
ilość książek w kategorii: 5049
![]() |
String Searching Algorithms
ISBN: 9789810218294 / Angielski Termin realizacji zamówienia: ok. 30 dni roboczych. String searching is a subject of both theoretical and practical interest in computer science. This book presents a bibliographic overview of the field and an anthology of detailed descriptions of the principal algorithms available. The aim is twofold: on the one hand, to provide an easy-to-read comparison of the available techniques in each area, and on the other, to furnish the reader with a reference of in-depth descriptions of the major algorithms. Topics covered include methods for finding exact and approximate string matches, calculating "edit" distances between strings, finding common...
String searching is a subject of both theoretical and practical interest in computer science. This book presents a bibliographic overview of the field...
|
cena:
292,50 |
![]() |
Security Careers
ISBN: 9780128001042 / Angielski / Miękka / 2014 / 224 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, and ethics occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushee Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a thorough... The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance,... |
cena:
342,03 |
![]() |
Cyber Crime Protection for Beginners: The Battle Against Cyber Crime in the 21st Century
ISBN: 9781484874066 / Angielski / Miękka / 2013 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The widespread use of information and communication technology (ICT) has created a global platform for the exchange of ideas. It has also created boundless opportunities for fraud and deception. Cyber crime is one of the most widespread criminal practices around the globe, whether in the form of violation of company policies, fraud, crime, child pornography, or terrorism. It is therefore paramount that organisations, industries, and individuals raise their game to combat these threats. This is an issue of global importance as researchers, government officials, company executives and law...
The widespread use of information and communication technology (ICT) has created a global platform for the exchange of ideas. It has also created boun...
|
cena:
32,59 |
![]() |
Assessment of Access Control Systems
ISBN: 9781493756292 / Angielski / Miękka / 2013 / 72 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple password mechanism, but many require more sophisticated and complex control. In addition to the authentication mechanism (such as a password), access control is concerned with how authorizations are structured. In some cases, authorization may mirror the structure of the organization, while in others it may be based on the sensitivity level of various...
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense in...
|
cena:
57,07 |
![]() |
A Framework for Designing Cryptographic Key Management Systems
ISBN: 9781494446055 / Angielski / Miękka / 2013 / 128 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that need to be addressed by the design specification. Thus, any CKMS that addresses each of these requirements would have a design specification that is compliant with this Framework
This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing ...
|
cena:
61,15 |
![]() |
Border Gateway Protocol Security
ISBN: 9781494469733 / Angielski / Miękka / 2013 / 64 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers. While a number of enhanced protocols for BGP have been proposed, these generally require substantial changes to the protocol and may not interoperate with current BGP implementations. To improve the security of BGP routers, the recommendations listed below are introduced. While the recommendations can contribute to...
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can hel...
|
cena:
57,07 |
![]() |
Computer Security Incident Handling Guide
ISBN: 9781494726379 / Angielski / Miękka / 2013 / 94 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not only more numerous and diverse but also more damaging and disruptive. An incident response capability is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring computing services. This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. Topics covered include...
Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not...
|
cena:
57,07 |
![]() |
Guide to IPsec VPNs: Recommendations of the National Institute of Standards and Technology
ISBN: 9781494951924 / Angielski / Miękka / 2005 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This publication seeks to assist organizations in mitigating the risks associated with the transmission of sensitive information across networks by providing practical guidance on implementing security services based on Internet Protocol Security (IPsec).
This publication seeks to assist organizations in mitigating the risks associated with the transmission of sensitive information across networks by pr...
|
cena:
55,85 |
![]() |
Proceedings of Defining the State of the Art in Software Security Tools Workshop
ISBN: 9781494952136 / Angielski / Miękka / 2005 / 116 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is the proceeding of the workshop on Defining the State of the Art in Software Security Tools held on August 10 and 11, 2005. It was hosted by the Software Diagnostics and Conformance Testing Division, Information Technology Laboratory, at the National Institute of Standards and Technology (NIST) in Gaithersburg, MD, USA.
