• Ebook Outsourcing information security (2004) - C. Warren Axelrod

    Ebook Outsourcing information security (2004) - C. Warren Axelrod

    Chapter 1 outsourcing and information security, chapter 2 information security risks, chapter 3 justifying outsourcing, chapter 4 risks of outsourcing, chapter 5 categorizing costs and benefits, chapter 6 costs and benefits throughout the evaluation process, chapter 7 the outsourcing evaluation process - customer and outsourcer requirements, chapter 8 outsourcing security security considerations outsourcing, chapter 9 summary of the...

     277 p actvn 26/09/2023 4 0

  • Ebook Security for wireless ad-hoc networks

    Ebook Security for wireless ad-hoc networks

    The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems. This will hopefully spur much more activity in this area in the upcoming years. This book provides a broad and comprehensive overview of the research that has been done to date on the security of wireless ad hoc networks and discusses the advantages and disadvantages of the various schemes that...

     266 p actvn 26/09/2023 5 0

  • Ebook Security in wireless LANs & MANs

    Ebook Security in wireless LANs & MANs

    This book discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. This book is divided into four parts. The first part discusses authentication technologies common to security in...

     262 p actvn 26/09/2023 4 0

  • Ebook Bulletproof wireless security: GSM, UMTS, 802.11 and Ad Hoc security

    Ebook Bulletproof wireless security: GSM, UMTS, 802.11 and Ad Hoc security

    "Bulletproof wireless security: GSM, UMTS, 802.11 and Ad Hoc security" presents the following content: Chapter 1: security and cryptography, chapter 2: network security protocols, chapter 3: security and the layered architecture, chapter 4: voice-oriented wireless networks, chapter 5: data-oriented wireless networks, chapter 6: security in traditional wireless networks, chapter 7: security in wireless local area networks, chapter 8: security...

     273 p actvn 26/09/2023 3 0

  • Ebook Computer security, privacy, and politics: Current issues, challenges and solutions

    Ebook Computer security, privacy, and politics: Current issues, challenges and solutions

    "Computer Security, Privacy, & Politics " offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.

     333 p actvn 26/09/2023 4 0

  • Ebook Combating spyware in the enterprise

    Ebook Combating spyware in the enterprise

    Ebook Combating spyware in the enterprise includes contents: Chapter 1 an overview of spyware; chapter 2 the transformation of spyware; chapter 3 spyware and the enterprise network; chapter 4 real SPY ware - crime, economic espionage, and espionage; chapter 5 solutions for the end user; chapter 6 forensic detection and removal; chapter 7 dealing with spyware in a non-microsoft world; chapter 8 the frugal engineer’s guide to spyware prevention.

     408 p actvn 26/09/2023 4 0

  • Ebook Cyber threat: How to manage the growing risk of cyber attacks

    Ebook Cyber threat: How to manage the growing risk of cyber attacks

    This book is an attempt to raise the level of awareness about the cyber threat and what to do about it. The cyber threat is a board of directors’ issue. Yet when some senior executives and board members hear the word “security” or “technology,” there’s a disconnect. They think it’s not their issue. Let the technology people deal with it. Let the security people deal with it. Although there is evidence that this perception is...

     224 p actvn 26/09/2023 3 0

  • Ebook Aggressive network self-defense

    Ebook Aggressive network self-defense

    Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted...

     417 p actvn 26/09/2023 4 0

  • Ebook Cyber-physical attack recovery procedures: A step-by-step preparation and response guide

    Ebook Cyber-physical attack recovery procedures: A step-by-step preparation and response guide

    "Cyber-physical attack recovery procedures: A step-by-step preparation and response guide" includes contents: Chapter 1: cyber-physical attack recovery procedures, chapter 2: threats and attack detection, chapter 3: prevent hackers from destroying a boiler, chapter 4: prevent hackers from destroying a pressure vessel, chapter 5: prevent hackers from destroying chillers, chapter 6: prevent hackers from destroying a gas fuel train, chapter 7:...

     177 p actvn 26/09/2023 2 0

  • Ebook Handbook of database security - Applications & trends: Part 2

    Ebook Handbook of database security - Applications & trends: Part 2

    Ebook Handbook of database security - Applications & trends: Part 2 includes contents: Chapter 12 security re-engineering for databases: concepts and techniques; chapter 13 database watermarking for copyright protection; chapter 14 database watermarking: a systematic view; chapter 15 trustworthy records retention; chapter 16 damage quarantine and recovery in data processing systems; chapter 17 hippocratic databases: current capabilities and...

     305 p actvn 26/09/2023 2 0

  • Ebook Handbook of database security - Applications & trends: Part 1

    Ebook Handbook of database security - Applications & trends: Part 1

    Ebook Handbook of database security - Applications & trends: Part 1 includes contents: Chapter 1 recent advances in access control, chapter 2 access control models for XML, chapter 3 access control policy languages in XML, chapter 4 database issues in trust management and trust negotiation, chapter 5 authenticated index structures for outsourced databases.

     274 p actvn 26/09/2023 4 0

  • Ebook Hack proofing your wireless network - Protect your wireless network from attack: Part 1

    Ebook Hack proofing your wireless network - Protect your wireless network from attack: Part 1

    Ebook Hack proofing your wireless network - Protect your wireless network from attack: Part 1 includes contents: Chapter 1 the wireless challenge, chapter 2 a security primer, chapter 3 wireless network architecture and design, chapter 4 common attacks and vulnerabilities.

     267 p actvn 26/09/2023 2 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn
getDocumentFilter3 strKey=LIBTAILIEU2_LIST_FILTERactvn200vi