Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Choose an application
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communicat
Cloud computing. --- Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer security. --- Cloud computing --- Computer security --- Computer networks --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Telecommunications --- Computer Science --- Security measures --- Security measures. --- Information Technology --- General and Others --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Electronic data processing --- Web services --- Distributed processing
Choose an application
"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it's often hard to ensure that you know what tools are available and which ones to use for a certain task. Through the next ten chapters, we'll be exploring the plethora of open source tools that are available to you as a penetration tester, how to use them, and in which situations they apply. Open source tools are pieces of software which are available with the source code so that the software can be modified and improved by other interested contributors. In most cases, this software comes with a license allowing for distribution of the modified software version with the requirement that the source code continue to be included with the distribution. In many cases, open source software becomes a community effort where dozens if not hundreds of people are actively contributing code and improvements to the software project. This type of project tends to result in a stronger and more valuable piece of software than what would often be developed by a single individual or small company. While commercial tools certainly exist in the penetration testing space, they're often expensive and, in some cases, too automated to be useful for all penetration testing scenarios. There are many common situations where the open source tools that we will be talking about fill a need better and (obviously) more cost effectively than any commercial tool. The tools that we will be discussing throughout this book are all open source and available for you to use in your work as a penetration tester"--
Computer hackers. --- Computer networks - Security measures - Testing. --- Computer networks -- Security measures. --- Computer security. --- Computers - Access control. --- Electronic information resources -- Access control. --- Penetration testing (Computer security). --- Engineering & Applied Sciences --- Computer Science --- Computers --- Penetration testing (Computer security) --- Computer networks --- Access control. --- Security measures --- Testing. --- Information Technology --- General and Others --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Ethical hacking (Computer security) --- Computer security --- Distributed processing
Choose an application
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. It covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability. Then it dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. Learn about information security without wading through huge manualsCovers both theoretical and practical aspects o
Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer security. --- Information resources management. --- Computer security --- Computer networks --- Information resources management --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Security measures. --- Information Technology --- General and Others --- Corporations --- Information resource management --- Information systems management --- IRM (Information resources management) --- Management --- Management information systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called ""best practices"" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily ri
Computer networks - Security measures. --- Computer networks --Security measures. --- Industries -- Security measures. --- Risk management. --- Computer networks --- Risk assessment --- Risk management --- Electrical & Computer Engineering --- Management --- Engineering & Applied Sciences --- Business & Economics --- Management Styles & Communication --- Telecommunications --- Security measures --- Computer security. --- Security measures. --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer security --- E-books --- Insurance
Choose an application
Thor's Microsoft® Security Bible provides a ""one-stop-shop"" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Named the 2011 Best Systems Administration Book by
Computer networks -- Security measures. --- Computer security. --- Microsoft Windows (Computer file). --- Engineering & Applied Sciences --- Computer Science --- Computer security --- Microsoft software --- Security measures --- Computer networks --- Security measures. --- Information Technology --- General and Others --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the
Computer networks --Security measures --Handbooks, manuals, etc. --- Information warfare --Handbooks, manuals, etc. --- Information warfare --- Computer networks --- Military & Naval Science --- Social Welfare & Social Work --- Social Sciences --- Law, Politics & Government --- Criminology, Penology & Juvenile Delinquency --- Military Science - General --- Security measures --- Information Technology --- General and Others --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Military art and science --- Distributed processing
Choose an application
Time is an exceptional dimension that is common to many application domains such as medicine, engineering, business, science, biography, history, planning, or project management. Understanding time-oriented data enables us to learn from the past in order to predict, plan, and build the future. Due to the distinct characteristics of time, appropriate visual and analytical methods are required to explore and analyze them. This book starts with an introduction to visualization and a number of historical examples of visual representations. At its core, the book presents and discusses a systematic view of the visualization of time-oriented data. This view is structured along three key questions. While the aspects of time and associated data describe what is being visualized, user tasks are related to the question why something is visualized. These characteristics and tasks determine how the visualization is to be designed. To support visual exploration, interaction techniques and analytical methods are required as well, which are discussed in separate chapters. The concepts explained in this book are illustrated with numerous examples. A large part of this book is devoted to a structured survey of existing techniques for visualizing time and time-oriented data. Overall, 101 different visualization techniques are presented on a per-page basis; each of these self-contained descriptions is accompanied by an illustration and corresponding references. This survey serves as a reference for scientists conducting related research as well as for practitioners seeking information on how their time-oriented data can best be visualized in order to gain valuable insights.
