementation. If you are trying to facilitate an audit of a health record management system, you can apply the example described in the model, which will serve as a timely model and invaluable resource.
Medical records --- Medical audit. --- Electronic records --- Data processing. --- Access control.
Choose an application
Computer crimes --- Computers --- Access control --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Computer crimes. --- Access control. --- Computer security
Listing 1 - 10 of 78 | << page >> |
Sort by
|