Hidden fields
Books Books

Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise ...

Brian T Contos - Computers - 2006 - 304 pages
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders ...
Limited preview - About this book

InfoSecurity 2008 Threat Analysis

Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg - Computers - 2011 - 480 pages
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress ...
Limited preview - About this book

Security Convergence: Managing Enterprise Security Risk

Dave Tyson - Business & Economics - 2011 - 232 pages
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an ...
Limited preview - About this book

Security Log Management: Identifying Patterns in the Chaos

Jacob Babbin - Computers - 2006 - 350 pages
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their ...
Limited preview - About this book

Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION

Edward Amoroso - Business & Economics - 2012 - 336 pages
Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes ...
Limited preview - About this book

Security Technology Convergence Insights

Ray Bernard - Computers - 2015 - 160 pages
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was ...
Limited preview - About this book

Information Security Best Practices: 205 Basic Rules

George L Stefanek - Computers - 2002 - 160 pages
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers ...
Limited preview - About this book

Industrial Network Security: Securing Critical Infrastructure Networks for ...

Eric D. Knapp, Joel Thomas Langill - Computers - 2011 - 360 pages
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security ...
Limited preview - About this book

Managing Information Security

John R. Vacca - Computers - 2010 - 320 pages
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management ...
Limited preview - About this book

Data Breach Preparation and Response: Breaches are Certain, Impact is Not

Kevvie Fowler - Business & Economics - 2016 - 256 pages
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and ...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search