Listing 1 - 10 of 17 << page
of 2
>>
Sort by

Book
The security consultant's handbook
Author:
ISBN: 184928749X 9781849287494 9781849287500 1849287503 9781849287517 1849287511 9781849287487 1849287481 Year: 2015 Publisher: Ely, Cambridgeshire : IT Governance Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organizational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities, and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains. Product overview Distilling the author’s fifteen years’ experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant’s Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding, and business networking) Management practice (including the security function’s move from basement to boardroom, fitting security into the wider context of organizational resilience, security management leadership, adding value, and professional proficiency) Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions) Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law) Information and cybersecurity (including why information needs protection, intelligence and espionage, cybersecurity threats, and mitigation approaches such as the ISO 27001 standard for information security management) Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy, and firearms) Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability) Personal and organizational resilience (including workplace initiative...


Periodical
Le Journal de la cybercriminalité & des investigations numériques.
Author:
ISSN: 24942715 Year: 2015 Publisher: Paris : Centre expert contre la cybercriminalité français,


Periodical
Journal of cybersecurity.
ISSN: 20572093 Year: 2015 Publisher: Oxford : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The fully open access Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security. The journal is premised on the belief that computer science-based approaches, while necessary, are not sufficient to tackle cybersecurity challenges. Instead, scholarly contributions from a range of disciplines are needed to understand the human aspects of cybersecurity. Journal of Cybersecurity provides a hub around which the interdisciplinary cybersecurity community can form, and is committed to providing quality conceptual and empirical research, as well as scholarship, that is grounded in real-world implications and solutions.


Book
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers
Authors: --- --- --- --- --- et al.
ISBN: 9783319170169 3319170155 9783319170152 3319170163 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014). The volume contains 7 full and 4 short papers plus 1 keynote talk from the DPM workshop; 2 full papers and 1 keynote talk from the SETOP workshop; and 7 full papers and 1 keynote talk from the QASA workshop - selected out of 52 submissions. The papers are organized in topical sections on data privacy management; autonomous and spontaneous security; and quantitative aspects in security assurance.

Keywords

Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Data Encryption. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Information Systems. --- Informatique --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer security. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Cryptology. --- Electronic data processing --- Cryptography. --- Data and Information Security. --- IT Operations. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
Privacy and Identity Management for the Future Internet in the Age of Globalisation : 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers
Authors: --- ---
ISBN: 9783319186214 3319186205 9783319186207 3319186213 Year: 2015 Publisher: Heidelberg : Srpinger,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Patras, Greece, in September 2014. The 9 revised full papers and 3 workshop papers included in this volume were carefully selected from a total of 29 submissions and were subject to a two-step review process. In addition, the volume contains 5 invited keynote papers. The regular papers are organized in topical sections on legal privacy aspects and technical concepts, privacy by design and privacy patterns and privacy technologies and protocols.

Keywords

Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer science. --- Data protection. --- Information Systems. --- Informatique --- Protection de l'information (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer security. --- Computers and civilization. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Internet --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Electronic data processing—Management. --- Data and Information Security. --- IT Operations. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Management. --- Protección de la información (Informática) --- Sistemas de información --- Internet (Red informática) --- Derecho y legislación


Book
Introduction to Cryptography : Principles and Applications
Authors: ---
ISBN: 3662479737 3662479745 Year: 2015 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.


Book
Critical Infrastructure Protection IX : 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers
Authors: ---
ISBN: 3319265660 3319265679 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Cyber-Physical Systems Security, Infrastructure Security, Infrastructure Modeling and Simulation, Risk and Impact Assessment. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of nineteen edited papers from the Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2015. Critical Infrastructure Protection IX is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Mason Rice is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA. .

Keywords

Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Computers and civilization. --- Computers. --- Law and legislation. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Legal Aspects of Computing. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Information Systems. --- Law and legislation --- Computer networks --- Data protection. --- Electronic data processing --- Information technology --- Data and Information Security. --- IT Operations. --- Management. --- Technology and law --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
Information Security and Cryptology : 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
Authors: --- ---
ISBN: 9783319167459 3319167448 9783319167442 3319167456 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

Keywords

Computer Science. --- Systems and Data Security. --- Data Encryption. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Coding theory. --- Computer software. --- Computational complexity. --- Informatique --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Codage --- Logiciels --- Complexité de calcul (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Computer security. --- Algorithms. --- Computer science --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Cryptology. --- Complexity, Computational --- Software, Computer --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics --- Cryptography. --- Discrete mathematics. --- Data and Information Security. --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
Authors: ---
ISBN: 9783319184678 3319184660 9783319184661 3319184679 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.

Keywords

Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Data Encryption. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computer security. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Computer networks. --- Cryptography. --- Data and Information Security. --- IT Operations. --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)

Listing 1 - 10 of 17 << page
of 2
>>
Sort by