Narrow your search
Listing 1 - 10 of 21 << page
of 3
>>
Sort by
Security assessment : case studies for implementing the NSA lAM
Author:
ISBN: 1932266968 9786611056377 1281056375 0080480829 1597490105 9781597490108 9781932266962 9780080480824 Year: 2004 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines.This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for th

Stealing the network
Author:
ISBN: 1931836876 9786611056131 1281056138 0080481116 1932266682 9781932266689 9781931836876 9781281056139 6611056130 9780080481111 Year: 2003 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not

Electronic signatures : authentication technology from a legal perspective
Author:
ISBN: 9067041742 9789067041744 Year: 2004 Volume: 5 Publisher: The Hague: TMC Asser press,


Book
Why hackers win : power and disruption in the network society
Authors: ---
ISBN: 9780520300125 0520300122 0520300130 9780520300132 9780520971653 0520971655 Year: 2019 Publisher: Berkeley (Calif.): University of California press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the "trusted systems" underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.

WarDriving : drive, detect, defend: a guide to wireless security
Author:
ISBN: 9780080481685 008048168X 1931836213 9781931836210 9781931836036 1931836035 9786611052638 1281052639 9781281052636 6611052631 Year: 2004 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very m


Book
Why Hackers Win : Power and Disruption in the Network Society
Authors: ---
ISBN: 0520971655 Year: 2020 Publisher: Berkeley, CA : University of California Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the “trusted systems” underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.


Book
Computer security
Author:
ISBN: 9780470741153 0470741155 Year: 2012 Publisher: Chichester: Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.

Listing 1 - 10 of 21 << page
of 3
>>
Sort by