ICT Systems Security and Privacy Protection, Lech Jan Janczewski; Miros?aw Kuty?owski
Автор: Mohammad Obaidat Название: Security of e-Systems and Computer Networks ISBN: 0521837642 ISBN-13(EAN): 9780521837644 Издательство: Cambridge Academ Рейтинг: Цена: 12830.00 р. Наличие на складе: Поставка под заказ.
Описание: Presents fundamental concepts and tools of e-based security. The core areas of security are covered in detail and the major trends, challenges and applications discussed. Technically oriented with practical examples, this book is suitable for practitioners in network security, and graduate students and researchers in telecommunications and computer science.
Описание: The wave of data breaches raises two pressing questions: Why don`t we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions.
Автор: Dengguo Feng Название: Trusted Computing: Principles and Applications ISBN: 3110476045 ISBN-13(EAN): 9783110476040 Издательство: Walter de Gruyter Рейтинг: Цена: 18586.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Автор: Nolan, Catherine Wilson, Ashley M. Название: Audacity to spy ISBN: 1935504797 ISBN-13(EAN): 9781935504795 Издательство: Gazelle Book Services Рейтинг: Цена: 4502.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Ever get the feeling you are being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more. This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet. The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalise their own services and to sell to other advertisers for behavioural marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasnt enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users valuable personal and financial information. More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.
Описание: The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. <br><br><em>Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection</em> provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.
Автор: Paolo Mori; Steven Furnell; Olivier Camp Название: Information Systems Security and Privacy ISBN: 303025108X ISBN-13(EAN): 9783030251086 Издательство: Springer Рейтинг: Цена: 9502.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018.The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru