Контакты/Адрес/Проезд   Доставка и Оплата
История
  +7(495) 980-12-10
  10:00-18:00 пн-сб
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Специальные предложения | Бестселлеры
 
Информация
Online Каталоги
Каталог учебной литературы
по английскому языку >>>

Каталог учебной литературы
по английскому языку >>>


Cyber Security Engineering: A Foundation for Operational Security



Варианты приобретения
Цена: 3084р.
Кол-во:
 о цене
Наличие: Отсутствует. Возможна поставка под заказ.

При оформлении заказа до: 21 фев 2020
Ориентировочная дата поставки: начало Апреля
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Mead Nancy, Woody Carol
Название:  Cyber Security Engineering: A Foundation for Operational Security
Издательство: Pearson Education
Классификация:
Безопасность сети
Сетевые пакеты
Сетевые компьютеры

ISBN: 0134189809
ISBN-13(EAN): 9780134189802
ISBN: 0-13-418980-9
ISBN-13(EAN): 978-0-13-418980-2
Обложка/Формат: Paperback
Страницы: 250
Вес: 0.6 кг.
Дата издания: 16.06.2016
Язык: ENG
Размер: 181 x 233 x 25
Читательская аудитория: Professional & vocational
Подзаголовок: A practical approach for systems and software assurance
Рейтинг:
Поставляется из: США
Описание:

Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security throughout your full system development and acquisition lifecycles.

Drawing on their pioneering work at the Software Engineering Institute (SEI) and Carnegie Mellon University, Mead and Woody introduce seven core principles of software assurance, and show how to apply them coherently and systematically. Using these principles, they help you prioritize the wide range of possible security actions available to you, and justify the required investments.

Cyber Security Engineering guides you through risk analysis, planning to manage secure software development, building organizational models, identifying required and missing competencies, and defining and structuring metrics. Mead and Woody address important topics, including the use of standards, engineering security requirements for acquiring COTS software, applying DevOps, analyzing malware to anticipate future vulnerabilities, and planning ongoing improvements.

This book will be valuable to wide audiences of practitioners and managers with responsibility for systems, software, or quality engineering, reliability, security, acquisition, or operations. Whatever your role, it can help you reduce operational problems, eliminate excessive patching, and deliver software that is more resilient and secure.





The Art of Deception: Controlling the Human Element of Security

Автор: Kevin D. Mitnick
Название: The Art of Deception: Controlling the Human Element of Security
ISBN: 076454280X ISBN-13(EAN): 9780764542800
Издательство: Wiley
Рейтинг:
Цена: 1044 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.

Автор: Eric D. Knapp
Название: Applied Cyber Security and the Smart Grid,
ISBN: 1597499986 ISBN-13(EAN): 9781597499989
Издательство: Elsevier Science
Рейтинг:
Цена: 3866 р. 4296.00 -10%
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.

Unmasking the Social Engineer: The Human Element of Security

Автор: Hadnagy Christopher
Название: Unmasking the Social Engineer: The Human Element of Security
ISBN: 1118608577 ISBN-13(EAN): 9781118608579
Издательство: Wiley
Рейтинг:
Цена: 2820 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets.

Data Warehousing and Data Mining Techniques for Cyber Security

Автор: Singhal Anoop
Название: Data Warehousing and Data Mining Techniques for Cyber Security
ISBN: 0387264094 ISBN-13(EAN): 9780387264097
Издательство: Springer
Рейтинг:
Цена: 12154 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend--without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important.Data Warehousing and Data Mining Techniques for Cyber Security contributes to the discipline of security informatics. The author discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. Since the cost of information processing and internet accessibility is dropping, an increasing number of organizations are becoming vulnerable to cyber attacks. This volume introduces techniques for applications in the area of retail, finance, and bioinformatics, to name a few.Data Warehousing and Data Mining Techniques for Cyber Security is designed for practitioners and researchers in industry. This book is also suitable for upper-undergraduate and graduate-level students in computer science. 

Information Security Risk Assessment Toolkit,

Автор: Mark Talabis
Название: Information Security Risk Assessment Toolkit,
ISBN: 1597497355 ISBN-13(EAN): 9781597497350
Издательство: Elsevier Science
Рейтинг:
Цена: 3577 р. 3974.00 -10%
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkitgives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

Wireless Operational Security,

Автор: John Rittinghouse, PhD, C
Название: Wireless Operational Security,
ISBN: 1555583172 ISBN-13(EAN): 9781555583170
Издательство: Elsevier Science
Рейтинг:
Цена: 7008 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks.

An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. "Wireless Operational Security" bridges this gap.

It presents a new 'WISDOM' model for Wireless Security Infrastructures. It acts as a critical guide to implementing 'Converged Networks' wired/wireless with all necessary security considerations. Rittinghouse's "Cybersecurity Operations Handbook" is the only se urity book recommended by the FCC.

Network security with openssl

Автор: Viega, Jon Messier, Matt Chandra, Pravir
Название: Network security with openssl
ISBN: 059600270X ISBN-13(EAN): 9780596002701
Издательство: Wiley
Рейтинг:
Цена: 3343 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This volume is designed to enable developers to use The OpenSSL library more effectively. It offers guidance on avoiding pitfalls, while taking advantage of the library`s advanced features and provides the information necessary to use OpenSSL safely and effectively.

Computer Network Security and Cyber Ethics

Автор: Kizza Joseph Migga
Название: Computer Network Security and Cyber Ethics
ISBN: 0786493925 ISBN-13(EAN): 9780786493920
Издательство: Eurospan
Рейтинг:
Цена: 3911 р.
Наличие на складе: Невозможна поставка.

Описание: Cyber vandalism and identity theft represent enormous threats in a computer-driven world. This timely work focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our society. The nature and motives behind cyber attacks are investigated, as well as how they are committed and what efforts are being undertaken to prevent further acts from occurring.This edition explores security issues also in the world of social networks. General security protocols and best practices have been updated to reflect changes in the cyber world, and the changing business information security landscape is analysed in detail.

Security and Privacy in Smart Grids

Автор: Xiao
Название: Security and Privacy in Smart Grids
ISBN: 1439877831 ISBN-13(EAN): 9781439877838
Издательство: Taylor&Francis
Рейтинг:
Цена: 7105 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas—making it an ideal reference for students, researchers, and engineers in these fields.The book explains grid security development and deployment and introduces novel approaches for securing today’s smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The book’s chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.

Social Engineering in It Security: Tools, Tactics, and Techniques

Автор: Conheady Sharon
Название: Social Engineering in It Security: Tools, Tactics, and Techniques
ISBN: 0071818464 ISBN-13(EAN): 9780071818469
Издательство: McGraw-Hill
Рейтинг:
Цена: 3344 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Filled with cutting-edge social engineering testing techniques that are legally and ethically sound, this book fully explains how to plan for a social engineering test, perform reconnaissance, implement the test, and accurately report the results.

Android Security

Автор: Misra
Название: Android Security
ISBN: 1439896461 ISBN-13(EAN): 9781439896464
Издательство: Taylor&Francis
Рейтинг:
Цена: 5119 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues.Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler.The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system, including import directories and files, so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website: www.androidinsecurity.com. It explains how to crack SecureApp.apk discussed in the text and also makes the application available on its site.The book includes coverage of advanced topics such as reverse engineering and forensics, mobile device pen-testing methodology, malware analysis, secure coding, and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes.The book’s site includes a resource section where readers can access downloads for applications, tools created by users, and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text, wherever needed. Visit www.androidinsecurity.com for more information.

Security Engineering with Patterns / Origins, Theoretical Models, and New Applications

Автор: Schumacher Markus
Название: Security Engineering with Patterns / Origins, Theoretical Models, and New Applications
ISBN: 3540407316 ISBN-13(EAN): 9783540407317
Издательство: Springer
Рейтинг:
Цена: 6544 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия