
ilość książek w kategorii: 5081
![]() |
Computer Security Incident Handling Guide
ISBN: 9781494726379 / Angielski / Miękka / 2013 / 94 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not only more numerous and diverse but also more damaging and disruptive. An incident response capability is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring computing services. This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. Topics covered include...
Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not...
|
cena:
55,68 |
![]() |
Recommendation for Block Cipher Modes of Operation Methods and Techniques
ISBN: 9781495211041 / Angielski / Miękka / 2014 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). Used with an underlying block cipher algorithm that is approved in a Federal Information Processing Standard (FIPS), these modes can provide cryptographic protection for sensitive, but unclassified, computer data.
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebo...
|
cena:
55,68 |
![]() |
Computer Security Division 2010 Annual Report
ISBN: 9781493763399 / Angielski / Miękka / 2013 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year...
|
cena:
55,68 |
![]() |
Computer Security Division 2011 Annual Report
ISBN: 9781493763450 / Angielski / Miękka / 2013 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s Information Technology Laboratory (ITL), is to provide standards and technology that protects information systems against threats to the confidentiality, integrity, and availability of information and services. During Fiscal...
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annua...
|
cena:
55,68 |
![]() |
Creating a Patch and Vulnerability Management Program
ISBN: 9781494729035 / Angielski / Miękka / 2013 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The primary audience is security managers who are responsible for designing and implementing the program. However, this document also contains information useful to system administrators and operations personnel who are responsible for applying patches and deploying solutions (i.e., information related to testing patches and enterprise patching software).
This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The p...
|
cena:
55,68 |
![]() |
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
ISBN: 9781494458072 / Angielski / Miękka / 2013 / 84 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Red Flags: Recognize and eliminate the risks in your RIA firm's Disaster Recovery, IT Compliance, and Cyber Security processes to
ISBN: 9781502405654 / Angielski / Miękka / 2014 / 102 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
The Dark Side of the Hacking World: What You Need to Know to Guard Your Precious Assets and Remain Safe
ISBN: 9781522940685 / Angielski / Miękka / 2015 / 220 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Landscape of Cybersecurity Threats and Forensic Inquiry
ISBN: 9781546217053 / Angielski / Miękka / 2017 / 218 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Computer Networking Beginners Guide: An Easy Approach to Learning Wireless Technology, Social Engineering, Security and Hacking Network, Communication
ISBN: 9781707885442 / Angielski / Miękka / 2019 / 182 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
The Cybersecurity Handbook
ISBN: 9798395676276 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Google Cloud Professional Cloud Security Engineer Exam Practice Questions & Dumps: Exam Study Guide for Professional Cloud Security Engineer Exam Prep
ISBN: 9798692232052 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Shadows and Shields: The Journey of a Cybersecurity Visionary : New York Times Best Seller
ISBN: 9798300039165 / Angielski / Miękka / 2024 / 188 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
How to Safeguard Your Privacy from a Hidden Camera: Expert Tips and Techniques to Protect Yourself from Creeps, Camera, and Unwanted Intrusions
ISBN: 9798325690136 / Angielski / Miękka / 2024 / 94 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
The Data Breach: How Cybersecurity Threats and Privacy Risks Impact Millions of Mobile Line Customers and What You Need to Know to Protect Yourself
ISBN: 9798333021182 / Angielski / Miękka / 2024 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Darknet: Expert Guide to Online Anonymity and Digital Secrecy
ISBN: 9798873772988 / Angielski / Miękka / 2024 / 118 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Digital Defense Essential: A Beginner's Guide to Cybersecurity and Ethical Hacking Careers
ISBN: 9798882824333 / Angielski / Miękka / 2024 / 214 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Cyber Fortress: Building Robust Defenses for Digital Realms: "Cyber Fortress: Empowering Your Digital Defense Strategy with Robust Cybersecurity Measures"
ISBN: 9798871140574 / Angielski / Miękka / 2023 / 382 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,72 |
![]() |
Decrypting the Threat Landscape: A Comprehensive Guide to Cybersecurity: Unraveling the Digital Enigma: A Deep Dive into Cybersecurity Strategies for Decoding and Neutralizing Emerging Threats
ISBN: 9798871951026 / Angielski / Miękka / 2023 / 318 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,72 |
![]() |
Hacker's Playbook: Unraveling the Tactics Behind Cyber Attacks: "Investigate the Intricacies of Cyber Warfare: Decoding the Strategies Employed in Hacker's Playbook"
ISBN: 9798872840725 / Angielski / Miękka / 2023 / 322 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,72 |