Operating Systems category: 3874 books

Cover of Assuring Information Security
by Robert E. Davis
Language: English
Release Date: June 30, 2012

Information and associated technologies continue to advance toward diverse distributed configuration environments for entering, processing, storing, and retrieving data. The magnitude of changes occurring can be clearly seen in the explosion of linked IT infrastructures connected to cloud computing...
Cover of Advanced Persistent Threat

Advanced Persistent Threat

Understanding the Danger and How to Protect Your Organization

by Eric Cole
Language: English
Release Date: December 31, 2012

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent...
Cover of Information Security Handbook

Information Security Handbook

Develop a threat model and incident response strategy to build a strong information security framework

by Darren Death
Language: English
Release Date: December 8, 2017

Implement information security effectively as per your organization's needs. About This Book Learn to build your own information security framework, the best fit for your organization Build on the concepts of threat modeling, incidence response, and security analysis Practical use cases and best...
Cover of The CERT Guide to Insider Threats

The CERT Guide to Insider Threats

How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

by Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak
Language: English
Release Date: January 20, 2012

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...
Cover of System i Disaster Recovery Planning
by Richard Dolewski
Language: English
Release Date: March 1, 2012

Mapping out all the preparations necessary for an effective disaster recovery plan and its safeguard-a continuous maintenance program-this guide is aimed at IT managers of small and medium businesses. The opening section covers the initial steps of auditing vulnerability, ranking essential IT functions,...
Cover of Computer Security Basics

Computer Security Basics

Computer Security

by Rick Lehtinen, G.T. Gangemi Sr.
Language: English
Release Date: September 20, 2011

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original...
Cover of Official (ISC)2 Guide to the CISSP CBK
by
Language: English
Release Date: April 8, 2015

As a result of a rigorous, methodical process that (ISC)� follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)� conducts this process on a regular basis to ensure that the examinations and
Cover of Beautiful Security

Beautiful Security

Leading Security Experts Explain How They Think

by Andy Oram, John Viega
Language: English
Release Date: April 17, 2009

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and...
Cover of Digital Identity

Digital Identity

Unmasking Identity Management Architecture (IMA)

by Phillip J. Windley
Language: English
Release Date: August 1, 2005

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks....
Cover of Identity Management: A Business Perspective
by Graham Williamson
Language: English
Release Date: February 27, 2017

For business managers and CIOs, managing identity data of employees, contractors, business partners, and customers has become an important core capability. This practical guide discusses the impacts of identity management on organizations from a businessperson's perspective. This book will help managers...
Cover of Official (ISC)2® Guide to the ISSAP® CBK
by
Language: English
Release Date: January 6, 2017

Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture. Supplying an authoritative review...
Cover of Computer Forensics InfoSec Pro Guide
by David Cowen
Language: English
Release Date: April 19, 2013

Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional,...
Cover of Network and System Security
by
Language: English
Release Date: August 26, 2013

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the...
Cover of Network Intrusion Analysis

Network Intrusion Analysis

Methodologies, Tools, and Techniques for Incident Analysis and Response

by Joe Fichera, Steven Bolt
Language: English
Release Date: December 17, 2012

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a thorough and systematic analysis and investigation...
First 59 60 61 62 63 64 6566 67 68 69 70 71 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy