Narrow your search
Listing 1 - 10 of 27 << page
of 3
>>
Sort by

Book
Proceedings of the 3rd European Conference on Computer Network Defense
Authors: ---
ISBN: 0387855548 9786613251305 0387855556 1283251302 Year: 2009 Publisher: New York ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense.


Book
Implementing Cisco IOS network security (IINS)
Author:
ISBN: 9781587058158 1587058154 Year: 2009 Publisher: Indianapolis, IN : Cisco Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cyberspace and the National Security of the United Kingdom : Threats and Responses
Authors: --- --- ---
ISBN: 9781862032156 Year: 2009 Publisher: London : Chatham House,


Book
Future of trust in computing : proceedings of the first International Conference Future of Trust in Computing 2008
Authors: ---
ISBN: 383480794X 9786613172426 1283172429 3834893242 Year: 2009 Publisher: Wiesbaden : Vieweg+Teubner,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The concept of trust is related to many aspects of our daily lives, and different stakeholders use the term “trust” in various contexts. Trust is crucial in today’s information societies for ensuring success of digital economies in all countries and regions. This book contains papers that were presented at the conference “Future of Trust in Computing” and brings together academics, regulators, technologists, and practitioners working in diverse areas of trust from various parts of the world. The authors discuss issues they are facing and begin to form a common framework. Security and privacy threats and remedies, core trust-enforcing technologies, innovative applications, regulatory issues, privacy and usability, economics as well as provable security and assurance are discussed. Finally, a number of papers touch upon innovative approaches to trust that begin to define new fields of research and innovative types of technologies.

Computer and information security handbook
Author:
ISBN: 1282168703 9786612168703 0080921949 0123743540 9780080921945 9780123743541 9780123743541 Year: 2009 Publisher: Amsterdam Boston Burlington, MA Elsevier Morgan Kaufmann

Loading...
Export citation

Choose an application

Bookmark

Abstract

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessme


Book
ISSE 2008 securing electronic business processes : highlights of the Information Security Solutions Europe 2008 Conference
Authors: --- --- ---
ISBN: 3834806609 3834892831 Year: 2009 Publisher: Wisebaden : Vieweg+Teubner Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.


Book
Enterprise information security and privacy
Authors: --- ---
ISBN: 1596931906 1596931914 9781596931909 9781596931916 Year: 2009 Publisher: Boston Artech House

Loading...
Export citation

Choose an application

Bookmark

Abstract

Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description.


Book
Cyberdeterrence and cyberwar
Authors: ---
ISBN: 9780833047342 1282398539 9786612398537 0833048759 0833047345 9780833048752 9781282398535 6612398531 Year: 2009 Publisher: Santa Monica, CA RAND

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.


Book
IPv6 security: protection measures for the next Internet Protocol
Authors: ---
ISBN: 9781587055942 1587055945 Year: 2009 Publisher: Indianapolis, Ind. Cisco

Listing 1 - 10 of 27 << page
of 3
>>
Sort by