A Practical Guide to Security Engineering and Information Assurance
ISBN: 9780849311635 / Angielski / Twarda / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to...
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions ...
|
|
cena:
626,03 zł |
Securing Windows Nt/2000: From Policies to Firewalls
ISBN: 9780849312618 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.
The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The... In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large cor...
|
|
cena:
495,56 zł |
Building a Global Information Assurance Program
ISBN: 9780849313684 / Angielski / Miękka / 424 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised....
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often ...
|
|
cena:
547,77 zł |
Using the Common Criteria for IT Security Evaluation
ISBN: 9780849314049 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastructure systems. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. Because the Common Criteria (CC) for IT Security Evaluation is a relatively new...
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology i...
|
|
cena:
599,95 zł |
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
ISBN: 9780849315497 / Angielski / Twarda / 424 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.
In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight... Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security...
|
|
cena:
626,03 zł |
The Ethical Hack: A Framework for Business Value Penetration Testing
ISBN: 9780849316098 / Angielski / Twarda / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.The Ethical Hack: A Framework for Business Value...
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered f...
|
|
cena:
626,03 zł |
Network Perimeter Security: Building Defense In-Depth
ISBN: 9780849316289 / Angielski / Twarda / 420 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time...
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-t...
|
|
cena:
626,03 zł |
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition
ISBN: 9780849319587 / Angielski / Twarda / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives...
Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the ef...
|
|
cena:
626,03 zł |
Strategic Information Security
ISBN: 9780849320415 / Angielski / Twarda / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations.Strategic Information Security integrates the importance of sound security policy with the strategic goals of an...
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain t...
|
|
cena:
495,56 zł |
Surviving Security: How to Integrate People, Process, and Technology
ISBN: 9780849320422 / Angielski / Twarda / 528 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security...
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be t...
|
|
cena:
626,03 zł |
Database and Applications Security: Integrating Information Security and Data Management
ISBN: 9780849322242 / Angielski / Twarda / 656 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing.
Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and... This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provide...
|
|
cena:
626,03 zł |
Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks
ISBN: 9780849322723 / Angielski / Twarda / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that can be used to create systems that overcome security attacks through adaptation as opposed to the earlier fortress mentality, and provides instruction on creating disruptive applications that are much more secure than in the past. The book provides a fundamental understanding of design principles, and provides a model explaining mobile code and the methods that can be used to design secure robust peer-to-peer networks. Also included are recent...
This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that...
|
|
cena:
756,45 zł |
Investigator's Guide to Steganography
ISBN: 9780849324338 / Angielski / Twarda / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography began and evolved from ancient times. It also looks at the workings of digital steganography and watermarking methods and tools on the Internet.
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography bega...
|
|
cena:
495,56 zł |
Audit and Trace Log Management: Consolidation and Analysis
ISBN: 9780849327254 / Angielski / Twarda / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As regulation and legislation evolve, the critical need for cost-effective and efficient IT audit and monitoring solutions will continue to grow. Audit and Trace Log Management: Consolidation and Analysis offers a comprehensive introduction and explanation of requirements and problem definition, and also delivers a multidimensional solution set with broad applicability across a wide range of organizations.
Itprovidesa wealth of information in the form of processwalkthroughs. These include problem determination, requirements gathering, scope definition, risk assessment, compliance... As regulation and legislation evolve, the critical need for cost-effective and efficient IT audit and monitoring solutions will continue to grow. A...
|
|
cena:
521,69 zł |
Multimedia Security Handbook
ISBN: 9780849327735 / Angielski / Twarda / 832 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications.
Comprinsing 26 chapters, the Handbook begins by introducing security fundamentals and discussing the... Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from pi...
|
|
cena:
1069,47 zł |
Curing the Patch Management Headache
ISBN: 9780849328541 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network infrastructure. Until now, there were no technical books for companies to use as a starting point for deploying the process. Curing the Patch Management Headache responds to this demand by tying together all aspects of the subject into one easy-to-understand format that is applicable regardless of the operating...
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining th...
|
|
cena:
599,95 zł |
Network Security Technologies
ISBN: 9780849330278 / Angielski / Twarda / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities,...
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables unde...
|
|
cena:
547,77 zł |
Enhancing Computer Security with Smart Technology
ISBN: 9780849330452 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals.
Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security. A collection of tutorials that draw from a broad spectrum of viewpoints and... Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a mac...
|
|
cena:
782,54 zł |
Wireless Crime and Forensic Investigation
ISBN: 9780849331886 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem.
From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and... Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining ac...
|
|
cena:
495,56 zł |
The Handbook of Physical Security System Testing
ISBN: 9780849331893 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the past decade the security industry has had difficulty keeping up with technological advances and security needs. The Handbook of Physical Security System Testing is the authoritative and definitive book on every phase of test planning and execution. The book defines the best practices that apply from start to finish and contains test planning and management checklists, test documentation templates, and example test plan material. This handbook explains the roles of testing, shows its many significant benefits, and establishes a baseline of best practices for physical security testing... In the past decade the security industry has had difficulty keeping up with technological advances and security needs. The Handbook of Physical Sec... |
|
cena:
274,52 zł |