Listing 1 - 10 of 157 | << page >> |
Sort by
|
Choose an application
This Encyclopedia is a comprehensive reference work covering the interdisciplinary facets of security. The topics range from security threats (for example: cybercrime, terrorism, shoplifting and fraud), to applications on the job, to coordination between public and private sectors in handling security and emergency situations nationally and internationally. Special attention is given to security concepts, methods, functions, theories, organizations, and technology. It will also cover the history and current state of the discipline. As a resource, contributions cover best practices in security, weaknesses in current techniques, risk assessment and vulnerability in a range of businesses and critical infrastructure sectors (including heathcare, finance, energy, natural resources, government facilities, communications, and IT), and mechanisms for managing natural and human-made disasters. As an interdisciplinary tool, it will provide practical, authoritative information both for those involved in crime and security studies, as well as those from related disciplines who increasingly need to consider security as part of their work, such as police studies, counterterrorism, urban planning, public policy, and information technology. .
Criminology. --- Security, International. --- Security systems. --- International Security Studies. --- Security Science and Technology.
Choose an application
Security systems --- Electronic surveillance --- Electronic surveillance --- Social aspects. --- Moral and ethical aspects. --- Social aspects.
Choose an application
Security and Crime is an authoritative and multidisciplinary analysis of the relationship between security and crime, addressing much of the confusion about its nature and meaning, clarifying its relevance to criminological analysis, and giving due attention to the interdisciplinary nature of the topic. Providing a historical and prospective look at issues within security the book will: trace the development of 'security' across disciplines situate this contested concept within criminological discourse and concerns explore the rising attention in politics and academic scholarship to 'security' issues as they relate to crime examine the nature and organisation of interventions to deliver security establish clearly the relationship between security, crime and criminology. International in scope, and broad in coverage, Security and Crime sets out the need to broaden the study of security in a clear, concise style that is easy for students to digest. With comprehensive pedagogical feature including chapter overviews, key terms, study questions, further reading and a glossary, this book is essential for students studying security in criminology, criminal justice, international relations, and related disciplines.
Crime --- Criminology. --- Human security. --- Security (Psychology). --- Security systems. --- Sociological aspects. --- Criminalité -- Sociologie --- Systèmes de sécurité --- Sécurité humaine
Choose an application
Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely used for manual application security testing of web applications plus APIs and mobile apps. The book starts with the basics and shows you how to set up a testing environment. It covers basic building blocks and takes you on an in-depth tour of its various components such as intruder, repeater, decoder, comparer, and sequencer. It also takes you through other useful features such as infiltrator, collaborator, scanner, and extender. And it teaches you how to use Burp Suite for API and mobile app security testing. You will: Understand various components of Burp Suite Configure the tool for the most efficient use Exploit real-world web vulnerabilities using Burp Suite Extend the tool with useful add-ons.
Computer security. --- Security Services. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography and the foundations of authentication technologies and attack mechanisms. You will learn about the mechanisms that are available to protect computer networks, systems, applications, and general digital technologies. Different methods of authentication are covered, including the most commonly used schemes in password protection: two-factor authentication and multi-factor authentication. You will learn how to securely store passwords to reduce the risk of compromise. Biometric authentication—a mechanism that has gained popularity over recent years—is covered, including its strengths and weaknesses. Authentication and Access Control explains the types of errors that lead to vulnerabilities in authentication mechanisms. To avoid these mistakes, the book explains the essential principles for designing and implementing authentication schemes you can use in real-world situations. Current and future trends in authentication technologies are reviewed. You will: Understand the basic principles of cryptography before digging into the details of authentication mechanisms Be familiar with the theories behind password generation and the different types of passwords, including graphical and grid-based passwords Be aware of the problems associated with the use of biometrics, especially with establishing a suitable level of biometric matching or the biometric threshold value Study examples of multi-factor authentication protocols and be clear on the principles Know how to establish authentication and how key establishment processes work together despite their differences Be well versed on the current standards for interoperability and compatibility Consider future authentication technologies to solve today's problems.
Computer security. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become informed and empowered on the subject of cybersecurity.In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book.You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more.
Computer security --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks.
Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data mining. --- Big data. --- Internet of things.
Choose an application
This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020. Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers were carefully reviewed and selected from 79 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications.
Computer security. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Listing 1 - 10 of 157 | << page >> |
Sort by
|