Listing 1 - 10 of 271 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Why do nations break into one another's most important computer networks ? There is an obvious answer : to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential component of cyber operations.
COMPUTER NETWORKS--SECURITY MEASURES --- COMPUTER SECURITY --- Polemology
Choose an application
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.
Computer networks - Security measures. --- Multicasting (Computer networks) - Security measures. --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Multicasting (Computer networks) - Security measures --- Computer networks - Security measures
Choose an application
This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u
Computer networks - Security measures. --- Computer networks.
Choose an application
This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u
Computer networks - Security measures. --- Computer networks.
Choose an application
Choose an application
Choose an application
Personnel Protection: Concepts of Executive Security serves as an introduction to the concepts of executive security and as a guide for developing an executive security program. In this 16-minute video presentation of narrated slides, the two approaches to executive security, proactive and reactive, are defined. It also includes information about the selection of security personnel for the executive security team, security advance procedures, and executive security program objectives. This presentation is one of 11 modules in the Personnel Protection presentation series
Computer networks -- Security measures. --- Computer security. --- Data protection.
Choose an application
Les espaces numériques constituent les nouveaux territoires de l'économie. Cependant, la rapidité des évolutions technologiques et la multiplication des normes applicables rendent cet environnement de plus en plus complexe pour les entreprises, leurs dirigeants et leurs salariés. À travers un regard croisé entre une avocate et un magistrat, cet ouvrage propose une véritable cartographie des principales questions qui se posent aujourd'hui aux entreprises, en y apportant des réponses pratiques et opérationnelles. Qu'il s'agisse de l'application du RGPD, de la prévention contre les cybermenaces ou de la sécurisation des échanges numériques, chacune des 57 fiches de l'ouvrage propose un ensemble d'outils organisationnels et juridiques visant à accompagner la vie économique de l'entreprise.
Computer networks - Security measures --- Computer security --- Computer networks
Listing 1 - 10 of 271 | << page >> |
Sort by
|