| |
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge...
Editeur :
Morgan Kaufmann
Parution :
2013-11-06
epub sans DRM
|
Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now...
Editeur :
Syngress
Parution :
2013-11-01
epub sans DRM
|
The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the...
Editeur :
Syngress
Parution :
2013-10-31
epub sans DRM
|
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as...
Editeur :
Wiley
Parution :
2013-10-18
PDF, ePub
|
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
This book is written by...
Editeur :
Syngress
Parution :
2013-10-07
epub sans DRM
|
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information...
Editeur :
Syngress
Parution :
2013-10-01
epub sans DRM
|
This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its...
Editeur :
Springer
Parution :
2013-09-30
Collection :
SpringerBriefs in Electrical and Computer Engineering
ePub
|
There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new...
Editeur :
Syngress
Parution :
2013-09-20
epub sans DRM
|
The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the...
Editeur :
Elsevier
Parution :
2013-09-17
epub sans DRM
|
As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use...
Editeur :
Syngress
Parution :
2013-09-03
epub sans DRM
|
This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody.This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written...
Editeur :
Syngress
Parution :
2013-08-30
epub sans DRM
|
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and...
Editeur :
Syngress
Parution :
2013-08-26
epub sans DRM
|
This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It...
Editeur :
Syngress
Parution :
2013-08-22
epub sans DRM
|
Credible Checklists and Quality Questionnaires starts off with an examination of the critical but commonly overlooked checklist method.
In the second chapter, questionnaires and surveys are discussed. Asking questions sounds simple, but the hard truth is that asking...
Editeur :
Morgan Kaufmann
Parution :
2013-08-22
epub sans DRM
|
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,...
Editeur :
Syngress
Parution :
2013-08-21
epub sans DRM
|
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of...
Editeur :
Syngress
Parution :
2013-08-20
epub sans DRM
|
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners...
Editeur :
Syngress
Parution :
2013-08-10
epub sans DRM
|
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable...
Editeur :
Syngress
Parution :
2013-07-19
epub sans DRM
|
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security...
Editeur :
Wiley
Parution :
2013-07-12
Collection :
Wiley Software Patterns Series
ePub
|
The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be...
Editeur :
Syngress
Parution :
2013-07-03
epub sans DRM
|