Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
FISMA Compliance Handbook: Second Edition
FISMA Compliance Handbook: Second Edition

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book...

Contemporary Issues in Ethics and Information Technology
Contemporary Issues in Ethics and Information Technology
Information technology has produced new ethical challenges and concerns in dealing with issues about privacy, security, piracy and professional ethics. Contemporary Issues in Ethics and Information Technology discusses these issues as well as other important ethical issues such as the outsourcing of high-level jobs and the value of IT itself. The...
Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping
Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping
This book opens up three new topics in modern Chinese literary history: the intimate lives of Lu Xun and Xu Guangping as a couple; real and imagined love-letters in modern Chinese literature; and concepts of privacy in China. The scandalous affair between modern China's greatest writer and his former student is revealed in their letters to each...
IP Location
IP Location

In today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,...

Security in Distributed, Grid, Mobile, and Pervasive Computing
Security in Distributed, Grid, Mobile, and Pervasive Computing
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee...
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

Desktop Witness: The Do's and Don'ts of Personal Computer Security
Desktop Witness: The Do's and Don'ts of Personal Computer Security

When asked 'who are you?', people in different cultures tend to define themselves fundamentally differently in terms of what their respective culture considers to be most important. In cultures where one's professional and economic status is most important, people say 'I am an engineer', or 'a priest at St...

Anonymizing Health Data: Case Studies and Methods to Get You Started
Anonymizing Health Data: Case Studies and Methods to Get You Started

Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to...

SSH, The Secure Shell: The Definitive Guide
SSH, The Secure Shell: The Definitive Guide
Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers,...
Enterprise Security Architecture Using IBM Tivoli Security Solutions (IBM Redbooks)
Enterprise Security Architecture Using IBM Tivoli Security Solutions (IBM Redbooks)

This IBM Redbook looks at the overall Tivoli Enterprise Security Architecture, focusing on the integrated identity management solution covering authentication, authorization, provisioning, and privacy, as well as risk management throughout extensive e-business enterprise implementations. The available security product diversity in the...

Data Mining: The Textbook
Data Mining: The Textbook

This textbook explores the different aspects of data mining from the fundamentals to the complex data types and their applications, capturing the wide diversity of problem domains for data mining issues. It goes beyond the traditional focus on data mining problems to introduce advanced data types such as text, time series, discrete sequences,...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy