Listing 1 - 10 of 274 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Why do nations break into one another's most important computer networks ? There is an obvious answer : to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential component of cyber operations.
COMPUTER NETWORKS--SECURITY MEASURES --- COMPUTER SECURITY --- Polemology
Choose an application
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.
Computer networks - Security measures. --- Multicasting (Computer networks) - Security measures. --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Multicasting (Computer networks) - Security measures --- Computer networks - Security measures
Choose an application
This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u
Computer networks - Security measures. --- Computer networks.
Choose an application
This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u
Computer networks - Security measures. --- Computer networks.
Choose an application
Computer networks--Security measures. --- Computer security.
Choose an application
Computer networks--Security measures. --- Computer security.
Choose an application
Nathan Whittacre has seen it all! Through his many years of creating systems and processes to help businesses succeed, he has firsthand knowledge of what goes disastrously wrong when the right systems are not in place. His many stories from being "in the field" can be seen throughout the book, often when he is called into rescue businesses that have fallen prey to threats from both inside and outside the organization. But he helps CEOs to understand that the best solution to avoiding the dangers these threats consistently present is prevention. This book details all the systems available to do exactly that, and in which instances they are best employed.
Choose an application
Listing 1 - 10 of 274 | << page >> |
Sort by
|