![]() |
The It Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments
ISBN: 9781597492669 / Angielski / Miękka / 715 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to...
|
cena:
262,70 |
![]() |
Malware Forensics: Investigating and Analyzing Malicious Code
ISBN: 9781597492683 / Angielski / Miękka / 674 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence... Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Writte... |
cena:
272,62 |
![]() |
It Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
ISBN: 9781420086171 / Angielski / Twarda / 305 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board s audit committee and CEO. Written as a contribution to the accounting and auditing professions as well as to IT practitioners, IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement links these two key business strategies and explains how to perform IT auditing in a comprehensive and strategic... Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practi... |
cena:
669,27 |
![]() |
Coastal Lagoons: Critical Habitats of Environmental Change
ISBN: 9781420088304 / Angielski / Twarda / 568 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agricultural, and urban waste, overuse from fisheries, aquaculture, transportation, energy production, and other human activities. The features that make coastal lagoons vital ecosystems underline the importance of sound management strategies for long-term environmental and resource sustainability. Written by an internationally renowned group of contributors, Coastal Lagoons: Critical Habitats of Environmental Change examines the... Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agric... |
cena:
1090,67 |
![]() |
Securing Citrix Xenapp Server in the Enterprise
ISBN: 9781597492812 / Angielski / Miękka / 739 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious...
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and ...
|
cena:
230,53 |
![]() |
Next Generation Ssh2 Implementation: Securing Data in Motion
ISBN: 9781597492836 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new...
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal informat...
|
cena:
173,47 |
![]() |
Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations
ISBN: 9781498723183 / Angielski / Twarda / 584 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and... The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of h... |
cena:
570,12 |
![]() |
New Trends in Cryptographic Systems
ISBN: 9781594549779 / Angielski / Twarda / 135 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that its content can only be disclosed to some qualified persons. This book includes content that is focused on
Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that ...
|
cena:
1145,15 |
![]() |
Security in the Private Cloud
ISBN: 9781482259551 / Angielski / Twarda / 381 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This comprehensive handbook serves as a professional reference and practitioner s guide to today s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy. "This comprehensive handbook serves as a professional reference and practitioner s guide to today s most complete and concise view of private cloud ... |
cena:
718,85 |
![]() |
Information Assurance Architecture
ISBN: 9780849380679 / Angielski / Twarda / 620 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow.
Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel d...
|
cena:
694,06 |
![]() |
Information Security Applications: 8th International Workshop, WISA 2007 Jeju Island, Korea, August 27-29, 2007 Revised Selected Papers
ISBN: 9783540775348 / Angielski / Miękka / 406 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27 29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We...
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27 29, 2007. The workshop...
|
cena:
203,13 |
![]() |
E-Voting and Identity: First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers
ISBN: 9783540774921 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the Future of Identity in the Information Society, when Ammar Alkassarproposedanalyzethetechnical, socio-ethicalandlegalrelationsbetween Identity and...
Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable iden...
|
cena:
203,13 |
![]() |
Policies and Research in Identity Management: First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Era
ISBN: 9780387779959 / Angielski / Twarda / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community...
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase ...
|
cena:
203,13 |
![]() |
Wireless Security: Know It All
ISBN: 9781856175296 / Angielski / Miękka / 726 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks. - A 360-degree view from our best-selling authors
-... The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first ...
|
cena:
282,53 |
![]() |
Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
ISBN: 9780470193396 / Angielski / Twarda / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format.
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the...
|
cena:
578,99 |
![]() |
Guide to Biometric Reference Systems and Performance Evaluation
ISBN: 9781848002913 / Angielski / Twarda / 382 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the pioneering studies of Galton and Henry on ?ngerprint-based human id- ti?cation over a hundred years ago, biometrics recognition is now permeating many sectors of our society. Even though the origins and the most frequent use of b- metrics, primarily ?ngerprints, have been in forensics and law enforcement app- cations, biometric recognition is now needed to address a number of societal pr- lems related to security risks, terror threats and ?nancial fraud. In some situations, for example, detecting duplicate enrolments (for issuing of?cial documents such as passports and driver...
With the pioneering studies of Galton and Henry on ?ngerprint-based human id- ti?cation over a hundred years ago, biometrics recognition is now permea...
|
cena:
406,31 |
![]() |
Geospatial Information Technology for Emergency Response
ISBN: 9780415422475 / Angielski / Twarda / 381 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When disaster occurs, the response phrase is viewed as the most critical in terms of saving lives and protecting property. This book aims to share technological advances that allow wider, faster and better utilization of geospatial information in emergency response situations. When disaster occurs, the response phrase is viewed as the most critical in terms of saving lives and protecting property. This book aims to share ... |
cena:
1313,76 |
![]() |
Securing Computer Networks: Anaysis Design and Implementation
ISBN: 9780849318689 / Angielski / Twarda / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns regarding network security. It contains new chapters on World Wide Web security issues, secure electronic commerce, incident response, as well as two new appendices on PGP and UNIX security fundamentals.
This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the author...
|
cena:
208,17 |
![]() |
Open Source Systems Security Certification
ISBN: 9780387773230 / Angielski / Twarda / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Open Source Advances in Computer Applications book series provides timely technological and business information for: Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies; Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems; Ensuring integrated systems,... Open Source Advances in Computer Applications book series provides timely technological and business information for: ... |
cena:
406,31 |
![]() |
Information Security
ISBN: 9780470131183 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Growing Imperative Need for Effective Information Security Governance
With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that... The Growing Imperative Need for Effective Information Security Governance
With monotonous regularity, headlines announce ever more spectacular fail... |
cena:
448,53 |