Angebote zu "Security" (106 Treffer)

Software Security
€ 69.99 *
ggf. zzgl. Versand

This is the Mobipocket version of the print book. ´´When it comes to software security, the devil is in the details. This book tackles the details.´´ --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies ´´McGraw´s book shows you how to make the ´culture of security´ part of your development lifecycle.´´ --Howard A. Schmidt, Former White House Cyber Security Advisor ´´McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn´t), buy this book and post it up on the lunchroom wall.´´ --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book´s methods without radically changing the way you work. Inside you´ll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in. This is the Mobipocket version of the print book. When it comes to software security, the devil is in the details. This book tackles the details. --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies McGraw´s book shows you how to make the ´culture of security´ part of your development lifecycle. --Howard A. Schmidt, Former White House Cyber Security Advisor McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn´t), buy this book and post it up on the lunchroom wall. --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book´s methods without radically changing the way you work. Inside you´ll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Foundations of Security
€ 31.99 *
ggf. zzgl. Versand

Software developers need to worry about security as never before. They need clear guidance on safe coding practices, and that´s exactly what this book delivers. The book does not delve deep into theory, or rant about the politics of security. Instead, it clearly and simply lays out the most common threats that programmers need to defend against. It then shows programmers how to make their defense. The book takes a broad focus, ranging over SQL injection, worms and buffer overflows, password security, and more. It sets programmers on the path towards successfully defending against the entire gamut of security threats that they might face.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Der IT Security Manager
€ 49.99 *
ggf. zzgl. Versand

Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden - Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von IT-Sicherheitsbeauftragten bewährt. Die Inventarisierung aller Informationswerte (Assets), die Formulierung von Sicherheitszielen und die Erstellung von Leitlinien und Sicherheitskonzepten werden klar und verständlich dargestellt. Anhand vieler praktischer Beispiele erfahren Sie alles über Risikoanalysen und -bewertungen sowie über wichtige Sicherheitsmaßnahmen aus den Bereichen Organisation, Recht, Personal, Infrastruktur und Technik. In der vierten Auflage wurde neben vielen Aktualisierungen und Erweiterungen (z.B. im Hinblick auf den Einsatz mobiler IT-Systeme) das Kapitel über die Inventarisierung komplett überarbeitet; als neues Kapitel wurde die Verhinderung von Datenlecks (Data Loss / Leakage Prevention) in sensiblen Organisationen aufgenommen.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Security Awareness
€ 54.99 *
ggf. zzgl. Versand

Security ist in aller Munde. Und unbestritten gilt heute nach Jahren der Konzentration auf stets neue technische Tools der Mensch als Schlüssel zum Erfolg der Unternehmenssicherheit. In diesem Zusammenhang ist viel von Security Awareness die Rede. Doch was bedeutet eigentlich Awareness? Reicht ´´Sensibilisierung´´? Reichen didaktische Veranstaltungen oder E-Learning-Tools aus oder sind vielmehr ganzheitliche Kommunikationsstrategien der Schlüssel für die oftmals beschworenen Verhaltensänderungen? Erfahrene Berater, Kommunikationsexperten, Psychologen und Software-Architekten aus Deutschland, Österreich und der Schweiz beschreiben, welche Rolle Sicherheitskultur im Rahmen von Awareness spielt, sowie Methoden für Analysen und Konzeption bzw. Implementierung von Maßnahmen. Checklisten und Quellenangaben für Tools und Kampagnen-Bausteine vervollständigen das Buch und machen es zu einem unverzichtbaren Führer durch eine hier erstmals beschriebene methodische Awareness-Kommunikation.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
IoT Security Issues
€ 26.99 *
ggf. zzgl. Versand

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Security Data Visualization
€ 40.99 *
ggf. zzgl. Versand

Information overload. If you´re responsible for maintaining your network´s security, you´re living with it every day. Logs, slerts, packet captures, and even binary files take time and effort to analyze using text-bases tools - and once your analysis is complete, the picture isn´t always clear, or timely. And time is of the essence. Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities. Security Data Visualization is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you´ve seen what a network attack looks like, you´ll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and hox worms and viruses propagate. You´ll learn how to use visualization techniques to: - Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT - See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document - Gain insight into large amounts of low-level packed data - Identify and dissect port scans, Nessus vulnerability assessments, and Metaploid attacks - View the global spread of the Sony rookit, analyze antivirus effectiveness, and monitor widespread network attacks - View and analyze firewall and intrusion detection system (IDS) logs Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you´ve finished reading this book, you´ll understand how visualization can make your response to security threats faster and more effective.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Cryptology and Network Security
€ 67.99 *
ggf. zzgl. Versand

This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018. The 26 full papers were carefully reviewed and selected from 79 submissions. The papers are organized in the following topical sections: privacy; Internet misbehavior and protection; malware; symmetric key cryptography; signatures; cryptanalysis; cryptographic primitives; and cryptographic protocols.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Critical Information Infrastructures Security
€ 53.99 *
ggf. zzgl. Versand

This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017. The 21 full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. They present innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal with multi-disciplinary approaches to relevant C(I)IP problems.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Information Security Risk Management
€ 39.99 *
ggf. zzgl. Versand

Das Buch fasst alle Sachverhalte zum Risikomanagement zusammen, verbindet sie mit anderen Informationsquellen und umrahmt sie mit vielen Praxistipps, 38 Abbildungen und Tabellen und 14 Fallbeispielen. Wer mit ISO/IEC 27005 arbeiten möchte, für den reicht der unkommentierte Blick in den Standard nicht aus. Die Normenreihe ISO/IEC 27000 ist in den letzten Jahren stark gewachsen und es ist schwer den Überblick zu behalten. Dieses Buch zielt auf den Einsatz in der Praxis und richtet sich an jeden, der seine Entscheidungen auf Grundlage einer fundierten Risikoanalyse treffen will. Zusätzliche Funktionen für Smartphones: 40 QR-Codes mit redaktionell gepflegten Links führen Sie mit Ihrem Smartphone direkt aus dem Buch ins Internet. So gelangen Sie ohne Tippen von der Buchseite aus auf die passende Webseite. Auf diese Weise sind die Vorzüge von Buch und Internet jederzeit für Sie verfügbar. Darüber hinaus steht Ihnen der Autor auf seiner Facebook-Seite und in seinem Blog ´´Klipper on Security´´ als Ansprechpartner zur Verfügung.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Security Automation with Ansible 2
€ 43.99 *
ggf. zzgl. Versand
Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot