-
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
Keycloak - Identity and Access Management for Modern Applications
Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applicationsKey FeaturesGet up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examplesConfigure, manage, and extend Ke.... -
Data Protection vs. Freedom of Information
Author Paul Ticher
How would you respond to a freedom of information request, whilst ensuring compliance with the Data Protection Act?Get clear and practical guidance on this key data governance issue!Freedom of information is often mentioned in the same breath as data protection. In ....
Release Date 2008/11 -
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud
Author Lee Newcombe
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud Every Cloud should have a secure lining Cloud Computing represents a major change to the IT services landscape. Cloud services, such as SalesForce, Amazon Web Services® and Microsoft....
Release Date 2012/07 -
Data Protection and the Cloud: Are the risks too great?
Author Paul Ticher
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA’s eight principles could lead to ....
Release Date 2015/02 -
Author Toomas Viira
"I loved the quotes at the beginning of each chapter – very interesting and thought-provoking. I also enjoyed the author’s style and his technical expertise shone through," Christopher Wright, Wright CandA Consulting Ltd. Protecting critical information infra....
Release Date 2018/01 -
Data Protection and Compliance in Context
Author Stewart Room
This comprehensive accessible guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to construct a platform on which to build internal compliance strategies. The author is chair of the Nat....
Release Date 2006/11 -
E-Mail Virus Protection Handbook
Author Syngress
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to profession....
Release Date 2000/11 -
Author Chris C. Ducker
Entrepreneurs often suffer from superhero syndromethe misconception that to be successful, they must do everything themselves. Not only are they the boss, but also the salesperson, HR manager, copywriter, operations manager, online marketing guru, and so much more. ....
Release Date 2014/04 -
Consumer Protection in E-Retailing in ASEAN
This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef.... -
Author Ulrich Hertrampf , Gerhard Rosenberger , Manfred Kufleitner , Volker Diekert
The idea behind this book is to provide the mathematical foundations for assessing modern developments in the Information Age. It deepens and complements the basic concepts, but it also considers instructive and more advanced topics. The treatise starts with a gene....
Release Date 2016/05 -
Author Tsinghua University Tsinghua University Press , Dengguo Feng
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such ....
Release Date 2017/12 -
Express Learning: Cryptography and Network Security
Author ITL Education Solutions Limited
Express Learning is a series of books designed as quick reference guides to important undergraduate computer courses. The organized and accessible format of these books allows students to learn important concepts in an easy-to-understand, question-and-answer format.....
Release Date 2012/01