-
Access Control and Identity Management, 3rd Edition
Author Mike Chapple
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact acc....
Release Date 2020/10 -
Authentication and Access Control: Practical Cryptography Methods and Tools
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked.This book begins with the theoretical background of cryptography and the foundations of authentica.... -
Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the im.... -
Author Ric Messier
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Manage your own robust, inexpensive cybersecurity testing environment Thi....
Release Date 2020/02 -
Author Bruce Wimmer , CPP
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and....
Release Date 2015/03 -
Cathodic Corrosion Protection Systems
Author Alireza Bahadori
Corrosion is a naturally occurring cost, worth billions in the oil and gas sector. New regulations, stiffer penalties for non-compliance and aging assets are all leading companies to develop new technology, procedures and bigger budgets catering to one prevailing me....
Release Date 2014/07 -
Consumer Protection in E-Retailing in ASEAN
This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef.... -
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
Author Ted G. Lewis
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)"The book is written as a student t....
Release Date 2014/11 -
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
Cyber resilience - Defence-in-depth principles
Author Alan Calder
This book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project.
Release Date 2023/08 -
Cyber Security Engineering: A Practical Approach for Systems and Software Assurance
Author Carol C. Woody , Nancy R. Mead
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensi....
Release Date 2016/10 -
Data Protection and Compliance in Context
Author Stewart Room
This comprehensive accessible guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to construct a platform on which to build internal compliance strategies. The author is chair of the Nat....
Release Date 2006/11 -
Data Protection and Information Lifecycle Management
Author Tom Petrocelli
The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and prote....
Release Date 2005/09 -
Data Protection and the Cloud: Are the risks too great?
Author Paul Ticher
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA’s eight principles could lead to ....
Release Date 2015/02 -
Data Protection vs. Freedom of Information
Author Paul Ticher
How would you respond to a freedom of information request, whilst ensuring compliance with the Data Protection Act?Get clear and practical guidance on this key data governance issue!Freedom of information is often mentioned in the same breath as data protection. In ....
Release Date 2008/11 -
Author Amanda Berlin , Lee Brotherston
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to ....
Release Date 2017/04 -
Developing the Next Generation of Enterprise Leaders
Author M. Ellen Peebles , Douglas Ready
A survey of top business executives from major international organizations found that 79% said it was extremely important to have leaders who act on behalf of the entire organization, not just their units. The rest said it was very important. Nearly 65% said they e....
Release Date 2015/10 -
Author Ulrich Hertrampf , Gerhard Rosenberger , Manfred Kufleitner , Volker Diekert
The idea behind this book is to provide the mathematical foundations for assessing modern developments in the Information Age. It deepens and complements the basic concepts, but it also considers instructive and more advanced topics. The treatise starts with a gene....
Release Date 2016/05 -
E-Mail Virus Protection Handbook
Author Syngress
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to profession....
Release Date 2000/11 -
Enterprise Security Architecture
Author Nicholas A Sherwood
Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software—it requires a fr....
Release Date 2015/09 -
Environment Modeling-Based Requirements Engineering for Software Intensive Systems
Author Zhi Jin
Environment Modeling-Based Requirements Engineering for Software Intensive Systems provides a new and promising approach for engineering the requirements of software-intensive systems, presenting a systematic, promising approach to identifying, clarifying, modeling....
Release Date 2018/04 -
Express Learning: Cryptography and Network Security
Author ITL Education Solutions Limited
Express Learning is a series of books designed as quick reference guides to important undergraduate computer courses. The organized and accessible format of these books allows students to learn important concepts in an easy-to-understand, question-and-answer format.....
Release Date 2012/01 -
Fixing an Insecure Software Life Cycle
Author April C. Wright
In the race to remain competitive, development teams in many companies are under tremendous pressure to create software on tight deadlines. And in most cases, that means dealing with security bugs only after software is released. But offensive testing and incident ....
Release Date 2018/05 -
Free as in Freedom [Paperback]
Author Sam Williams
Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a drivi....
Release Date 2002/03 -
Freedom to Change: Four Strategies to Put Your Inner Drive into Overdrive
Author Michael Fullan
Break free to make real change for yourself and othersHave you ever felt like your progress was being blocked, not just by your own circumstances, but by the presence and actions of others? Freedom to Change releases you from the trap of constantly telling yourself....
Release Date 2015/06 -
Getting Started with z/OS Data Set Encryption
Author Andy Coulson Bill White Jacky Doll , Brad Habbershaw , Cecilia Carranza Lewis , Tho
AbstractThis IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/O....
Release Date 2018/06 -
Getting Started with z/OS Data Set Encryption
Author Bill White , Cecilia Carranza Lewis , Eysha Shirrine Powers , David Rossi , Eric Ros
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.....
Release Date 2021/12 -
Author Babak Akhgar , Colin Pattinson , Mohammad Dastbaz
We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates t....
Release Date 2015/03