Dòng Nội dung
1
Cryptography and network security : principles and practice / William Stallings
Boston : Prentice Hall, 2011
900 p. : illustrations
Ký hiệu phân loại (DDC): 005.8
This text provides a practical survey of both the principles and practice of cryptography and network security.
Số bản sách: (0) Tài liệu số: (1)
2
Cyber security : analytics, technology and automation / [Edited by] Martti Lehto; P Neittaanmäki
Cham : Springer, 2015
268 p. : illustrations
Ký hiệu phân loại (DDC): 005.8
Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.
Số bản sách: (0) Tài liệu số: (1)
3
Enterprise level security : securing Information Systems in an uncertain world / William Randolph Simpson
Boca Raton : CRC Press, Taylor & Francis Group, 2016
428 pages ; 6.2 x 0.9 x 9.2 inches
Ký hiệu phân loại (DDC): 005.8
Enterprise Level Security: Securing Information Systems in an Uncertain Worldprovides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.
Số bản sách: (0) Tài liệu số: (1)