Narrow your search
Listing 1 - 10 of 78 << page
of 8
>>
Sort by

Book
Compliant Identity Management mit SAP IdM und GRC AC
Authors: --- ---
ISBN: 3960123043 Year: 2018 Publisher: Gleichen : Espresso Tutorials,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computers --- Access control.


Book
Advances in computers.
Author:
ISBN: 012815120X 0128151196 9780128151204 9780128151198 9780128151198 Year: 2018 Publisher: Cambridge, Massachusetts : Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Advances in Computers, Volume 108 , the latest volume in a series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. This book provides contributors with a medium in which they can explore subjects in greater depth and breadth than similar topics in journal articles allow. Provides in-depth surveys and tutorials on new computer technology Covers well-known authors and researchers in the field Presents extensive bibliographies with most chapters Includes volumes that are devoted to single themes or subfields of computer science


Book
Promoting patient safety through effective health information technology risk management
Authors: --- --- --- --- --- et al.
ISBN: 9780833089786 0833089781 Year: 2014 Publisher: Santa Monica, CA RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Perfect passwords : selection, protection, authentication
Authors: ---
ISBN: 1423755006 9781423755005 9781597490412 1597490415 9780080489513 0080489516 1281035637 9781281035639 9786611035631 661103563X 1597490954 9781597490955 Year: 2006 Publisher: Rockland, Mass Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate se


Book
Freedom of Information Act---2008
Author:
ISBN: 1854186329 1854186485 1854183478 9781854186485 9781854186324 Year: 2008 Publisher: London Thorogood Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Intrusion prevention and active response : deploying network and host IPS.
Authors: --- --- --- --- --- et al.
ISBN: 1597490342 9781597490344 9780080489292 008048929X 1281035882 9781281035882 9786611035884 6611035885 193226647X 9781932266474 Year: 2005 Publisher: Rockland Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.* Corporate spending for Intrusion Prevention systems increased dramatically by 11% in the last quarter of 2004 alone * Lead author, Michael Rash, is


Book
Digital identity management
Authors: --- ---
Year: 2015 Publisher: London, England ; Oxford, England : ISTE Press : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society. This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analysis on the digital ID issue, it describes the different technical and legal approaches to protect digital identities with a focus on authentication systems, identity federation techniques and privacy preservation solutions. The limitations of these solutions and research issues in this field are also discussed to further understand the changes that are taking place. Offers a state of the discussions and work places on the management of digital identities in various contexts, such as social networking, cloud computing and the Internet of Things Describes the advanced technical and legal measures to protect digital identities Contains a strong emphasis of authentication techniques, identity federation tools and technical protection of privacy.


Book
Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps
Author:
Year: 2018 Publisher: Birmingham : Packt,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps Key Features Integrate security at each layer of the DevOps pipeline Discover security practices to protect your cloud services by detecting fraud and intrusion Explore solutions to infrastructure security using DevOps principles Book Description DevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security of an entire organization. Hands-On Security in DevOps shows you how to adopt DevOps techniques to continuously improve your organization's security at every level, rather than just focusing on protecting your infrastructure. This guide combines DevOps and security to help you to protect cloud services, and teaches you how to use techniques to integrate security directly in your product. You will learn how to implement security at every layer, such as for the web application, cloud infrastructure, communication, and the delivery pipeline layers. With the help of practical examples, you'll explore the core security aspects, such as blocking attacks, fraud detection, cloud forensics, and incident response. In the concluding chapters, you will cover topics on extending DevOps security, such as risk assessment, threat modeling, and continuous security. By the end of this book, you will be well-versed in implementing security in all layers of your organization and be confident in monitoring and blocking attacks throughout your cloud services. What you will learn Understand DevSecOps culture and organization Learn security requirements, management, and metrics Secure your architecture design by looking at threat modeling, coding tools and practices Handle most common security issues and explore black and white-box testing tools and practices Work with security monitoring toolkits and online fraud detection rules Explore GDPR and PII handling case studies to understand the DevSecOps lifecycle Who this book is for Hands-On Security in DevOps is for system administrators, security consultants, and DevOps engineers who want to secure their entire organization. Basic understanding of Cloud computing, automation frameworks, and programming is necessary.


Book
Electronic health records : an audit and internal control guide
Author:
ISBN: 0470399481 1281744239 9786611744236 0470399465 Year: 2008 Publisher: Hoboken, N.J. : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Electronic Health Records: An Audit and Internal Control Guide describes the infrastructure of electronic health records and the impact that the government's new criteria will have on the private and public marketplace. Understand what to look for in a health care record management system and find tips and helpful guidance for implementation. If you are trying to facilitate an audit of a health record management system, you can apply the example described in the model, which will serve as a timely model and invaluable resource.


Periodical
Computer fraud and security bulletin.
Author:
ISSN: 18783856 Year: 2007 Publisher: Amsterdam ; New York : Elsevier Science,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 78 << page
of 8
>>
Sort by