Narrow your search
Listing 1 - 10 of 12 << page
of 2
>>
Sort by

Book
A cyberworm that knows no boundaries
Authors: --- ---
ISBN: 1280126965 9786613530820 0833059807 9780833059802 9781280126963 6613530824 Year: 2011 Publisher: Santa Monica RAND Corp.

Loading...
Export citation

Choose an application

Bookmark

Abstract

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.


Book
Securing the cloud : cloud computer security techniques and tactics
Authors: ---
ISBN: 128309231X 9786613092311 159749593X 1597495921 Year: 2011 Publisher: Amsterdam : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communicat


Book
Penetration tester's open source toolkit
Author:
ISBN: 1283164442 9786613164445 1597496286 1597496278 9781597496278 9781283164443 9781597496285 Year: 2011 Publisher: Waltham, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it's often hard to ensure that you know what tools are available and which ones to use for a certain task. Through the next ten chapters, we'll be exploring the plethora of open source tools that are available to you as a penetration tester, how to use them, and in which situations they apply. Open source tools are pieces of software which are available with the source code so that the software can be modified and improved by other interested contributors. In most cases, this software comes with a license allowing for distribution of the modified software version with the requirement that the source code continue to be included with the distribution. In many cases, open source software becomes a community effort where dozens if not hundreds of people are actively contributing code and improvements to the software project. This type of project tends to result in a stronger and more valuable piece of software than what would often be developed by a single individual or small company. While commercial tools certainly exist in the penetration testing space, they're often expensive and, in some cases, too automated to be useful for all penetration testing scenarios. There are many common situations where the open source tools that we will be talking about fill a need better and (obviously) more cost effectively than any commercial tool. The tools that we will be discussing throughout this book are all open source and available for you to use in your work as a penetration tester"--


Book
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
Authors: ---
ISBN: 1283134012 9786613134011 1597496545 1597496537 9781597496537 9781597496544 Year: 2011 Publisher: Waltham, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. It covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability. Then it dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. Learn about information security without wading through huge manualsCovers both theoretical and practical aspects o


Book
Security risk management : building an information security risk management program from the ground up
Author:
ISBN: 1283526395 9786613838841 1597496162 1597496154 9781597496155 9781597496162 Year: 2011 Publisher: Waltham, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called ""best practices"" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily ri


Book
Thor's Microsoft security bible : a collection of practical security techniques
Authors: ---
ISBN: 1283196093 9786613196095 1597495735 1597495727 Year: 2011 Publisher: Waltham, Mass. : Elsevier Inc.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Thor's Microsoft® Security Bible provides a ""one-stop-shop"" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Named the 2011 Best Systems Administration Book by


Book
Cyber warfare
Authors: --- ---
ISBN: 1283118785 9786613118783 1597496383 1597496375 9781597496377 9781597496384 Year: 2011 Publisher: Amsterdam Boston Elsevier/Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the


Book
Visualization of time-oriented data
Author:
ISBN: 0857290789 0857290797 Year: 2011 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Time is an exceptional dimension that is common to many application domains such as medicine, engineering, business, science, biography, history, planning, or project management. Understanding time-oriented data enables us to learn from the past in order to predict, plan, and build the future. Due to the distinct characteristics of time, appropriate visual and analytical methods are required to explore and analyze them. This book starts with an introduction to visualization and a number of historical examples of visual representations. At its core, the book presents and discusses a systematic view of the visualization of time-oriented data. This view is structured along three key questions. While the aspects of time and associated data describe what is being visualized, user tasks are related to the question why something is visualized. These characteristics and tasks determine how the visualization is to be designed. To support visual exploration, interaction techniques and analytical methods are required as well, which are discussed in separate chapters. The concepts explained in this book are illustrated with numerous examples. A large part of this book is devoted to a structured survey of existing techniques for visualizing time and time-oriented data. Overall, 101 different visualization techniques are presented on a per-page basis; each of these self-contained descriptions is accompanied by an illustration and corresponding references.  This survey serves as a reference for scientists conducting related research as well as for practitioners seeking information on how their time-oriented data can best be visualized in order to gain valuable insights.

Keywords

Computer networks -- Security measures. --- Computer security. --- Human-computer interaction. --- Information visualization. --- Visual analytics --- Information visualization --- Temporal databases --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Electrical Engineering --- Computer Science --- Visual analytics. --- Analytics, Visual --- Data visualization --- Visualization of information --- Computer science. --- Computers. --- User interfaces (Computer systems). --- Image processing. --- Application software. --- Computer Science. --- User Interfaces and Human Computer Interaction. --- Image Processing and Computer Vision. --- Information Systems and Communication Service. --- Computer Applications. --- Reasoning --- Information science --- Computer vision. --- Information systems. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Informatics --- Science --- Optical data processing. --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Optical equipment


Book
Privacy online : perspectives on privacy and self-disclosure in the social web
Authors: ---
ISBN: 3642443389 3642215203 9786613801012 3642215211 1282107666 Year: 2011 Publisher: Berlin ; Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users’ virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users’ concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies. .

Keywords

Computer networks -- Security measures. --- Electronic commerce -- Security measures. --- Internet -- Security measures. --- Online social networks --- Internet --- Sociology & Social History --- Engineering & Applied Sciences --- Social Sciences --- Computer Science --- Social Change --- Security measures --- Security measures. --- Electronic social networks --- Social networking Web sites --- Computer science. --- Industrial management. --- User interfaces (Computer systems). --- Computers and civilization. --- Communication. --- Community psychology. --- Environmental psychology. --- Computer Science. --- Computers and Society. --- Communication Studies. --- Community and Environmental Psychology. --- Media Management. --- User Interfaces and Human Computer Interaction. --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Applied psychology. --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Management --- Business --- Industrial organization --- Applied psychology --- Psychagogy --- Psychology, Practical --- Social psychotechnics --- Psychology --- Informatics --- Science --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Cognitive ergonomics --- Ecological psychology --- Ecopsychology --- Ecotherapy --- Environmental quality --- Environmental social sciences --- Human factors science --- Psychoeology --- Psychotherapy --- Ecological Systems Theory --- Psychology, Applied --- Social psychology --- Communication, Primitive --- Mass communication --- Sociology --- Civilization and computers --- Civilization --- Psychological aspects


Book
Health-care telematics in Germany : design and application of a security analysis method
Author:
ISBN: 3834924423 3834965197 Year: 2011 Publisher: Wiesbaden : Gabler,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Health-care telematics in Germany have been a much discussed topic in recent years. Based on the methodological foundation of design-oriented artifact construction in Information Systems (IS) research, in particular method engineering, Ali Sunyaev develops a method for the organizational and technical analysis of security issues in health care using tools, methods, and processes in a structured and traceable way. He identifies security problems in the current concept of German health-care telematics and derives recommendations for future developments in the health-care sector.

Listing 1 - 10 of 12 << page
of 2
>>
Sort by