Books

20+ results found
Title Authors Description OpenBook ID
Payment card industry data security standard handbook Payment card industry data security standard handbook Timothy M. Virtue Clearly written and easy to use, Payment Card Industry Data Security Standard Handbook is your single source along the journey to compliance with the Payment Card Industry Data Security Standard (PCI… OL11962965W
Next generation SSH2 implementation Next generation SSH2 implementation Dale Liu The most up-to-date information on the next generation of SSH2 and how to incorporate it into your organization's security environment New security risks, continuously evolving regulation and increas… OL13614374W
Assessing and managing security risk in IT systems Assessing and managing security risk in IT systems John McCumber Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… OL13638173W
Engineering information security Engineering information security Stuart Jacobs "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed … OL15455552W
Information communication technology law, protection, and access rights Information communication technology law, protection, and access rights Irene Maria Portela "This book identifies key issues in the relationship between ICT and law, ethics, politics and social policy, drawing attention to diverse global approaches to the challenges posed by ICT to access r… OL15508218W
Derecho y Redes sociales Derecho y Redes sociales Miquel Peguera Poch,Mónica Arenas Ramiro,Artemi Rallo Lombarte,Megias Terol, Javier,Ricard Martínez Martínez,Ignacio Alamillo Domingo,Natalia Martos Díaz,María Belén Cardona Rubert,Mònica Vilasau Solana. Puede afirmarse sin temor al error que ha nacido una sociedad que se desarrolla íntegramente en el mundo virtual. En ella, los individuos interactúan siguiendo en muchas ocasiones normas y pautas de … OL15598109W
Data protection for virtual data centers Data protection for virtual data centers Jason Buffington "Essential information on how to protect data in virtual environments! Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This un… OL16917725W
Hacking exposed computer forensics Hacking exposed computer forensics Aaron Philipp Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You'll get expert information on crucial proc… OL16922568W
Access control in data management systems Access control in data management systems Elena Ferrari Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly cr… OL16966823W
Android Malware Android Malware Xuxian Jiang Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pa… OL19826571W
Counterterrorism and Cybersecurity Counterterrorism and Cybersecurity Newton Lee Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. coun… OL19838272W
Cryptology and Network Security Cryptology and Network Security Josef Pieprzyk This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full pa… OL19838861W
Data Privacy Management and Autonomous Spontaneous Security Data Privacy Management and Autonomous Spontaneous Security Roberto Pietro This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Wor… OL19840128W
Distributed Computing and Internet Technology Distributed Computing and Internet Technology Chittaranjan Hota This book constitutes the refereed proceedings of the 9th International Conference on Distributed Computing and Internet Technology, ICDCIT 2013, held in Bhubaneswar, India, in February 2013. <br>The… OL19843736W
Information and Communicatiaon Technology Information and Communicatiaon Technology Khabib Mustofa This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track o… OL19857433W
Information Security Practice and Experience Information Security Practice and Experience Robert H. Deng This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised ful… OL19857516W
Protocols for Authentication and Key Establishment Protocols for Authentication and Key Establishment Colin Boyd Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities o… OL19897610W
Research Directions in Data and Applications Security Research Directions in Data and Applications Security Ehud Gudes Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems an… OL19899673W
Transactions on Computational Science XVII Transactions on Computational Science XVII Marina L. Gavrilova The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innova… OL19907670W
They know everything about you They know everything about you Robert Scheer "In the first week of June 2013, the American people discovered that for a decade, they had abjectly traded their individual privacy for the chimera of national security. The revelation that the fede… OL19994558W
Next page