Angebote zu "Secure" (24 Treffer)

Kategorien

Shops

Secure IT Systems
59,99 € *
ggf. zzgl. Versand

This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018. The 29 full papers presented in this volume were carefully reviewed and selected from 81 submissions. They are organized in topical sections named: privacy; cryptography; network and cloud security; cyber security and malware; and security for software and software development.

Anbieter: buecher.de
Stand: 13.05.2019
Zum Angebot
Introduction to Reliable and Secure Distributed...
58,99 € *
ggf. zzgl. Versand

In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes.Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of ´´Introduction to Reliable Distributed Programming´´. Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name ´´Byzantine fault-tolerance´´. In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes.Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of ´´Introduction to Reliable Distributed Programming´´. Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name ´´Byzantine fault-tolerance´´.

Anbieter: buecher.de
Stand: 13.05.2019
Zum Angebot
Applied Oracle Security: Developing Secure Data...
47,99 € *
ggf. zzgl. Versand

Publisher´s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Cutting-edge techniques from leading Oracle security experts This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications. Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today´s IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.

Anbieter: buecher.de
Stand: 13.05.2019
Zum Angebot
Transformational Security Awareness: What Neuro...
25,99 € *
ggf. zzgl. Versand

Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That´s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture management Overcome the knowledge-intention-behavior gap Optimize your program to work with the realities of human nature Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness Put effective training together into a well-crafted campaign with ambassadors Understand the keys to sustained success and ongoing culture change Measure your success and establish continuous improvements Do you care more about what your employees know or what they do? It´s time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.

Anbieter: buecher.de
Stand: 17.05.2019
Zum Angebot
Cyber-Sicherheit
34,99 € *
ggf. zzgl. Versand

Dieses Lehrbuch gibt Ihnen einen Überblick über die Themen der IT-Sicherheit Die Digitalisierung hat Geschäftsmodelle und Verwaltungsprozesse radikal verändert. Dadurch eröffnet der digitale Wandel auf der einen Seite viele neue Möglichkeiten. Auf der anderen Seite haben Hacker jüngst mit Cyber-Angriffen für Aufsehen gesorgt. So gesehen birgt die fortschreitende Digitalisierung auch Gefahren. Für eine erfolgreiche Zukunft unserer Gesellschaft ist es daher entscheidend, eine sichere und vertrauenswürdige IT zu gestalten. Norbert Pohlmann gibt Ihnen mit diesem Lehrbuch eine umfassende Einführung in den Themenkomplex der IT-Sicherheit. Lernen Sie mehr über Mechanismen, Prinzipien, Konzepte und Eigenschaften von Cyber-Sicherheitssystemen. Der Autor vermittelt aber nicht nur theoretisches Fachwissen, sondern versetzt Sie auch in die Lage, die IT-Sicherheit aus der anwendungsorientierten Perspektive zu betrachten. Lesen Sie, auf welche Sicherheitseigenschaften es bei Cyber-Systemen ankommt. So sind Sie mit Hilfe dieses Lehrbuchs in der Lage, die Wirksamkeit von IT-Lösungen mit Blick auf deren Sicherheit zu beurteilen. Grundlegende Aspekte der Cyber-Sicherheit Im einführenden Abschnitt dieses Lehrbuchs vermittelt Ihnen Pohlmann zunächst die Grundlagen der IT-Sicherheit und schärft Ihren Blick für folgende Aspekte: Strategien Motivationen Bedürfnisse Probleme Herausforderungen Wirksamkeitskonzepte Tauchen Sie tiefer in die Materie ein In den darauffolgenden Kapiteln befasst sich Pohlmann mit diesen Teilbereichen der IT-Sicherheit Kryptographie Hardware-Sicherheitsmodule zum Schutz von sicherheitsrelevanten Informationen Digitale Signatur, elektronische Zertifikate sowie PKIs und PKAs Identifikation und Authentifikation Enterprise Identity und Access Management Trusted Computing Cyber-Sicherheit Frühwarn- und Lagebildsysteme Firewall-Systeme E-Mail-Sicherheit Blockchain-Technologie Künstliche Intelligenz und Cyber-Security Social Web Cyber-Sicherheit Zudem erfahren Sie mehr über IPSec-Verschlüsselung, Transport Layer Security (TLS), Secure Socket Layer (SSL) sowie Sicherheitsmaßnahmen gegen DDoS-Angriffe. Anschauliche Grafiken und Tabellen bilden Prozesse und Zusammenhänge verständlich ab. Didaktisch gut aufbereitet, können Sie die Inhalte mit zahlreichen Übungsaufgaben vertiefen. Das Lehrbucht richtet sich speziell an Leser, für die die IT-Sicherheit eine besondere Rolle spielt, etwa: Studierende der Informatik Auszubildende im Bereich Fachinformatik Mitarbeiter und Führungspersonen der IT-Branche

Anbieter: buecher.de
Stand: 16.05.2019
Zum Angebot
Advances in Cryptology - EUROCRYPT 2019
78,99 € *
ggf. zzgl. Versand

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Anbieter: buecher.de
Stand: 13.05.2019
Zum Angebot
Advances in Cryptology - EUROCRYPT 2019
78,99 € *
ggf. zzgl. Versand

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Anbieter: buecher.de
Stand: 13.05.2019
Zum Angebot
The Manga Guide to Cryptography
16,99 € *
ggf. zzgl. Versand

The Manga Guide to Cryptography breaks down how ciphers work, what makes them secure or insecure, and how to decode them. Comic illustrations make it easy to learn about classic substitution, polyalphabetic, and transposition ciphers; symmetric-key algorithms like block and DES (Data Encryption Standard) ciphers; how to use public key encryption technology to generate public/private keys and cryptograms; practical applications of encryption such as digital signatures, identity fraud countermeasures, and ´man in the middle´ attack countermeasures.

Anbieter: buecher.de
Stand: 13.05.2019
Zum Angebot
The CERT (R) C Coding Standard, Second Edition
55,99 € *
ggf. zzgl. Versand

This book is an essential desktop reference for the CERT C coding standard. The CERT C Coding Standard is an indispensable collection of expert information. The standard itemizes those coding errors that are the root causes of software vulnerabilities in C and prioritizes them by severity, likelihood of exploitation, and remediation costs. Each guideline provides examples of insecure code as well as secure, alternative implementations. If uniformly applied, these guidelines will eliminate the critical coding errors that lead to buffer overflows, format string vulnerabilities, integer overflow, and other common software vulnerabilities.

Anbieter: buecher.de
Stand: 13.05.2019
Zum Angebot