Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Practical Hacking Techniques and Countermeasures
  • Language: en
  • Pages: 752

Practical Hacking Techniques and Countermeasures

  • Type: Book
  • -
  • Published: 2006-11-02
  • -
  • Publisher: CRC Press

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate an

Information Security Management Handbook
  • Language: en
  • Pages: 3280

Information Security Management Handbook

  • Type: Book
  • -
  • Published: 2007-05-14
  • -
  • Publisher: CRC Press

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the C

Computer Forensics
  • Language: en
  • Pages: 357

Computer Forensics

  • Type: Book
  • -
  • Published: 2007-03-09
  • -
  • Publisher: CRC Press

Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to und...

Oracle Identity Management
  • Language: en
  • Pages: 548

Oracle Identity Management

  • Type: Book
  • -
  • Published: 2008-04-09
  • -
  • Publisher: CRC Press

In the third edition of this popular reference, identity management specialist Marlin B. Pohlman offers a definitive guide for corporate stewards struggling with the challenge of meeting regulatory compliance. He examines multinational regulations, delves into the nature of governance, risk, and compliance (GRC), and outlines a common taxonomy for the GRC space. He also cites standards that are used, illustrating compliance frameworks such as BSI, ITIL, and COBIT. The text focuses on specific software components of the Oracle Identity Management solution and includes elements of the Oracle compliance architecture.

Building an Effective Information Security Policy Architecture
  • Language: en
  • Pages: 360

Building an Effective Information Security Policy Architecture

  • Type: Book
  • -
  • Published: 2008-05-20
  • -
  • Publisher: CRC Press

Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Eff

Mechanics of User Identification and Authentication
  • Language: en
  • Pages: 760

Mechanics of User Identification and Authentication

  • Type: Book
  • -
  • Published: 2007-06-18
  • -
  • Publisher: CRC Press

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts o

Complete Guide to Security and Privacy Metrics
  • Language: en
  • Pages: 848

Complete Guide to Security and Privacy Metrics

  • Type: Book
  • -
  • Published: 2007-01-22
  • -
  • Publisher: CRC Press

This bookdefines more than 900 metrics measuring compliance with current legislation, resiliency of security controls, and return on investment. It explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The metrics are scaled by information sensitivity, asset criticality, and risk; aligned to correspond with different lateral and hierarchical functions; designed with flexible measurement boundaries; and can be implemented individually or in combination. The text includes numerous examples and sample reports and stresses a complete assessment by evaluating physical, personnel, IT, and operational security controls.

Employment Practices Decisions
  • Language: en
  • Pages: 1592

Employment Practices Decisions

  • Type: Book
  • -
  • Published: 1982
  • -
  • Publisher: Unknown

None

Wireless Crime and Forensic Investigation
  • Language: en
  • Pages: 280

Wireless Crime and Forensic Investigation

  • Type: Book
  • -
  • Published: 2007-02-26
  • -
  • Publisher: CRC Press

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. From short text messaging to investigating war, this book explores all aspects of wireless technology, including how it is used in daily life and how it might be used in the future. It provides a one-stop resource on the types of wireless crimes that are being committed and the forensic investigation techniques that are used for wireless devices and wireless networks. The author provides a solid understanding of modern wireless technologies, wireless security techniques, and wireless crime techniques, and shows how to conduct forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, is self-contained for quick comprehension.

Information Security Management Handbook, Volume 2
  • Language: en
  • Pages: 458

Information Security Management Handbook, Volume 2

  • Type: Book
  • -
  • Published: 2008-03-17
  • -
  • Publisher: CRC Press

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of t