15th National Computer Security Conference
Author :
Publisher :
Page : 846 pages
File Size : 49,80 MB
Release : 1992
Category : Computer security
ISBN :
Author :
Publisher :
Page : 846 pages
File Size : 49,80 MB
Release : 1992
Category : Computer security
ISBN :
Author : DIANE Publishing Company
Publisher : DIANE Publishing
Page : 568 pages
File Size : 44,86 MB
Release : 1995-08
Category : Business & Economics
ISBN : 9780788119248
Presentations of a conference. Covers a wide range of topics spanning the new draft Federal Criteria for Information Security, research and development activities, techniques for building secure computer systems and networks, and ethics issues. Papers and panels address harmonization of U.S. criteria for information technology security with international criteria, future techniques for integrating commercial off-the-shelf products into secure systems, access control and other networking challenges, etc. Numerous tables and figures.
Author : DIANE Publishing Company
Publisher : DIANE Publishing
Page : 416 pages
File Size : 50,24 MB
Release : 1992-11
Category : Computers
ISBN : 9780788102219
Held October 13-16, 1992. Emphasizes information systems security criteria (& how it affects us), and the actions associated with organizational accreditation. These areas are highlighted by emphasizing how organizations are integrating information security solutions. Includes presentations from government, industry and academia and how they are cooperating to extend the state-of-the-art technology to information systems security. 72 referred papers, trusted systems tutorial and 23 executive summaries. Very valuable! Must buy!
Author : Barbara Guttman
Publisher : DIANE Publishing
Page : 289 pages
File Size : 47,48 MB
Release : 1995
Category : Computer networks
ISBN : 0788128302
Covers: elements of computer security; roles and responsibilities; common threats; computer security policy; computer security program and risk management; security and planning in the computer system life cycle; assurance; personnel/user issues; preparing for contingencies and disasters; computer security incident handling; awareness, training, and education; physical and environmental security; identification and authentication; logical access control; audit trails; cryptography; and assessing and mitigating the risks to a hypothetical computer system.
Author :
Publisher :
Page : 408 pages
File Size : 40,63 MB
Release :
Category : Computer security
ISBN :
Author : Harold F. Tipton
Publisher : CRC Press
Page : 458 pages
File Size : 40,70 MB
Release : 2008-03-17
Category : Business & Economics
ISBN : 1420067109
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of t
Author : Eric A. Fisch
Publisher : CRC Press
Page : 390 pages
File Size : 47,50 MB
Release : 1999-12-28
Category : Computers
ISBN : 9781420049091
This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns regarding network security. It contains new chapters on World Wide Web security issues, secure electronic commerce, incident response, as well as two new appendices on PGP and UNIX security fundamentals.
Author : Josef Pieprzyk
Publisher : Springer Science & Business Media
Page : 686 pages
File Size : 38,99 MB
Release : 2013-03-09
Category : Computers
ISBN : 3662073242
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash.
Author : Peter Gutmann
Publisher : Springer Science & Business Media
Page : 331 pages
File Size : 11,74 MB
Release : 2007-05-08
Category : Computers
ISBN : 0387215514
Presents a novel design that allows for a great deal of customization, which many current methods fail to include; Details a flexible, comprehensive design that can be easily extended when necessary; Proven results: the versatility of the design has been effectively tested in implementations ranging from microcontrollers to supercomputers
Author : Daniel Barbará
Publisher : Springer Science & Business Media
Page : 266 pages
File Size : 26,65 MB
Release : 2012-12-06
Category : Computers
ISBN : 146150953X
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence.