Listing 1 - 8 of 8 |
Sort by
|
Choose an application
This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to a
Computer. Automation --- Computer security --- Data protection --- Database security --- Computer security. --- Data protection. --- Database security. --- Data base security --- Databases --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Security measures --- Protection
Choose an application
Privacy, Right of --- Data protection --- Computer security --- Computer security. --- Data protection. --- Privacy, Right of. --- Invasion of privacy --- Right of privacy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Law and legislation --- Security measures --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Electronic data processing --- Security systems --- Hacking --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Human Rights
Choose an application
Wireless communication systems --- Computer networks --- Data protection. --- Privacy, Right of. --- Security measures. --- privacy enhancing technologies --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Law and legislation
Choose an application
Wireless communication systems --- Computer networks --- Computer crimes --- Data protection --- Privacy, Right of --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Confidential communications --- Right to be forgotten --- Secrecy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures --- Investigation --- Law and legislation
Choose an application
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more.The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There a
Computer networks --- Computer security --- Computer crimes --- Réseaux d'ordinateurs --- Sécurité informatique --- Criminalité informatique --- Access control --- Handbooks, manuals, etc. --- Security measures --- Accès --- Contrôle --- Guides, manuels, etc. --- Sécurité --- Mesures --- Computer security. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Human rights --- European Data Protection Supervisor [Brussels] --- Data protection --- Privacy, Right of --- Law and legislation --- European Data Protection Supervisor --- Invasion of privacy --- Right of privacy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- EDPS --- Privacy, Right of. --- droit de la protection des données --- protection de la vie privée --- protection des données --- data protection legislation --- protection of privacy --- data protection --- Law and legislation. --- European Data Protection Supervisor. --- Europe --- Union européenne. --- European Union. --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Habeas data --- Electronic data processing --- EU countries --- Euroland --- droit de la protection des données --- protection de la vie privée --- protection des données --- Union européenne. --- European Union countries.
Choose an application
EEC / European Union - EU -Europese Unie - Union Européenne - UE --- 347.83 --- 343.45 --- V60 protection de la vie privée - bescherming persoonlijke levenssfeer --- Computer recht. --- Onschendbaarheid van geheimen. Geheim persoonlijke levenssfeer, beroepsgeheim, bankgeheim. --- Data protection --- -Privacy, Right of --- -342.0858094 --- Uk3 --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Law and legislation --- -Law and legislation --- -EEC / European Union - EU -Europese Unie - Union Européenne - UE --- Computer recht --- Onschendbaarheid van geheimen. Geheim persoonlijke levenssfeer, beroepsgeheim, bankgeheim --- Protection de l'information (Informatique) --- Droit à la vie privée --- Droit
Choose an application
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The “Int- national School on Foundations of Security Analysis and Design” (FOSAD, see http://www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea,especially for young researchers approaching the ?eld and graduate students coming from less-favoured and non-leading countries. The FOSAD school is held annually at the Residential Centre of Bertinoro (http://www.ceub.it/), in the fascinating setting of a former convent and ep- copal fortress that has been transformed into a modern conference facility with computing services and Internet access. Since the ?rst school, in 2000, FOSAD hasattractedmorethan250participantsand50lecturersfromallovertheworld. A collection of tutorial lectures from FOSAD 2000 was published in Springer’s LNCS volume 2171. Some of the tutorials given at the two successive schools (FOSAD 2001 and 2002) are gathered in a second volume, LNCS 2946. To c- tinue this tradition, the present volume collects a set of tutorials fromthe fourth FOSAD, held in 2004, and from FOSAD 2005.
Computer security --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses --- Security measures --- Congresses. --- Congrès --- Sécurité --- Mesures --- Computer Communication Networks --- Computer Science --- Data encryption (Computer science) --- Information Systems --- Logic design --- Operating systems (Computers) --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Computer security. --- Data encryption (Computer science). --- Computer logic. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Operating Systems. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Logics and Meanings of Programs. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer science logic --- Logic, Symbolic and mathematical --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Operating systems --- Distributed processing --- Information Systems. --- Logic design. --- Cryptology. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Data protection. --- Cryptography. --- Computer networks. --- Data and Information Security. --- IT Operations. --- Computer Science Logic and Foundations of Programming. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Listing 1 - 8 of 8 |
Sort by
|