Listing 1 - 10 of 27 | << page >> |
Sort by
|
Choose an application
Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense.
Computer networks -- Security measures -- Congresses. --- Computer networks -- Security measures. --- Computer networks. --- Computer networks --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Electrical Engineering --- Security measures --- Computer security
Choose an application
Computer networks --- Security measures --- Cisco IOS --- Security measures. --- Cisco IOS. --- Computer networks - Security measures --- Réseaux d'ordinateurs --- Mesures de sûreté
Choose an application
COMPUTER SECURITY--GREAT BRITAIN --- COMPUTER NETWORKS--SECURITY MEASURES--GREAT BRITAIN --- INFRASTRUCTURE (ECONOMICS)--SECURITY MEASURES--GREAT BRITAIN --- INFORMATION SUPERHIGHWAY--SECURITY MEASURES--GREAT BRITAIN --- CYBERTERRORISM--GREAT BRITAIN--PREVENTION --- COMPUTER CRIMES--GREAT BRITAIN
Choose an application
Computer networks --- Information visualization --- Computer security --- Security measures --- Data visualization --- Visualization of information --- Information science --- Visual analytics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection --- Computer networks - Security measures
Choose an application
The concept of trust is related to many aspects of our daily lives, and different stakeholders use the term “trust” in various contexts. Trust is crucial in today’s information societies for ensuring success of digital economies in all countries and regions. This book contains papers that were presented at the conference “Future of Trust in Computing” and brings together academics, regulators, technologists, and practitioners working in diverse areas of trust from various parts of the world. The authors discuss issues they are facing and begin to form a common framework. Security and privacy threats and remedies, core trust-enforcing technologies, innovative applications, regulatory issues, privacy and usability, economics as well as provable security and assurance are discussed. Finally, a number of papers touch upon innovative approaches to trust that begin to define new fields of research and innovative types of technologies.
Computer networks -- Access control -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Computer security -- Congresses. --- Data protection -- Congresses. --- Engineering & Applied Sciences --- Computer Science --- Data protection --- Computer networks --- Computer security --- Access control --- Security measures --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection
Choose an application
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessme
Computer networks --Security measures. --- Computer networks --- Penetration testing (Computer security) --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- Computer security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer security --- Information Technology --- General and Others
Choose an application
This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.
Computer networks -- Access control -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Computer networks --- Electronic commerce --- Security measures --- Access control --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Commerce --- Information superhighway --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description.
Business enterprises --Computer networks --Security measures. --- Computer security. --- Data protection. --- Information technology --Security measures. --- Business enterprises --- Information technology --- Computer security --- Data protection --- Commerce --- Business & Economics --- Marketing & Sales --- Security measures --- Computer networks --- -Information technology --- -Computer security --- 658.478 --- -Security measures --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security systems --- Hacking --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Security measures. --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
INFORMATION WARFARE--USA --- CYBERTERRORISM--USA--PREVENTION --- CYBERSPACE--SECURITY MEASURES --- COMPUTER NETWORKS--SECURITY MEASURES--USA --- COMPUTER SECURITY--USA --- INFRASTRUCTURE (ECONOMICS)--SECURITY MEASURES--USA --- INFORMATION SUPERHIGHWAY--SECURITY MEASURES--USA --- Civil defense - United States. --- Cyberspace - Security measures. --- Cyberterrorism - United States - Prevention. --- Cyberterrorism - United States - Prevention deleteClassification editClassification. --- Information warfare - United States. --- Information warfare --- Cyberterrorism --- Computer security. --- Computer networks --- Civil defense --- Homeland defense --- Homeland security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Prevention. --- Security measures --- Protection --- Cyberspace --- Security measures. --- Space and time --- Telematics
Choose an application
TCP/IP (transmission control protocol/internet protocol) --- computernetwerken --- Computer. Automation --- computerbeveiliging --- Computer networks --- TCP/IP (Computer network protocol) --- Security measures --- Security measures. --- 681.3*C20 --- 681.3*D46 --- TCP/IP Internet Protocol Suite (Computer network protocol) --- Transmission Control Protocol/Internet Protocol (Computer network protocol) --- Computer network protocols --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer-communication networks: general: data communications, open systems interconnection reference model (OSI), security and protection (e.g., firewalls) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 6813*C20 --- Réseaux d'ordinateurs --- Mesures de sécurité --- Mesures de sécurité. --- Computer networks - Security measures --- Réseaux d'ordinateurs --- Mesures de sécurité.
Listing 1 - 10 of 27 | << page >> |
Sort by
|