Computer networks -- Security measures. --- Computer security. --- Human-computer interaction. --- Information visualization. --- Visual analytics --- Information visualization --- Temporal databases --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Electrical Engineering --- Computer Science --- Visual analytics. --- Analytics, Visual --- Data visualization --- Visualization of information --- Computer science. --- Computers. --- User interfaces (Computer systems). --- Image processing. --- Application software. --- Computer Science. --- User Interfaces and Human Computer Interaction. --- Image Processing and Computer Vision. --- Information Systems and Communication Service. --- Computer Applications. --- Reasoning --- Information science --- Computer vision. --- Information systems. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Informatics --- Science --- Optical data processing. --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Optical equipment
Choose an application
Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users’ virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users’ concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies. .
Computer networks -- Security measures. --- Electronic commerce -- Security measures. --- Internet -- Security measures. --- Online social networks --- Internet --- Sociology & Social History --- Engineering & Applied Sciences --- Social Sciences --- Computer Science --- Social Change --- Security measures --- Security measures. --- Electronic social networks --- Social networking Web sites --- Computer science. --- Industrial management. --- User interfaces (Computer systems). --- Computers and civilization. --- Communication. --- Community psychology. --- Environmental psychology. --- Computer Science. --- Computers and Society. --- Communication Studies. --- Community and Environmental Psychology. --- Media Management. --- User Interfaces and Human Computer Interaction. --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Applied psychology. --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Management --- Business --- Industrial organization --- Applied psychology --- Psychagogy --- Psychology, Practical --- Social psychotechnics --- Psychology --- Informatics --- Science --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Cognitive ergonomics --- Ecological psychology --- Ecopsychology --- Ecotherapy --- Environmental quality --- Environmental social sciences --- Human factors science --- Psychoeology --- Psychotherapy --- Ecological Systems Theory --- Psychology, Applied --- Social psychology --- Communication, Primitive --- Mass communication --- Sociology --- Civilization and computers --- Civilization --- Psychological aspects
Choose an application
Health-care telematics in Germany have been a much discussed topic in recent years. Based on the methodological foundation of design-oriented artifact construction in Information Systems (IS) research, in particular method engineering, Ali Sunyaev develops a method for the organizational and technical analysis of security issues in health care using tools, methods, and processes in a structured and traceable way. He identifies security problems in the current concept of German health-care telematics and derives recommendations for future developments in the health-care sector.
Computer networks -- Security measures. --- Medical informatics -- Security measures -- Germany. --- Medical records -- Access control -- Germany. --- Management --- Medicine --- Public Health --- Health & Biological Sciences --- Business & Economics --- Management Theory --- Medicine - General --- Hospitals & Medical Centers --- Medical telematics --- Data protection --- Information storage and retrieval systems --- Medical care. --- Medical care --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Clinical telematics --- Health telematics --- Telehealth --- Business. --- Management. --- Information technology. --- Business --- Health care management. --- Health services administration. --- Business and Management. --- Health Care Management. --- IT in Business. --- Data processing. --- Medical records --- Electronic data processing --- Medical informatics --- Telecommunication in medicine --- Telematics --- Data processing --- Administration --- Industrial relations --- Organization --- IT (Information technology) --- Technology --- Information superhighway --- Knowledge management --- Health administration --- Health care administration --- Health care management --- Health sciences administration --- Health services management --- Health planning --- Public health administration --- Business—Data processing.
Listing 1 - 10 of 12 | << page >> |
Sort by
|