 |
|
|
|
|
|
 Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... |  |  Return of the Grizzly: Sharing the Range with Yellowstone's Top Predator
The Yellowstone grizzly population has grown from an estimated 136 bears when first granted federal protection as a threatened species to as many as 1,000 grizzlies in a tri-state region today. No longer limited to remote wilderness areas, grizzlies now roam throughout the region—in state parks, school playgrounds, residential ... |  |  Computer Viruses: from theory to applications (Collection IRIS)This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions... |
|
|
|
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 |