Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...
In the United States, immigration is generally seen as a law and order issue. Amidst increasing anti-immigrant sentiment, unauthorized migrants have been cast as lawbreakers. Governing Immigration Through Crime offers a comprehensive and accessible introduction to the use of crime and punishment to manage undocumented immigrants. ...
âOver more than three decades starting in the 1990s, thousands of robberies, acts of piracy, and other violent attacks against merchant vessels have been reported in many of the world’s waters. The grave danger of piracy poses a direct threat not only to the security and efficiency of marine transportation, but more seriously, to...
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...
Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...
Since the pioneering discovery by Felgner et al. (1987) that cationic lipid
can efficiently transfect cells, there was a surge of research activity in this
area. The field received another boost when Nabel et al. (1993) successfully
completed a small phase I clinical trial in gene therapy of melanoma
using cationic liposome as a...
Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...
This book is intended to provide students and professionals with a solid foundation in the
fundamentals of advanced network security. The previous edition of this book placed significant
emphasis on intrusion detection, but this edition aims to provide a more balanced approach to
the topic of network defense and countermeasures. As...
The balance between risk and reward is the very essence of business: you have to take risks
in order to generate returns and, generally speaking, higher returns involve greater risks.
However, there is a difference between risks taken as a result of careful judgement and
those taken unwittingly.
Impact cratering is arguably the most ubiquitous geological process in the Solar System. It has played an important role in Earth’s history, shaping the geological landscape, affecting the evolution of life, and generating economic resources. However, it was only in the latter half of the 20th century that the importance of impact...
The primarygoal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...
Cryptography has made a peculiar journey to become a modern science. It had long been
associated with the military and with magic. The rst published work in the eld was
Steganographia, by an alchemist named Trithemius. Although written earlier, the book was
published in 1606. Cryptography has continued this connection with the arcane...