krainaksiazek security and intelligence issues in an evolving world 20124277

- znaleziono 28 produktów w 4 sklepach

Advanced Cyber Security - 2826941444

234,74 zł

Advanced Cyber Security John Wiley & Sons Inc

Książki / Literatura obcojęzyczna

Attain true cyber security amidst ever-evolving threats using a holistic approach to defense Advanced Cyber Security is a practical guide to protecting your organization from cyber attacks using advanced active counter measures. Predict and guard against cyber attacks before they occur, by implementing cutting-edge static and dynamic active defense operations based on attack profile intelligence. This book walks you through the tools, techniques, and strategies that keep your organization's information secure, providing tips and tricks, as well as warning about common pitfalls. Case studies demonstrate the latest in attack intelligence profiling, active defense through social media, email operations, crowd sourcing, and cross-disciplinary data science applications, giving you insight into how these tools are being applied most effectively by companies around the world. A discussion about the future of cyber security proposes future defense models and provides an insightful look at what's coming down the pipeline. Cyber-threats are a top priority for businesses and governments and, as the threats change and develop, the need for effective countermeasures will only increase. This book helps you get out in front of the threat with a robust defense strategy, utilizing the newest, most effective methods in the field today. * Locate your system's vulnerabilities * Build an effective defense against attacks * Navigate the new security ecosystem * Explore emerging cyber defense technology Effective cyber defense requires a holistic approach. Attacks can come from any quarter, and are becoming increasingly sophisticated, leaving traditional countermeasures wholly inadequate and reactive approaches insufficient. Defense-as-usual is now simply damage control. Advanced Cyber Security shows you what true cyber security now requires, and gives you clear guidance toward effective implementation.

Sklep: Libristo.pl

Contemporary Security Studies - 2826826751

181,98 zł

Contemporary Security Studies Oxford University Press

Książki / Literatura obcojęzyczna

Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the field, it features an impressive breadth and depth of coverage of the different theoretical approaches to the study of security and the ever-evolving range of issues that dominate the security agenda in the 21st Century. Throughout the text, students are encouraged to question their own preconceptions and assumptions, and to use their own judgement to critically evaluate key approaches and ideas. To help them achieve this, each chapter is punctuated with helpful learning features including 'key ideas', 'think points' and case studies, demonstrating the real world applications and implications of the theory. In addition to covering a wide range of topical security issues, from terrorism and inter-state armed conflict to cybersecurity, health, and transnational crime, the fourth edition features a new chapter on postcolonialism and expanded coverage of critical security studies. The book is supported by an Online Resource Centre designed to help students take their learning further. For students: - Explore relevant security issues in greater depth with additional online case studies. - Test your understanding of the key ideas and themes in each chapter with self-marking multiple-choice questions. For registered lecturers: - Use the adaptable PowerPoint slides as the basis for lecture presentations, or as hand-outs in class.

Sklep: Libristo.pl

Information Security - 2826724258

646,32 zł

Information Security Wiley-Blackwell (an imprint of John Wiley & Sons...

Książki / Literatura obcojęzyczna

Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive set of classroom-tested PowerPoint slides and a solutions manual are available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields. A solutions manual is available. Please email digialo@wiley.com to obtain it.

Sklep: Libristo.pl

Security Leader Insights for Business Continuity - 2827169427

127,07 zł

Security Leader Insights for Business Continuity Elsevier Science & Technology

Książki / Literatura obcojęzyczna

How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Business Continuity, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in business continuity. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. It includes chapters on the business resiliency and emergency preparedness, leading during a crisis, corporate social responsibility, and the Voluntary Private Sector Preparedness Certification Program. Security Leader Insights for Business Continuity is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real-world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. * Each chapter can be read in five minutes or less, and is written by or contains insights from experienced security leaders.* Can be used to find illustrations and examples you can use to deal with a relevant issue.* Brings together the diverse experiences of proven security leaders in one easy-to-read resource.

Sklep: Libristo.pl

Data and Application Security, 1 - 2826865738

1419,87 zł

Data and Application Security, 1 Springer, Berlin

Książki / Literatura obcojęzyczna

New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. §Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: §Electronic Commerce, XML and Web Security; §Workflow Security and Role-based Access Control; §Distributed Objects and Component Security; §Inference Problem, Data Mining and Intrusion Detection; §Language and SQL Security; §Security Architectures and Frameworks; §Federated and Distributed Systems Security; §Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000.

