Narrow your search
Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Book
Business security : internal policing for management
Authors: ---
ISBN: 085227212X Year: 1980 Publisher: London : Associated Business Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Corporate and industrial security.
Author:
ISBN: 0872017966 Year: 1980 Publisher: Gulf

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Possible weapons smuggling pouch.
Author:
Year: 1980 Publisher: Washington, D.C. : United States Nuclear Regulatory Commission, Office of Inspection and Enforcement,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Computer security: a management audit approach
Authors: ---
ISBN: 0814455824 Year: 1980 Publisher: New York Amacom

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Motivations and possible actions of potential criminal adversaries of U.S. nuclear programs
Authors: --- ---
Year: 1980 Publisher: Santa Monica, CA : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A report intended to help officials responsible for nuclear security to establish more effective systems for protecting against nuclear crimes, by drawing plausible inferences about actions and targets that adversaries are likely to prefer. Three categories of motivation are considered: ideological, economic, and personal. Possible criminals include, among others, psychotics, religious and philosophical fanatics, professional criminals, environmental extremists, political terrorists, adolescent pranksters, and disgruntled or self-seeking employees. Their crimes may range all the way from empty hoaxes to theft, sabotage, direct attack, and the holding of nuclear material or weapons for ransom or extortion. The report includes a matrix that identifies the most likely combinations of adversaries and actions, and indicates crimes that have already occurred or may have occurred.


Book
Computer security : the personnel aspect
Author:
ISBN: 0850122465 Year: 1980 Publisher: Manchester NCC publications

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Computer applications in the private security business
Authors: --- ---
ISBN: 003057031X Year: 1980 Publisher: New York (N.Y.) : Praeger,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Bilans du lait, des produits laitiers et des oeufs dans les pays membres de l'OCDE : 1973-1978
Author:
ISBN: 926414059X 9264014934 9264143378 9264146598 9786610171507 1280171502 9264014942 9264020934 9264021000 Year: 1980

Loading...
Export citation

Choose an application

Bookmark

Abstract

The IEA’s basic institutional arrangements remain essentially as described in Volume I of The History, but this Supplement’s extensive treatment of budget and programme of work issues reflects significant changes in Agency practice, during a period when governments were engrossed in the management and financing of international organisations generally.


Book
Diophantine approximation
Author:
ISBN: 3540097627 0387097627 3540386459 1441935290 0387097619 9786612126437 1282126431 9781282825949 9783540097624 Year: 1980 Volume: 785 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The lifeblood of the global economy, information has become a source of growing risk as more firms maintain information online. With risks now fueled by sophisticated, organized, malicious groups, information security requires not only technology, but a clear understanding of potential risks, decision-making behaviors, and metrics for evaluating business and policy options. Managing Information Risk and the Economics of Security, an edited volume contributed by well-established researchers in the field worldwide, presents the latest research on economics driving both the risks and the solutions. Covering the implications of policy within firms and across countries, this volume provides managers and policy makers with new thinking on how to manage risk. Managing Information Risk and the Economics of Security is designed for managers, policy makers, and researchers focusing on economics of information security, as well as for advanced-level students in computer science, business management and economics. .

Keywords

Algebraic number theory. --- Diophantine approximation. --- Diophantine approximation --- 511.5 --- Approximation, Diophantine --- Diophantine analysis --- Diophantine equations --- 511.5 Diophantine equations --- Biometry --Congresses. --- Computer science. --- Business. --- Management science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Economics. --- Computer Science. --- Systems and Data Security. --- Business and Management, general. --- Computer Communication Networks. --- Data Encryption. --- Economic Systems. --- Algebraic number theory --- Approximation theory --- Number theory --- Business enterprises --- Computer security --- Information resources management --- Risk management. --- Computer networks --- Security measures --- Economic aspects. --- Insurance --- Management --- Corporations --- Information resource management --- Information systems management --- IRM (Information resources management) --- Management information systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Protection --- Cryptology. --- Political Economy/Economic Systems. --- Economic theory --- Political economy --- Social sciences --- Economic man --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Trade --- Economics --- Commerce --- Industrial management --- Economic policy. --- Economic nationalism --- Economic planning --- National planning --- State planning --- Planning --- National security --- Social policy --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Quantitative business analysis --- Problem solving --- Operations research --- Statistical decision --- Distributed processing --- Approximation diophantienne

Plasma chemistry
Authors: ---
ISBN: 1282019287 9786612019289 0387098259 0387894683 3540098259 0387098267 3540098267 3540101667 0387101667 3540118284 0387118284 0387098240 0387894675 3540389741 3540389806 354038264X 9783540098256 9783540098263 9783540101666 Year: 1980 Volume: 89-90 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.

Keywords

Computer security. --- Computer crimes. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Plasma chemistry. --- Quinanes. --- Plasma physics --- Chemistry --- Plasma chemistry --- Plasmachimie --- Computer Communication Networks. --- Telecommunication. --- Data encryption (Computer science). --- Data structures (Computer scienc. --- Systems and Data Security. --- Communications Engineering, Networks. --- Cryptology. --- Information Systems Applications (incl. Internet). --- Data Structures and Information Theory. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Computer communication systems. --- Electrical engineering. --- Application software. --- Data structures (Computer science). --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Reverse engineering.

Listing 1 - 10 of 11 << page
of 2
>>
Sort by