Listing 1 - 10 of 27 | << page >> |
Sort by
|
Choose an application
Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
Les menaces de sécurité numérique potentiellement lourdes de conséquences économiques sont récemment devenues plus nombreuses et sophistiquées, alors même que l’environnement numérique est devenu un maillon essentiel du fonctionnement de l’économie et un facteur important de croissance, de bien-être et d’inclusivité. Pour profiter pleinement des avantages liés à l’environnement numérique, les parties prenantes doivent absolument cesser d’aborder le risque de sécurité numérique sous un angle technique dissocié de considérations économiques et sociales plus larges. Il leur faut d’urgence intégrer la gestion de ce risque à leurs processus décisionnels en matière économique et sociale. Les responsables de l’action publique doivent également mesurer toute la complexité du risque de sécurité numérique dans ses multiples dimensions, de la prospérité économique et sociale aux activités de police (lutte contre la « cybercriminalité ») en passant par la défense, la sécurité nationale et la sécurité internationale. Cette Recommandation de l'OCDE et son document d'accompagnement offrent des orientations sur ces aspects.
Computer networks --- Internet --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
Computer networks --- Security measures. --- Access control. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data sovereignty
Choose an application
In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and stora
Computer networks --- Internet --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures
Choose an application
Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis About This Book Gain hands-on experience of troubleshooting errors in TCP/IP and SSL protocols through practical use cases Identify and overcome security flaws in your network to get a deeper insight into security analysis This is a fast-paced book that focuses on quick and effective packet captures through practical examples and exercises Who This Book Is For If you are a network or system administrator who wants to effectively capture packets, a security consultant who wants to audit packet flows, or a white hat hacker who wants to view sensitive information and remediate it, this book is for you. This book requires decoding skills and a basic understanding of networking. What You Will Learn Utilize Wireshark's advanced features to analyze packet captures Locate the vulnerabilities in an application server Get to know more about protocols such as DHCPv6, DHCP, DNS, SNMP, and HTTP with Wireshark Capture network packets with tcpdump and snoop with examples Find out about security aspects such as OS-level ARP scanning Set up 802.11 WLAN captures and discover more about the WAN protocol Enhance your troubleshooting skills by understanding practical TCP/IP handshake and state diagrams In Detail Wireshark provides a very useful way to decode an RFC and examine it. The packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols, which will help you perform the security research and protocol debugging. The book starts by introducing you to various packet analyzers and helping you find out which one best suits your needs. You will learn how to use the command line and the Wireshark GUI to capture packets by employing filters. Moving on, you will acquire knowledge about TCP/IP communication and its use cases. You will then get an understanding of the SSL/TLS flow with Wireshark and tackle the associated problems with it. Next, you will perform analysis on application-related protocols. We follow this with some best practices to analyze wireless traffic. By the end of the book, you will have developed the skills needed for you to identify packets for malicious attacks, intrusions, and other malware attacks. Style and approach This is an easy-to-follow guide packed with illustrations and equipped with lab exercises to help you reproduce scenarios u...
Choose an application
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed fo
Computer networks --- Malware (Computer software) --- Security measures. --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi
Data protection --- Computer networks --- Standards. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
This book is intended for mobile security professionals who want to learn how to secure iOS operating systems and its applications. Any knowledge of iOS architecture would be an added advantage.
Computer networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures. --- iOS (Electronic resource) --- i Operating system --- iOS 4.0 --- iOs 5 --- iOS operating system --- iPhone OS
Choose an application
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most important
Computer security. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer networks --- Python (Computer program language) --- Peer-to-peer architecture (Computer networks) --- Security measures. --- P2P (Computer network architecture) --- Computer network architectures --- Scripting languages (Computer science) --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
The emerging field of network science represents a new style of research that can unify such traditionally-diverse fields as sociology, economics, physics, biology, and computer science. It is a powerful tool in analyzing both natural and man-made systems, using the relationships between players within these networks and between the networks themselves to gain insight into the nature of each field. Until now, studies in network science have been focused on particular relationships that require varied and sometimes-incompatible datasets, which has kept it from being a truly universal disciplin
Computer networks --- Computer security. --- Internet --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Protection --- Security measures
Listing 1 - 10 of 27 | << page >> |
Sort by
|