Listing 1 - 10 of 173 | << page >> |
Sort by
|
Choose an application
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.
Computer networks - Security measures. --- Multicasting (Computer networks) - Security measures. --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Multicasting (Computer networks) - Security measures --- Computer networks - Security measures
Choose an application
This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u
Computer networks - Security measures. --- Computer networks.
Choose an application
Personnel Protection: Concepts of Executive Security serves as an introduction to the concepts of executive security and as a guide for developing an executive security program. In this 16-minute video presentation of narrated slides, the two approaches to executive security, proactive and reactive, are defined. It also includes information about the selection of security personnel for the executive security team, security advance procedures, and executive security program objectives. This presentation is one of 11 modules in the Personnel Protection presentation series
Computer networks -- Security measures. --- Computer security. --- Data protection.
Choose an application
Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense.
Computer networks -- Security measures -- Congresses. --- Computer networks -- Security measures. --- Computer networks. --- Computer networks --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Electrical Engineering --- Security measures --- Computer security
Choose an application
In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security programme.
Choose an application
This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in
Computer networks -- Security measures. --- Computer networks. --- Computer security. --- Computer security --- Computer networks --- Security measures
Choose an application
Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, fromboth an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization.The book covers a broad range of issues, starting with an assessment of network security, including the financial implications of security breaches, and moving on to discuss the diff
Choose an application
Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from the US and Europe and presents a contemporary perspectives on the limits online of human rights. By considering the latest political events and case law, including the NSA PRISM surveillance program controversy, the planned EU data protection amendments, and the latest European Court of Human Rights jurisprudence, it provides an analysis of the ongoing legal discourse on global cyberveillance. Using examples from contemporary state practice, including content filtering and Internet shutdowns during the Arab Spring as well as the PRISM controversy, the authors identify limits of state and third party interference with individual human rights of Internet users. Analysis is based on existing human rights standards, as enshrined within international law including the Universal Declaration of Human Rights, International Covenant on Civil and Political Rights, European Convention on Human Rights and recommendations from the Human Rights Council. The definition of human rights, perceived as freedoms and liberties guaranteed to every human being by international legal consensus will be presented based on the rich body on international law. The book is designed to serve as a reference source for early 21st century information policies and on the future of Internet governance and will be useful to scholars in the information studies fields, including computer, information and library science. It is also aimed at scholars in the fields of international law, international relations, diplomacy studies and political science
Computer networks --- Computer security --- Human Rights --- Cyberspace --- Security measures --- Social aspects --- Computer networks - Security measures --- Cyberspace - Social aspects
Choose an application
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Choose an application
Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however, the details surrounding these systems has been obscured by marketing hype, numerous acronyms, and theoretical complexities. Policy-Based Network Management: Solutions for the Next Generation cuts through the hype surrounding PBNM and makes i
Listing 1 - 10 of 173 | << page >> |
Sort by
|