| Brian T Contos - Computers - 2006 - 304 pages
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders ... | |
| Dave Tyson - Business & Economics - 2011 - 232 pages
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an ... | |
| Jacob Babbin - Computers - 2006 - 350 pages
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their ... | |
| Edward Amoroso - Business & Economics - 2012 - 336 pages
Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes ... | |
| Ray Bernard - Computers - 2015 - 160 pages
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was ... | |
| George L Stefanek - Computers - 2002 - 160 pages
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers ... | |
| Eric D. Knapp, Joel Thomas Langill - Computers - 2011 - 360 pages
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security ... | |
| John R. Vacca - Computers - 2010 - 320 pages
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management ... | |
| Kevvie Fowler - Business & Economics - 2016 - 256 pages
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and ... | |
| |