Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
Executives --- Industries --- Protection. --- Security measures.
Choose an application
Industries --- Terrorism --- Security measures --- Prevention
Choose an application
Radiography. --- Smuggling --- Weapons --- Security measures.
Choose an application
Electronic data processing departments --- Security measures.
Choose an application
A report intended to help officials responsible for nuclear security to establish more effective systems for protecting against nuclear crimes, by drawing plausible inferences about actions and targets that adversaries are likely to prefer. Three categories of motivation are considered: ideological, economic, and personal. Possible criminals include, among others, psychotics, religious and philosophical fanatics, professional criminals, environmental extremists, political terrorists, adolescent pranksters, and disgruntled or self-seeking employees. Their crimes may range all the way from empty hoaxes to theft, sabotage, direct attack, and the holding of nuclear material or weapons for ransom or extortion. The report includes a matrix that identifies the most likely combinations of adversaries and actions, and indicates crimes that have already occurred or may have occurred.
Nuclear facilities --- Motivation (Psychology) --- Security measures
Choose an application
Electronic data processing departments --- Security measures
Choose an application
Industries --- Private security services --- Security systems --- Security measures --- Data processing. --- Security measures.
Choose an application
The IEA’s basic institutional arrangements remain essentially as described in Volume I of The History, but this Supplement’s extensive treatment of budget and programme of work issues reflects significant changes in Agency practice, during a period when governments were engrossed in the management and financing of international organisations generally.
Energy development --- Energy policy --- Energie --- Politique énergétique --- Développement --- International Energy Agency --- 620.9 --- -Energy development --- -Energy Industries --- -AA / International- internationaal --- 338.012 --- 334.13 --- Industries --- Power resources --- Energy resources development --- Energy source development --- Power resources development --- Energy and state --- State and energy --- Industrial policy --- Energy conservation --- Economics of energy in general --- International cooperation --- Security measures --- Energie (productiefactor). --- OESO. --- Government policy --- International energy agency. --- Agence internationale de l'énergie --- Organisation for Economic Co-operation and Development. --- I.E.A. (International Energy Agency) --- IEA (International Energy Agency) --- AIE (Agence internationale de l'énergie) --- 620.9 Economics of energy in general --- IEA --- OECD. International Energy Agency --- Politique énergétique --- Développement --- History. --- AA / International- internationaal --- Energy --- International Energy Agency. --- Energie (productiefactor) --- OESO --- International energy agency --- Internationaal Energieagentschap --- -International cooperation
Choose an application
The lifeblood of the global economy, information has become a source of growing risk as more firms maintain information online. With risks now fueled by sophisticated, organized, malicious groups, information security requires not only technology, but a clear understanding of potential risks, decision-making behaviors, and metrics for evaluating business and policy options. Managing Information Risk and the Economics of Security, an edited volume contributed by well-established researchers in the field worldwide, presents the latest research on economics driving both the risks and the solutions. Covering the implications of policy within firms and across countries, this volume provides managers and policy makers with new thinking on how to manage risk. Managing Information Risk and the Economics of Security is designed for managers, policy makers, and researchers focusing on economics of information security, as well as for advanced-level students in computer science, business management and economics. .
Algebraic number theory. --- Diophantine approximation. --- Diophantine approximation --- 511.5 --- Approximation, Diophantine --- Diophantine analysis --- Diophantine equations --- 511.5 Diophantine equations --- Biometry --Congresses. --- Computer science. --- Business. --- Management science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Economics. --- Computer Science. --- Systems and Data Security. --- Business and Management, general. --- Computer Communication Networks. --- Data Encryption. --- Economic Systems. --- Algebraic number theory --- Approximation theory --- Number theory --- Business enterprises --- Computer security --- Information resources management --- Risk management. --- Computer networks --- Security measures --- Economic aspects. --- Insurance --- Management --- Corporations --- Information resource management --- Information systems management --- IRM (Information resources management) --- Management information systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Protection --- Cryptology. --- Political Economy/Economic Systems. --- Economic theory --- Political economy --- Social sciences --- Economic man --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Trade --- Economics --- Commerce --- Industrial management --- Economic policy. --- Economic nationalism --- Economic planning --- National planning --- State planning --- Planning --- National security --- Social policy --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Quantitative business analysis --- Problem solving --- Operations research --- Statistical decision --- Distributed processing --- Approximation diophantienne
Choose an application
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.
Computer security. --- Computer crimes. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Plasma chemistry. --- Quinanes. --- Plasma physics --- Chemistry --- Plasma chemistry --- Plasmachimie --- Computer Communication Networks. --- Telecommunication. --- Data encryption (Computer science). --- Data structures (Computer scienc. --- Systems and Data Security. --- Communications Engineering, Networks. --- Cryptology. --- Information Systems Applications (incl. Internet). --- Data Structures and Information Theory. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Computer communication systems. --- Electrical engineering. --- Application software. --- Data structures (Computer science). --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Reverse engineering.
Listing 1 - 10 of 11 | << page >> |
Sort by
|