Narrow your search
Listing 1 - 10 of 24 << page
of 3
>>
Sort by

Book
Data protection : law and practice.
Author:
ISBN: 9780421954700 Year: 2007 Publisher: London Sweet and Maxwell


Periodical
International journal of information security and privacy.
ISSN: 19301669 Year: 2007 Publisher: Hershey, PA : Idea Group Pub.


Book
The world beyond digital rights management
Authors: ---
ISBN: 1306206952 1780170319 190612454X 1902505875 178017067X Year: 2007 Publisher: Swindon : British Computer Society,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The battle to protect intellectual property and commercial rights in the digital world remains fierce, with content owners under constant threat from file-sharing networks and illegal download sites. Jude Umeh calls on content creators, law makers and businesses to work more closely with end-users to harness the opportunities in the digital age.


Book
Fifth World Conference on Information Security Education : proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
Authors: --- --- ---
ISBN: 9780387732688 0387732683 0387732691 Year: 2007 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.

The shellcoder's handbook : discovering and exploiting security holes.
Authors: ---
ISBN: 9780470080238 047008023X Year: 2007 Publisher: Indianapolis, In. : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"In a nutshell, this book is about code and data and what happens when the two become confused. You'll work with the basic building blocks of security bugs--assembler, source code, the stack, the heap, and so on. You'll experiment, explore, and understand the systems you're running--and how to better protect them." --Back cover

PCI compliance : implementing effective PCI data security standards
Authors: ---
ISBN: 1281112666 9786611112660 0080556388 1597491659 9780080556383 9781597491655 9781281112668 6611112669 Year: 2007 Publisher: Burlington, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the infor

FISMA certification & accreditation handbook
Authors: ---
ISBN: 1282552473 9786612552472 0080506534 1597491160 9781597491167 9781429454926 142945492X 9780080506531 9781282552470 Year: 2007 Publisher: Rockland, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C&A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C&A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requi

Foundations of Security : What Every Programmer Needs to Know
Authors: --- ---
ISBN: 1280864400 9786610864409 1430203773 1590597842 Year: 2007 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once you're enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book. For the past few years, the Internet has had a "wild, wild west" flavor to it. Credit card numbers are stolen in massive numbers. Commercial web sites have been shut down by Internet worms. Poor privacy practices come to light and cause great embarrassment to the corporations behind them. All these security-related issues contribute at least to a lack of trust and loss of goodwill. Often there is a monetary cost as well, as companies scramble to clean up the mess when they get spotlighted by poor security practices. It takes time to build trust with users, and trust is hard to win back. Security vulnerabilities get in the way of that trust. Foundations of Security: What Every Programmer Needs To Know helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks. The lead author co-founded the Stanford Center for Professional Development Computer Security Certification. This book teaches you how to be more vigilant and develop a sixth sense for identifying and eliminating potential security vulnerabilities. You'll receive hands-on code examples for a deep and practical understanding of security. You'll learn enough about security to get the job done.

European data protection law : corporate regulation and compliance.
Author:
ISBN: 9780199283859 0199283850 Year: 2007 Publisher: Oxford Oxford university press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Privacy - Privacy Internationaal - Gegevensverwerking - Wet verwerking persoonsgegevens (wet 08.12.1992) Europees en internationaal recht privacy - E.G. privacy - Richtlijn privacy - Raad van Europa privacy 1. Europese data bescherming: wetgeving en instellingen 2. Fundamentele wettelijke begrippen 3. Toepasselijke wet en toepasselijke rechtbank 4. Internationale data transferten 5. Compliance uitdagingen en strategieen

Surveillance studies : an overview.
Author:
ISBN: 9780745635927 9780745635910 074563592X Year: 2007 Publisher: Cambridge Polity

Loading...
Export citation

Choose an application

Bookmark

Abstract

The study of surveillance is more relevant than ever before. The fast growth of the field of surveillance studies reflects both the urgency of civil liberties and privacy questions in the war on terror era and the classical social science debates over the power of watching and classification, from Bentham to Foucault and beyond. In this overview, David Lyon, one of the pioneers of surveillance studies, fuses with aplomb classical debates and contemporary examples to provide the most accessible and up-to-date introduction to surveillance available. The book takes in surveillance studies in all its breadth, from local face-to-face oversight through technical developments in closed-circuit TV, radio frequency identification and biometrics to global trends that integrate surveillance systems internationally. Surveillance is understood in its ambiguity, from caring to controlling, and the role of visibility of the surveilled is taken as seriously as the powers of observing, classifying and judging. The book draws on international examples and on the insights of several disciplines; sociologists, political scientists and geographers will recognize key issues from their work here, but so will people from media, culture, organization, technology and policy studies. This illustrates the diverse strands of thought and critique available, while at the same time the book makes its own distinct contribution and offers tools for evaluating both surveillance trends and the theories that explain them. This book is the perfect introduction for anyone wanting to understand surveillance as a phenomenon and the tools for analysing it further, and will be essential reading for students and scholars alike.

Listing 1 - 10 of 24 << page
of 3
>>
Sort by