Angebote zu "Security" (242 Treffer)

Computer Security
65,39 € *
ggf. zzgl. Versand

Computer Security

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Introduction to Computer Security
62,99 € *
ggf. zzgl. Versand

For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with ?just-enough? background in computer science. The result is a presentation of the material that is accessible to students of all levels. Features + Benefits Accessible to the general-knowledge reader. Authors Goodrich and Tamassia recognize that prerequisites for an extensive background in CS and mathematics are not only unnecessary for learning but also arguably contribute to a reduction in enrollments and a shortage of computer-security experts. Therefore, the authors assume only the most basic of prerequisite knowledge in computing, making this text suitable for beginning computer science majors, as well as computer science minors and non-majors. Teaches general principles of computer security from an applied viewpoint. In this new text, the authors cover specific computer security topics while providing necessary material on the foundations of computing needed to understand these topics. As a result, students learn about vital computer security topics such as access control, firewalls, and viruses as well as a variety of fundamental computer-science concepts like algorithms, operating systems, networking, and programming languages. Topics covered include: o Common cyberattacks including viruses, worms, Trojan horses, password crackers, keystroke loggers, denial of service, spoofing, and phishing. o Techniques for identifying and patching vulnerabilities in machines and networks as well methods for detecting and repairing infected systems. o Fundamental building blocks of secure systems such as encryption, fingerprints, digital signatures and basic cryptographic protocols. o Human and social aspects of computer security, including usability, interfaces, copyright, digital rights management, social engineering, and ethical issues. A practical introduction that will prepare students for careers in a variety of fields. This text encourages students to think about security issues and to deploy security mechanisms early in designing software applications or in making software purchase/ deployment decisions. This skill will be appreciated by future employers--who may include corporations in the financial, healthcare and technology sectors--for whom the security of software applications is a critical requirement. The material in the text will also provide readers with a clear understanding of the security ramifications of using computers and the Internet in their daily lives (e.g., for online banking and shopping), as well as the potential threats to individual privacy (as seen in recent debates on electronic voting, for example), and possibly to democracy itself, that may arise from inappropriate use of computer security technology. Projects The authors provide a collection of creative, hands-on projects at three levels of difficulty that can be used both in computer security and computer security-related courses. A wide set of options will allow instructors to customize the projects to suit a variety of learning modes and lab resources. In each project, students are given a realistic, though simplified, version of a working system with multiple vulnerabilities and a list of allowed attack vectors. They may be asked to work in ?break-it? mode, which will require students to attack a system by developing exploits that take advantage of the discovered vulnerabilities, or they may be asked to work in ?fix-it? mode in which the student hardens the system by developing mechanisms for removing or mitigating the vulnerabilities. SUPPLEMENTS A collection of slide presentations created by the authors each suitable for a one-hour lecture, covering all the course topics. The presentations will include links to relevant resources on the web and will have extensive notes. The slide presentations have been created in a standard file format compatible

Anbieter: buecher.de
Stand: 19.07.2017
Zum Angebot
Der IT Security Manager
54,99 € *
ggf. zzgl. Versand

Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden - Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von IT-Sicherheitsbeauftragten bewährt. Die Inventarisierung aller Informationswerte (Assets), die Formulierung von Sicherheitszielen und die Erstellung von Leitlinien und Sicherheitskonzepten werden klar und verständlich dargestellt. Anhand vieler praktischer Beispiele erfahren Sie alles über Risikoanalysen und -bewertungen sowie über wichtige Sicherheitsmaßnahmen aus den Bereichen Organisation, Recht, Personal, Infrastruktur und Technik. In der vierten Auflage wurde neben vielen Aktualisierungen und Erweiterungen (z.B. im Hinblick auf den Einsatz mobiler IT-Systeme) das Kapitel über die Inventarisierung komplett überarbeitet; als neues Kapitel wurde die Verhinderung von Datenlecks (Data Loss / Leakage Prevention) in sensiblen Organisationen aufgenommen.

Anbieter: buecher.de
Stand: 24.07.2017
Zum Angebot
Machine Learning and Security
44,99 € *
ggf. zzgl. Versand
Anbieter: buecher.de
Stand: 19.07.2017
Zum Angebot
Security Protocols XIV
53,50 € *
ggf. zzgl. Versand

This book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers´ changing agendas and capabilities.

Anbieter: buecher.de
Stand: 19.07.2017
Zum Angebot
Network Security with OpenSSL
34,99 € *
ggf. zzgl. Versand

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.

Anbieter: buecher.de
Stand: 19.07.2017
Zum Angebot
Essential Information Security
47,54 € *
ggf. zzgl. Versand

This book provides a first introduction into the field of Information security. Information security is about preserving your data, keeping private data private, making sure only the people who are authorized have access to the data, making sure your data is always there, always the way you left it, keeping your secrets secret, making sure you trust your sources, and comply with government and industry regulations and standards. It is about managing your risks and keeping the business going when it all goes south. Every new security practitioner should start with this book, which covers the most relevant topics like cloud security, mobile device security and network security and provides a comprehensive overview of what is important in information security. Processes, training strategy, policies, contingency plans, risk management and effectiveness of tools are all extensively discussed.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
IoT Security Issues
34,00 € *
ggf. zzgl. Versand

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields. Alasdair Gilchrist , Nonthaburi, Thailand

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
IoT Security Issues
34,00 € *
ggf. zzgl. Versand

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields. Alasdair Gilchrist , Nonthaburi, Thailand

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Practical Hadoop Security
47,59 € *
ggf. zzgl. Versand

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way. You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors. No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples. The book concludes with the most important aspect of Hadoop security - encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost. Practical Hadoop Security : Explains importance of security, auditing and encryption within a Hadoop installation Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use Bhushan Lakhe is Senior Vice President of Information and Data Architecture at Ipsos, a global market research company headquartered in Paris. He has more than 25 years experience in software development life cycle management, enterprise architecture design and framework implementation, service management, data warehousing, and Hadoop ecosystem (HDFS, HBase, Hive, Pig, SQOOP, MongoDB) implementation, having worked successively at Tata Consultancy Services, Fujitsu-ICIM, ICL, IBM, Unisys Corporation, and as a database architecture consultant to such clients as Leo Burnett, ABN AMRO Bank, Abbott Laboratories, Motorola, JPMorgan Chase, and British Petroleum. He received IBM’s 2012 Gerstner Award for his implementation of major big data and data warehouse projects. Lakhe is a Cloudera Certified Administrator for Apache Hadoop CDH4 and a Microsoft Certified Technology Specialist, SQL Server Implementation and Maintenance. He is the author of Practical Hadoop Security. He is active in the Chicago Hadoop community and as a speaker at technical meetups and industry conferences. Lakhe graduated from the Birla Institute of Technology and Science, Pilani.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot