|
Using the Common Criteria for IT Security Evaluation
|
Debra S Herrmann |
Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, the Common Criteria (CC) for IT Security Evaluation is a relatively … |
OL15189943W |
|
Forbidden Code
|
Jon Erickson |
Dieses Buch beschreibt verschiedene Methoden, wie man in Computersysteme einbrechen kann. Es besteht hauptsächlich aus 3 Teilen: Programmierung (Buffer-Overflows, Format-Strings, ...), Netzwerke (Por… |
OL15712977W |
|
Intelligence and security informatics
|
Hsinchun Chen |
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings<br />Author: Hsinchun Chen, Reagan Moore, Da… |
OL16993316W |
|
Information security policies, procedures, and standards
|
Thomas R. Peltier |
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An ef… |
OL1978189W |
|
Firewalls for dummies
|
Brian Komar |
What an amazing world we live in! Almost anything you can imagine can be researched, compared, admired, studied, and in many cases, bought, with the click of a mouse. The Internet has changed our liv… |
OL2034593W |
|
Hacking Windows Vista
|
Steve Sinchak |
Vista is the most radical revamping of Windows since 1995. However, along with all the fantastic improvements, there are a couple of things that likely drive you up the wall. Don't worry, though—just… |
OL5757403W |
|
Security Engineering
|
Ross J. Anderson,Ross Anderson,Ross Anderson |
A guide to building dependable distributed systems.
The book is written by Ross Anderson, Professor of Computer Security at University of Cambridge.
It covers a wide range of distributed systems… |
OL8229364W |