Listing 1 - 10 of 8776 | << page >> |
Sort by
|
Choose an application
The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Security Technology.
Choose an application
Choose an application
ISDFS provides a platform for researchers and experts in academia, industry and government to exchange ideas and recent developments in digital forensics and security After the several successful events, the fourth ISDFS conference will continue to promote and disseminate knowledge concerning several topics and technologies related to Digital Forensics and Security.
Choose an application
Choose an application
"This book deals with the complex and often challenging topics of cybersecurity and cybercrimes. The expansion in the use of the internet and thus cyberspace has led to the exponential growth of threats, vulnerabilities and risks for users. Cyberspace has therefore become a sort of battlefield where, in addition to different interconnected computer systems, hardware and software devices are capable of rendering inefficient or destroying physical or virtual infrastructures. The complex reality of cyberspace, which is constantly evolving and expanding, requires the continuous adaptation of criminal law. The author emphasizes that the role of legislators remains essential for the need to update and/or develop legal rules aiming at regulating the activities that take place within cyberspace. This book provides useful insight for those interested in understanding the current issues related to cybercrimes and it clarifies the notion that cybersecurity is in its essence the activity of prevention, detection and finally intervention in the attacks that rotate within cyberspace, guaranteeing not only the protection of information but also of individuals"--
Choose an application
Choose an application
The papers presented at the June 1991 workshop held in Franconia, New Hampshire address topics in access control, covert channels, database security, integrity, secure information flow, and secure protocols. Three of the topics--secure protocols, integrity, and database security--are also addressed in panel discussions.
Choose an application
Proceedings of the June 1996 workshop exploring computer security issues such as access control, cryptographic protocols, database security, information flow, and formal methods for security. Offers sessions and panels on areas such as protocol specification and analysis tools, E-commerce payment protocols, composition, a genealogy of noninterference, and new attacks on security protocols. Of interest to computer security researchers.
Choose an application
"The past decade has seen a rapid increase in both the utility and risk from networked devices. The very tools Americans use to chat with loved ones and make purchases are the same tools which can be turned against them to deny access to services, steal their information, or compromise the digital system they trust. Chapter 1 provides an overview of cybersecurity for policymaking purposes, describes issues that cybersecurity affects, and discusses potential actions Congress could take. Chapter 2 describes DHS’s cybersecurity missions and how the Department interacts with others to accomplish its missions. Chapter 3 discusses the importance of risk management for cybersecurity, then introduces each of those topics: Information Sharing, Critical Infrastructure Protection and Cybersecurity, Cyber Supply Chain Risk Management, Federal Agency Oversight, and Data Protection and Privacy. The objective of chapter 4 was to determine the extent to which federal agencies have developed policies, procedures, and guidelines for the removal of personal information from cyber threat indicators and defensive measures, pursuant to CISA’s provisions. Chapter 5 highlights the work related to federal programs implemented by DHS that are intended to improve federal cybersecurity and cybersecurity over systems supporting critical infrastructure. Chapter 6 discusses the current state of electric grid cybersecurity, and the interconnected dependency of critical infrastructure with regard to electric sector reliability. The objectives of chapter 7 are to describe the roles of non-school partners and the types of PII shared with them and assess the extent to which FSA policies and procedures for overseeing the non-school partners’ protection of student aid data adhere to federal requirements, guidance, and best practices. Chapter 8 provides an update to the information security high-risk area and identifies the actions the federal government and other entities need to take to address cybersecurity challenges."
Choose an application
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security method
Listing 1 - 10 of 8776 | << page >> |
Sort by
|