Catalog Search Results
Author
Description
Enterprise Level Security: Securing Information Systems in an Uncertain Worldprovides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization...
Author
Description
As more and more of our daily interactions have shifted online, our lives have become more comfortable - and, in many ways, more vulnerable. The persistent insecurity of Internet activity, from spam to identity theft, affects all of us every day. And if these problems are left unchecked, their financial and emotional costs will build up to the point that we begin to turn away from this vibrant and essential tool. In Creeping Failure, world cyber security...
Author
Description
"Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone, and learn how to understand...
Author
Description
Cloud computing harnesses the power, storage capacity, and various software applications of the Internet and provides these to businesses as a service. It takes the place of an over-abundance of hardware, software licenses, and infrastructure saving time and start-up, as well as, maintenance costs.
Author
Description
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, and often controversial, The Myths of Security addresses IT professionals who deal with security issues, and speaks to Mac and PC users who spend...
Description
This book provides a wide survey of the information known about certain threats to computer security. Beginning with an introduction to networking and a discussion of several public networks, their goals, and directions, the authors explain how typical "intruders," "worms," and viruses" work. They examine the mindset of the people behind these security-breaking inventions, and conclude with articles on the social, legal, and ethical considerations...
Author
Description
Hackers exploit browser vulnerabilities to attack deep within networks. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.
Description
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies...
Author
Description
"Computer forensics - the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators - is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject. Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing...
Author
Description
Publisher description: This guide reveals the technical aspects of hacking that are least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques...
Author
Description
"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher
Author
Description
"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need...
Author
Description
Blockchain technology enables the creation of decentralized currencies, decentralized applications powered by smart contracts, self-executing digital agreements, and intelligent assets that can be controlled over the Internet. Blockchains also enable the development of new governance systems with more democratic or participatory decision-making, and decentralized (autonomous) organizations that can operate over a network of computers without any human...
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request