
ilość książek w kategorii: 5083
![]() |
Mobile Forensic Reference Materials: A Methodology and Reification (NIST IR 7617)
ISBN: 9781478179597 / Angielski / Miękka / 2012 / 38 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
Assessment of Access Control Systems
ISBN: 9781493756292 / Angielski / Miękka / 2013 / 72 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple password mechanism, but many require more sophisticated and complex control. In addition to the authentication mechanism (such as a password), access control is concerned with how authorizations are structured. In some cases, authorization may mirror the structure of the organization, while in others it may be based on the sensitivity level of various...
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense in...
|
cena:
56,61 |
![]() |
Border Gateway Protocol Security
ISBN: 9781494469733 / Angielski / Miękka / 2013 / 64 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers. While a number of enhanced protocols for BGP have been proposed, these generally require substantial changes to the protocol and may not interoperate with current BGP implementations. To improve the security of BGP routers, the recommendations listed below are introduced. While the recommendations can contribute to...
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can hel...
|
cena:
56,61 |
![]() |
Computer Security Incident Handling Guide
ISBN: 9781494726379 / Angielski / Miękka / 2013 / 94 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not only more numerous and diverse but also more damaging and disruptive. An incident response capability is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring computing services. This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. Topics covered include...
Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not...
|
cena:
56,61 |
![]() |
Recommendation for Block Cipher Modes of Operation Methods and Techniques
ISBN: 9781495211041 / Angielski / Miękka / 2014 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). Used with an underlying block cipher algorithm that is approved in a Federal Information Processing Standard (FIPS), these modes can provide cryptographic protection for sensitive, but unclassified, computer data.
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebo...
|
cena:
56,61 |
![]() |
Computer Security Division 2010 Annual Report
ISBN: 9781493763399 / Angielski / Miękka / 2013 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year...
|
cena:
56,61 |
![]() |
Computer Security Division 2011 Annual Report
ISBN: 9781493763450 / Angielski / Miękka / 2013 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s Information Technology Laboratory (ITL), is to provide standards and technology that protects information systems against threats to the confidentiality, integrity, and availability of information and services. During Fiscal...
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annua...
|
cena:
56,61 |
![]() |
Creating a Patch and Vulnerability Management Program
ISBN: 9781494729035 / Angielski / Miękka / 2013 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The primary audience is security managers who are responsible for designing and implementing the program. However, this document also contains information useful to system administrators and operations personnel who are responsible for applying patches and deploying solutions (i.e., information related to testing patches and enterprise patching software).
This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The p...
|
cena:
56,61 |
![]() |
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
ISBN: 9781494458072 / Angielski / Miękka / 2013 / 84 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
Red Flags: Recognize and eliminate the risks in your RIA firm's Disaster Recovery, IT Compliance, and Cyber Security processes to
ISBN: 9781502405654 / Angielski / Miękka / 2014 / 102 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
Agile Information Security: Using Scrum to Survive in and Secure a Rapidly Changing Environment
ISBN: 9781511804240 / Angielski / Miękka / 2015 / 112 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
The Dark Side of the Hacking World: What You Need to Know to Guard Your Precious Assets and Remain Safe
ISBN: 9781522940685 / Angielski / Miękka / 2015 / 220 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
Landscape of Cybersecurity Threats and Forensic Inquiry
ISBN: 9781546217053 / Angielski / Miękka / 2017 / 218 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
Computer Networking Beginners Guide: An Easy Approach to Learning Wireless Technology, Social Engineering, Security and Hacking Network, Communication
ISBN: 9781707885442 / Angielski / Miękka / 2019 / 182 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
The Cybersecurity Handbook
ISBN: 9798395676276 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
Google Cloud Professional Cloud Security Engineer Exam Practice Questions & Dumps: Exam Study Guide for Professional Cloud Security Engineer Exam Prep
ISBN: 9798692232052 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
Shadows and Shields: The Journey of a Cybersecurity Visionary : New York Times Best Seller
ISBN: 9798300039165 / Angielski / Miękka / 2024 / 188 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
How to Safeguard Your Privacy from a Hidden Camera: Expert Tips and Techniques to Protect Yourself from Creeps, Camera, and Unwanted Intrusions
ISBN: 9798325690136 / Angielski / Miękka / 2024 / 94 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
The Data Breach: How Cybersecurity Threats and Privacy Risks Impact Millions of Mobile Line Customers and What You Need to Know to Protect Yourself
ISBN: 9798333021182 / Angielski / Miękka / 2024 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
Darknet: Expert Guide to Online Anonymity and Digital Secrecy
ISBN: 9798873772988 / Angielski / Miękka / 2024 / 118 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |