Описание: Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern.The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
Автор: Katzer, Matthew Название: Securing office 365 ISBN: 1484242297 ISBN-13(EAN): 9781484242292 Издательство: Springer Рейтинг: Цена: 10480.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.
Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today’s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business.
What You’ll Learn
Manage security with the Azure Security Center and the Office 365 Compliance CenterConfigure information protection for document and electronic communicationsMonitor security for your business in the cloudUnderstand Mobile Application Management (MAM) and Mobile Device Management (MDM)Prevent data loss in Office 365Configure and manage the compliance manager tools for NIST and GDPR
Who This Book Is For
IT managers and compliance and cybersecurity officers who have responsibility for compliance and data security in their business
Автор: Lim, Ian Название: Securing Cloud and Mobility ISBN: 1439850550 ISBN-13(EAN): 9781439850558 Издательство: Taylor&Francis Рейтинг: Цена: 11176.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Franklin Jr., Curtis Название: Securing the Cloud ISBN: 1032475714 ISBN-13(EAN): 9781032475714 Издательство: Taylor&Francis Рейтинг: Цена: 6889.00 р. Наличие на складе: Поставка под заказ.
Автор: Winkler, Vic (J.R.) Название: Securing The Cloud ISBN: 1597495921 ISBN-13(EAN): 9781597495929 Издательство: Elsevier Science Рейтинг: Цена: 7915.00 р. Наличие на складе: Поставка под заказ.
Описание: As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. This title discusses making the move to the cloud while securing your piece of it.
Автор: Kevin Foltz, William R. Simpson Название: Enterprise Level Security, 1 ISBN: 1498764452 ISBN-13(EAN): 9781498764452 Издательство: Taylor&Francis Рейтинг: Цена: 16078.00 р. Наличие на складе: Поставка под заказ.
Описание:
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process.
Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise.
The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project.
The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.
Автор: Macaulay Название: Securing Converged IP Networks ISBN: 0849375800 ISBN-13(EAN): 9780849375804 Издательство: Taylor&Francis Рейтинг: Цена: 15004.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of convergence, details how to measure the sensitivity and assurance requirements of different data assets and discusses a range of ICT security threats and vulnerabilities.
Автор: Macaulay, Tyson Название: Securing Converged IP Networks ISBN: 0367390809 ISBN-13(EAN): 9780367390808 Издательство: Taylor&Francis Рейтинг: Цена: 9033.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management.
Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of convergence, details how to measure the sensitivity and assurance requirements of different data assets and discusses a wide range of ICT security threats and vulnerabilities. Later chapters discuss controls and safeguards in terms of management, as well as, technical, and operational tools that can reduce the likelihood of wide range of risks. It also provides recommendations for managing the assurance, implementation and operation of converged ICT network infrastructures and examines the future of ICT security and assurance under IP convergence.
Автор: Carter Peter A. Название: Securing SQL Server: Dbas Defending the Database ISBN: 1484241606 ISBN-13(EAN): 9781484241608 Издательство: Springer Рейтинг: Цена: 9083.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The multi-layered approach in this book helps ensure that a single breach does not lead to loss or compromise of confidential, or business sensitive data.
Database professionals in today’s world deal increasingly with repeated data attacks against high-profile organizations and sensitive data. It is more important than ever to keep your company’s data secure. Securing SQL Server demonstrates how developers, administrators and architects can all play their part in the protection of their company’s SQL Server enterprise.
This book not only provides a comprehensive guide to implementing the security model in SQL Server, including coverage of technologies such as Always Encrypted, Dynamic Data Masking, and Row Level Security, but also looks at common forms of attack against databases, such as SQL Injection and backup theft, with clear, concise examples of how to implement countermeasures against these specific scenarios. Most importantly, this book gives practical advice and engaging examples of how to defend your data, and ultimately your job, against attack and compromise.
What You'll Learn
Perform threat analysisImplement access level control and data encryptionAvoid non-reputability by implementing comprehensive auditingUse security metadata to ensure your security policies are enforcedMitigate the risk of credentials being stolenPut countermeasures in place against common forms of attack
Who This Book Is For
Database administrators who need to understand and counteract the threat of attacks against their company’s data, and useful for SQL developers and architects
Описание: The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. <br><br><em>Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection</em> provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.
Описание: Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator.
Автор: Gallagher Scott Название: Securing Docker ISBN: 1785888854 ISBN-13(EAN): 9781785888854 Издательство: Неизвестно Рейтинг: Цена: 5516.00 р. Наличие на складе: Нет в наличии.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru