This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical bac..
The book covers the human immune system, massive distributed attacks (DDoS) and the future generations cyber attacks, Digital Immunity and the role of the Smart Grid, how Digital Immunity defends the smart city and annihilates massive malware, and Digital Immunity to combat global cyber terrorism...
This book analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presen..
This book analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presen..
Discusses successful approaches for the CISSP exam, provides sample questions and test-taking tips, and contains an annotated bibliography section that provides advice on helpful references for a given domain...
This book is a test prep book to help you pass the test. It discusses successful approaches for the exam, provides sample questions and test-taking tips, and contains an annotated bibliography that provides advice on helpful references for a given domain. With two complete 250-question sample exams,..
Compared to the US, EU data and privacy protection rules are Draconian. The new European rules apply to any enterprise doing business in the EU, and are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply with them...
Exploring privacy issues and the general concept of personal identity, this book delves into real-world biometrics applications and discusses the emergence of this reliable but underutilized technology...
Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an orga..
This book presents a comprehensive guide to web security and explains how companies can build a highly effective and sustainable security system. It reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons ..
This book examines why and how current security management practices fail at their basic foundation, causing in overall dissatisfaction by practitioners and lack of success in the corporate environment. It changes the understanding of the CISO's role, the selection process for a CISO, and the financ..