-
Intelligent Security Management and Control in the IoT
Author Mohamed-Aymen Chalouf
The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and security problems. This relates to important challenges such as the control of radio communications....
Release Date 2022/06 -
Author Frank Rubin
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: ....
Release Date 2022/08 -
Wireless Security Architecture
Author Jennifer Minella , Stephen Orr
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutionsWireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrast....
Release Date 2022/04 -
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
Protecting Your Company's Intellectual Property
Author Deborah E. Bouchoux
A company’s most valuable assets may not be physical. This book shows how to protect them without fences or security guards! You can’t touch it or feel it. Sometimes you can’t even see it. Yet, intellectual property continues to soar in value, comprising an increas....
Release Date 2006/02 -
Consumer Protection in E-Retailing in ASEAN
This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef.... -
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
Author Ted G. Lewis
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)"The book is written as a student t....
Release Date 2014/11 -
Authentication and Access Control: Practical Cryptography Methods and Tools
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked.This book begins with the theoretical background of cryptography and the foundations of authentica.... -
The Scientification of Religion
Author Kocku von Stuckrad
The enigmatic relation between religion and science still presents a challenge to European societies and to ideas about what it means to be ‘modern.’ This book argues that European secularism, rather than pushing back religious truth claims, in fact has been religi....
Release Date 2014/05 -
Data Protection and Information Lifecycle Management
Author Tom Petrocelli
The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and prote....
Release Date 2005/09 -
Selecting the Right NAP Architecture
Author Microsoft , Inc.
The objective of this guide is to provide a consistent structure for addressing the decisions and activities most critical to the successful implementation of the Microsoft® Network Access Protection (NAP) infrastructure. This guide includes several specific questio....
Release Date 2008/05 -
Author Deborah E. Bouchoux
You can't touch it or feel it. Sometimes you can't even see it. Yet, intellectual property continues to soar in value, comprising an increasingly greater portion of a typical company's assets. In the age of instant global communication, understanding what intelle....
Release Date 2001/04 -
Free as in Freedom [Paperback]
Author Sam Williams
Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a drivi....
Release Date 2002/03 -
Author Chris C. Ducker
Entrepreneurs often suffer from superhero syndromethe misconception that to be successful, they must do everything themselves. Not only are they the boss, but also the salesperson, HR manager, copywriter, operations manager, online marketing guru, and so much more. ....
Release Date 2014/04 -
Fixing an Insecure Software Life Cycle
Author April C. Wright
In the race to remain competitive, development teams in many companies are under tremendous pressure to create software on tight deadlines. And in most cases, that means dealing with security bugs only after software is released. But offensive testing and incident ....
Release Date 2018/05 -
Author Paul Groth , Luc Moreau
The World Wide Web is now deeply intertwined with our lives, and has become a catalyst for a data deluge, making vast amounts of data available online, at a click of a button. With Web 2.0, users are no longer passive consumers, but active publishers and curators of....
Release Date 2013/09 -
Cyber Security Engineering: A Practical Approach for Systems and Software Assurance
Author Carol C. Woody , Nancy R. Mead
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensi....
Release Date 2016/10 -
Author Patrice Bellagamba , Nash Darukhanawalla - CCIE No. 10332
As data centers grow in size and complexity, enterprises are adopting server virtualization technologies such as VMware, VMotion, NIC teaming, and server clustering to achieve increased efficiency of resources and to ensure business resilience. However, these techno....
Release Date 2009/06 -
Particle Technology and Engineering
Author Chuan-Yu Wu , Jonathan P.K. Seville
Particle Technology and Engineering presents the basic knowledge and fundamental concepts that are needed by engineers dealing with particles and powders. The book provides a comprehensive reference and introduction to the topic, ranging from single particle charac....
Release Date 2016/05 -
Cathodic Corrosion Protection Systems
Author Alireza Bahadori
Corrosion is a naturally occurring cost, worth billions in the oil and gas sector. New regulations, stiffer penalties for non-compliance and aging assets are all leading companies to develop new technology, procedures and bigger budgets catering to one prevailing me....
Release Date 2014/07 -
Managing Your Intellectual Property Assets
Author Scott Shane
This book outlines and illustrates strategies that you must employ to protect your intellectual property. There are legal means available to you, and this book defines these means and explains them in plain language. If you want to protect your innovative product an....
Release Date 2008/11 -
Author Christian Bizer , Tom Heath
The World Wide Web has enabled the creation of a global information space comprising linked documents. As the Web becomes ever more enmeshed with our daily lives, there is a growing desire for direct access to raw data not currently available on the Web or bound up ....
Release Date 2011/02 -
Getting Started with z/OS Data Set Encryption
Author Bill White , Cecilia Carranza Lewis , Eysha Shirrine Powers , David Rossi , Eric Ros
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.....
Release Date 2021/12 -
Implementing Cryptography Using Python
Author Shannon W. Bray
Learn to deploy proven cryptographic tools in your applications and servicesCryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cr....
Release Date 2020/08 -
Data Protection and the Cloud: Are the risks too great?
Author Paul Ticher
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA’s eight principles could lead to ....
Release Date 2015/02 -
E-Mail Virus Protection Handbook
Author Syngress
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to profession....
Release Date 2000/11 -
Super Freedom: Create a Worry-Free Financial Future in 6 Steps
Author Trish Power
Super Freedom is just that ? a guide for women to super. This guide has a strong, aspirational focus on whatsuperannuation can provide for women, regardless of their marital circumstances, age or even their currentsuperannuation balances. For women it?s not so much ....
Release Date 2011/11