This is the proceeding of the workshop on Defining the State of the Art in Software Security Tools held on August 10 and 11, 2005. It was hosted by th...
|
cena:
69,31 |
![]() |
Creating a Patch and Vulnerability Management Program: Recommendations of the National Institute of Standards and Technology (NIST)
ISBN: 9781494952259 / Angielski / Miękka / 2005 / 76 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This publication is designed to assist organizations in implementing security patch and vulnerability remediation programs. It focuses on how to create an organizational process and test the effectiveness of the process. It also seeks to inform the reader about the technical solutions that are available for vulnerability remediation.
This publication is designed to assist organizations in implementing security patch and vulnerability remediation programs. It focuses on how to creat...
|
cena:
39,77 |
![]() |
Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and Technology
ISBN: 9781494952365 / Angielski / Miękka / 2005 / 100 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This publication is intended to help organizations understand the threats posed by malware and mitigate the risks associated with malware incidents. In addition to providing background information on the major categories of malware, it provides practical, real-world guidance on preventing malware incidents and responding to malware incidents in an effective, efficient manner.
This publication is intended to help organizations understand the threats posed by malware and mitigate the risks associated with malware incidents. I...
|
cena:
73,38 |
![]() |
Recommendation for Block Cipher Modes of Operation Methods and Techniques
ISBN: 9781495211041 / Angielski / Miękka / 2014 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). Used with an underlying block cipher algorithm that is approved in a Federal Information Processing Standard (FIPS), these modes can provide cryptographic protection for sensitive, but unclassified, computer data.
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebo...
|
cena:
57,07 |
![]() |
Introduction to Public Key Technology and the Federal PKI Infrastructure
ISBN: 9781495211331 / Angielski / Miękka / 2014 / 60 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency. It is intended to provide an overview of PKI functions and their applications. Additional documentation will be required to fully analyze the costs and benefits of PKI systems for agency use, and to develop plans for their implementation. This document provides a starting point and references to more comprehensive publications.
This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be d...
|
cena:
48,91 |
![]() |
Computer Security: Bibliography Of Selected Computer Security Publications January 1980-October 1989
ISBN: 9781495242595 / Angielski / Miękka / 2014 / 218 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an article had to be substantial in content and have been published in professional or technical journals, magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. English language articles from foreign journals were included as available. The citations are listed under nine categories. A tenth category of pre-1980 publications is also provided, as well as an appendix containing addresses of...
This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an a...
|
cena:
61,15 |
![]() |
Disaster Recovery and Business Continuity
ISBN: 9781849285384 / Angielski / Miękka / 2014 / 294 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Establish a disaster recovery plan and minimise the risks to your business.
Establish a disaster recovery plan and minimise the risks to your business.
|
cena:
203,92 |
![]() |
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
ISBN: 9780071823074 / Angielski / Miękka / 2016 / 384 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion... Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve ... |
cena:
283,61 |
![]() |
Computer Security Division 2010 Annual Report
ISBN: 9781493763399 / Angielski / Miękka / 2013 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year...
|
cena:
57,07 |
![]() |
Computer Security Division 2011 Annual Report
ISBN: 9781493763450 / Angielski / Miękka / 2013 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s Information Technology Laboratory (ITL), is to provide standards and technology that protects information systems against threats to the confidentiality, integrity, and availability of information and services. During Fiscal...
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annua...
|
cena:
57,07 |
![]() |
Creating a Patch and Vulnerability Management Program
ISBN: 9781494729035 / Angielski / Miękka / 2013 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The primary audience is security managers who are responsible for designing and implementing the program. However, this document also contains information useful to system administrators and operations personnel who are responsible for applying patches and deploying solutions (i.e., information related to testing patches and enterprise patching software).
This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The p...
|
cena:
57,07 |
![]() |
The New York City Police Department: The Impact of Its Policies and Practices
ISBN: 9781466575844 / Angielski / Miękka / 2014 / 230 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Studying the flagship New York City Police Department is critical to understanding policing and democratic society. An examination of the department by experts who have been studying it for years, The New York City Police Department: The Impact of Its Policies and Practices provides a frank and open discussion about the NYPD from an elite group of scholars with varying viewpoints and concerns. The authors in this book are uniquely qualified to discuss and analyze the intricacies of policies and their impact. Researchers working the streets of Brooklyn expose... Studying the flagship New York City Police Department is critical to understanding policing and democratic society. An examination of the departmen... |
cena:
470,93 |