Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Strategic Information Security
  • Language: en
  • Pages: 242

Strategic Information Security

  • Type: Book
  • -
  • Published: 2003-11-24
  • -
  • Publisher: CRC Press

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now

Assessing and Managing Security Risk in IT Systems
  • Language: en
  • Pages: 290

Assessing and Managing Security Risk in IT Systems

  • Type: Book
  • -
  • Published: 2004-08-12
  • -
  • Publisher: CRC Press

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments. Part I deliv

Wireless Crime and Forensic Investigation
  • Language: en
  • Pages: 280

Wireless Crime and Forensic Investigation

  • Type: Book
  • -
  • Published: 2007-02-26
  • -
  • Publisher: CRC Press

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. From short text messaging to investigating war, this book explores all aspects of wireless technology, including how it is used in daily life and how it might be used in the future. It provides a one-stop resource on the types of wireless crimes that are being committed and the forensic investigation techniques that are used for wireless devices and wireless networks. The author provides a solid understanding of modern wireless technologies, wireless security techniques, and wireless crime techniques, and shows how to conduct forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, is self-contained for quick comprehension.

Diary of the Corporation: Charles I and Commonwealth (1641-1654)
  • Language: en
  • Pages: 614

Diary of the Corporation: Charles I and Commonwealth (1641-1654)

  • Type: Book
  • -
  • Published: 1896
  • -
  • Publisher: Unknown

None

Public Key Infrastructure
  • Language: en
  • Pages: 446

Public Key Infrastructure

  • Type: Book
  • -
  • Published: 2004-05-11
  • -
  • Publisher: CRC Press

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce act

The Ethical Hack
  • Language: en
  • Pages: 350

The Ethical Hack

  • Type: Book
  • -
  • Published: 2004-09-29
  • -
  • Publisher: CRC Press

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order t

Reading Records
  • Language: en
  • Pages: 608

Reading Records

  • Type: Book
  • -
  • Published: 1896
  • -
  • Publisher: Unknown

None

Database and Applications Security
  • Language: en
  • Pages: 657

Database and Applications Security

  • Type: Book
  • -
  • Published: 2005-05-26
  • -
  • Publisher: CRC Press

This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections,

Wireless Security Handbook
  • Language: en
  • Pages: 384

Wireless Security Handbook

  • Type: Book
  • -
  • Published: 2005-12-16
  • -
  • Publisher: CRC Press

The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wirele

Information Security Management Handbook, Volume 2
  • Language: en
  • Pages: 602

Information Security Management Handbook, Volume 2

  • Type: Book
  • -
  • Published: 2004-12-28
  • -
  • Publisher: CRC Press

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and i