Catalog Search Results
Author
Description
Why to Buy HackNotes(TM) are the Cliffs Notes of Network Security. These handy, pocket-sized references provide IT professionals with the most critical security information they need at their fingertips - without having to lug around a heavy book or sift through lots of expository text.
Author
Description
This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the...
Author
Description
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including...
Author
Description
From the author who made "hacker" a household word comes a groundbreaking book about the most hotly debated subject of the digital age. "Crypto" concerns privacy in the information age and is about the nerds and visionaries who, nearly 20 years ago, predicted that the Internet's greatest virtue--free access to information--was also its most perilous drawback: a possible end to privacy.
Description
With such widespread access to the Internet, how vulnerable to online sabotage are banks, government agencies, nuclear plants, utilities, and hospitals? This program examines the Internet's exponential growth and evaluates risks posed by groups and individuals bent on crime or terrorism. Experts from the FBI, the Pentagon, and private companies, and even a self-confessed hacker comment on the danger of online fraud and "denial of service" attacks...
Author
Description
CD-ROM contains: sample information security policy document, free security and encryption software, electronic version of the text.
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 'rules' designed to enhance the security...
18) Privacy Issues
Description
Technological development has brought about unprecedented means of gathering and disseminating information. But have these advancements made the protection of personal and organizational privacy virtually impossible? In this video, Damien Smith, lawyer and governance expert, illustrates why privacy systems fail and offers strategies for mitigating the risks posed by the "privacy invasion." Topics covered include the "incremental creep" of privacy...
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request