Listing 1 - 10 of 21 | << page >> |
Sort by
|
Choose an application
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines.This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for th
Choose an application
""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not
Choose an application
Digital signatures --- Law and legislation --- 681.3*K65 --- Electronic signatures --- Signature (Law) --- Law and legislation. --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Digital signatures - Law and legislation
Choose an application
681.3*K65 --- Computer networks --- Computers --- Computer security --- Computer network security --- Network security, Computer --- Security of computer networks --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures. --- Access control. --- Intrusion detection systems (Computer security) --- Intrusion detection systems (Computer security). --- IDSs (Intrusion detection systems) --- Security measures --- Access control --- Snort (Software)
Choose an application
When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the "trusted systems" underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.
Hackers --- Hacking --- Political aspects --- Social problems --- Human rights --- Computer. Automation --- Hackers. --- Political aspects. --- Hacking - Political aspects --- Hacking. --- case studies. --- commodity development. --- communication law. --- competitive advantage. --- corporations. --- critical communication. --- cybersecurity. --- digital capitalism. --- european union. --- everyday use of technology. --- fraud. --- government agencies. --- government entities. --- governments. --- hackers. --- identity theft. --- invasive software. --- lone wolf. --- managing risk. --- media studies. --- political economic model. --- social change. --- trusted systems. --- united states.
Choose an application
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very m
Computer. Automation --- 681.3*K65 --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Wireless communication systems --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures. --- Protection --- Security measures
Choose an application
When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the “trusted systems” underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.
Hackers. --- Hacking. --- case studies. --- commodity development. --- communication law. --- competitive advantage. --- corporations. --- critical communication. --- cybersecurity. --- digital capitalism. --- european union. --- everyday use of technology. --- fraud. --- government agencies. --- government entities. --- governments. --- hackers. --- identity theft. --- invasive software. --- lone wolf. --- managing risk. --- media studies. --- political economic model. --- social change. --- trusted systems. --- united states.
Choose an application
This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
681.3*D46 --- 681.3*K65 --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Security and protection: authentication insurance invasive software (e.g. viruses, worms, Trojan horses) physical security unauthorized access (e.g. hacking, phreaking) --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Protection --- Security measures
Choose an application
cryptografie --- netwerkbeheer --- computerbeveiliging --- Computer architecture. Operating systems --- toegangscontrole --- Computer security --- Authentication --- Sécurité informatique --- Authentification --- 681.3*K65 --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Computer security. --- Sécurité informatique --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Contracts --- Non-contentious jurisdiction --- Legal documents --- Legalization --- Protection --- Security measures --- Law and legislation
Choose an application
computerbeveiliging --- Computer architecture. Operating systems --- Computer security --- Computer software --- Testing --- Reliability --- 681.3*K65 --- Computer security. --- Software, Computer --- Computer systems --- Computer privacy --- Computer system security --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Testing. --- Reliability. --- Security measures --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer software - Testing --- Computer software - Reliability
Listing 1 - 10 of 21 | << page >> |
Sort by
|