Protecting Information on Local Area Networks


Book Description

Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available. Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rationale for network information security and explain the development of a company information network security policy. This book discusses as well security or network-connected personal computers. The final chapter deals with a number of major vulnerabilities of information when communicated or processed on network-connected personal computers. This book is a valuable resource for research scientists, technical security specialists, information systems specialists, and systems administrators.




Data Protection and Security for Personal Computers


Book Description

Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively. Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization. Practical, comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks. UNIQUE FEATURES INCLUDE: – Totally PC and LAN specific – Practical tips and guidance – Comprehensive coverage of the topic – Unique action sheets for immediate implementation – Step–by– step coverage, easy to read, with limited technical jargon WHO SHOULD READ THIS GUIDE: – PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data. – Senior managers who wish to ensure that data on their employees PC's is safe at all times. – Managers with little computing or security experience who wish to implement a security policy throughout an organization. Please note this is a Short Discount publication.




Handbook of Wireless Local Area Networks


Book Description

Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single comprehensive reference on the subject. Addressing challenges related to the further development of WLAN technology, the Handbook covers the entire spectrum of topics from basic concepts t




Computer Network Security


Book Description

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully reviewed and selected from a total of 54 submissions. The papers are organized in topical sections on security modeling and covert channels, security policies and formal analysis of security properties, authentication, authorization, access control and public key cryptography, intrusion and malware detection, security of multi-agent systems and software protection, as well as. adaptive security, security analysis and virtualization.




Computers at Risk


Book Description

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.




Protecting Critical Information and Technology


Book Description

Partial contents: plenary sessions (intellectual property & national security; technology transfer; economic espionage); workshops (establishing an OPSEC program); acquisition/treaties (arms control synergism; on-site inspection); counterintelligence/ intelligence (Chinese security & economic interests; enviro- terrorism); counterintelligence/law enforcement (counter-narcotics); economics (Japanese business intelligence; protecting trade secrets); general issues (computer crime; literature intelligence; FOIA requests; deception & cognition); technology (semiconductor industry; unclassified technology; call diversion).







Network and System Security


Book Description

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more. Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work Presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions




CRC Handbook of Local Area Network Software


Book Description

Local Area Networks (LANs) play a larger role in our lives today than ever before. For example, LANs provide us with the capability to realize automated banking services, with instant credit checking and numerous other diverse access and manipulation services. Users and developers of LAN products must understand the architecture of the hardware and software mechanisms to effectively design and use such systems. Most gains in LAN productivity will come from future software developments in systems management and applications. This book provides an introduction to the technology associated with Local Area Networks, emphasizing software aspects which have been secondary considerations to hardware in most existing texts. The book also provides a review of the technology needed to realize full service software products, such as computer-aided design and manufacturing systems, large publication systems, and integrated data service networks, and includes an exhaustive review of the products available today.




Guidelines for Securing Wireless Local Area Networks (WLANS)


Book Description

The purpose of this publication is to help organizations improve their WLAN security by providing recommendations for WLAN security configuration and monitoring. This publication supplements other NIST publications by consolidating and strengthening their key recommendations.