Narrow your search
Listing 1 - 10 of 274 << page
of 28
>>
Sort by

Book
Best Practices in Computer Network Defense : Incident Detection and Response
Authors: ---
ISBN: 9781614993711 Year: 2014 Publisher: Amsterdam : IOS Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Network security in the 90's : issues and solutions for managers
Author:
ISBN: 0471547778 Year: 1992 Publisher: New York Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The cybersecurity dilemma : hacking, trust, and fear between nations
Author:
ISBN: 9781849047135 Year: 2016 Publisher: London Hurst & Company

Loading...
Export citation

Choose an application

Bookmark

Abstract

Why do nations break into one another's most important computer networks ? There is an obvious answer : to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential component of cyber operations.

Multicast and group security
Authors: ---
ISBN: 158053659X 9781580536592 1580533426 9781580533423 Year: 2003 Publisher: Boston : [Piscataqay, New Jersey] : Artech House, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.

Security sage's guide to hardening the network infrastructure
Author:
ISBN: 1931836337 9781931836333 9781931836012 1931836019 0080480837 9780080480831 1281052620 9781281052629 9786611052621 Year: 2004 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u

Security sage's guide to hardening the network infrastructure
Author:
ISBN: 1931836337 9781931836333 9781931836012 1931836019 0080480837 9780080480831 1281052620 9781281052629 9786611052621 Year: 2004 Publisher: Rockland, MA Syngress Pub

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u


Book
Computer Security Techniques for Nuclear Facilities : Technical Guidence.
Author:
ISBN: 9789201237200 9201237200 Year: 2021 Publisher: Havertown : International Atomic Energy Agency,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Computer Security for Nuclear Security : Implementing Guide.
Author:
ISBN: 9789201213204 9201213204 Year: 2021 Publisher: Havertown : International Atomic Energy Agency,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The CEO's Digital Survival Guide : A Practical Handbook to Navigating the Future.
Author:
ISBN: 1642256293 Year: 2023 Publisher: Newburyport : Advantage Media Group,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Nathan Whittacre has seen it all! Through his many years of creating systems and processes to help businesses succeed, he has firsthand knowledge of what goes disastrously wrong when the right systems are not in place. His many stories from being "in the field" can be seen throughout the book, often when he is called into rescue businesses that have fallen prey to threats from both inside and outside the organization. But he helps CEOs to understand that the best solution to avoiding the dangers these threats consistently present is prevention. This book details all the systems available to do exactly that, and in which instances they are best employed.

Cyber-security and threat politics
Author:
ISBN: 9780415429818 9780203937419 9781134086658 9781134086696 9781134086702 9780415569880 Year: 2008 Publisher: London Routledge

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 274 << page
of 28
>>
Sort by