Sklep: Libristo.pl

Globalization and Security - 2836096438

587,26 zł

Globalization and Security Praeger Security International

Książki / Literatura obcojęzyczna

Globalization and Security: An Encyclopedia addresses the need for an authoritative, but accessible analysis of the impact of globalization on security and its multifaceted aspects. Broad in scope, this two-volume set covers the economic and political aspects of globalization, as well as its social and cultural impacts. More importantly, it is the first work to focus explicitly on security, including human security broadly conceived, and the role that globalization plays in the world's new and ever-evolving security environment. While more books on globalization are becoming available, none focus on the impact of globalism on security-related issues as this set does. Drawing on the expertise of specialists from many disciplines and nations, Globalization and Security directly addresses the needs of one of the fastest-growing areas of study, the intersection of globalization and security worldwide.

Sklep: Libristo.pl

Advances in Cyber Security - 2827090647

483,41 zł

Advances in Cyber Security Fordham University Press

Książki / Literatura obcojęzyczna

As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security--including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideas and construct feasible and practical solutions for defending against all kinds of adversaries and attacks. Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public-private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyber ecosystem.

Sklep: Libristo.pl

National Security - 2212829411

708,30 zł

National Security Elsevier Science Publishers

Inne 1

This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational issues under investigation.This book is intended to be used as both a textbook and a comprehensive research handbook. The contributors to this edited volume are renowned experts in their respective fields. Most of the chapters contained in this book provide an updated comprehensive survey of the related field and also specific findings from cutting-edging innovative research. To facilitate its adoption as a textbook, all the authors have included specific discussion questions that could be utilized to stimulate discussions and potentially further research in the area. This book addresses three

Sklep: Albertus.pl

World Beyond Digital Rights Management - 2827029195

188,45 zł

World Beyond Digital Rights Management British Computer Society

Książki / Literatura obcojęzyczna

The rapid advances in digital technology have meant that digitised content is now readily available to most people. However content owners and commercial stakeholders face a constant battle to protect their intellectual property and commercial rights. Jude Umeh outlines the issues behind this battle, current solutions to the problem and looks to a future beyond digital rights management. Content creators, law makers and businesses must learn to work together with end-users, in order to harness the fantastic opportunities presented in this book for a step change in global cultural evolution, and a stake in the evolving digital content economy. Aimed at stakeholders in digital content and rights management from: media and entertainment businesses, law & intellectual property protection, information technology & security, regulatory compliance, and consumers of digital content.

Sklep: Libristo.pl

Governance In A Globalizing World - 2840063598

134,99 zł

Governance In A Globalizing World

Książki Obcojęzyczne>Angielskie>Society & social sciences>Society & culture: general>Social issues & processes>GlobalizationKsiążki Obc...

An Exploration Of The Impact Of Governance On Culture, Economics, Security And The Environment In A Globalized World. The Book Aims To Answer Three Questions: How Are Patterns Of Globalization Currently Evolving?; How Do These Patterns Affect Governance?; And How Might Globalism Itself Be Governed?

Sklep: Gigant.pl

Information Technology Management - 2822223241

935,58 zł

Information Technology Management John Wiley & Sons

Medycyna > English Division

Up-to-date coverage on how new technology is changing the way organizations operate and compete Every day, new technology influences how organizations operate and compete in the current global environment, and this updated edition of a classic provides authoritative and streamlined coverage of this evolving topic. High-profile topics are discussed, such as social networks, green IS, and business intelligence, and global examples span a wide range of subject matter. You'll explore IT governance, connectivity that blurs public and private lives, sustainability, enterprise social media, and viral and social marketing.* Offers completely updated coverage on the evolving topic of the way organizations operate and compete in the current global environment* Addresses issues involving social networks, green IS, and business intelligence* Features real-world examples that deal with international issues Packed with real-world examples and coverage of international topics, Information Technology for Management, Eighth Edition, is critical reading for anyone involved in this field.

Sklep: Ksiazki-medyczne.eu

Professional Microsoft PowerPivot for Excel and SharePoint - 2826627165

167,39 zł

Professional Microsoft PowerPivot for Excel and SharePoint Wiley

Książki / Literatura obcojęzyczna

With PowerPivot, Microsoft brings the power of Microsoft's business intelligence tools to Excel and SharePoint users. Self-service business intelligence today augments traditional BI methods, allowing faster response time and greater flexibility. If you're a business decision-maker who uses Microsoft Office or an IT professional responsible for deploying and managing your organization's business intelligence systems, this guide will help you make the most of PowerPivot. Professional Microsoft PowerPivot for Excel and SharePoint describes all aspects of PowerPivot and shows you how to use each of its major features. By the time you are finished with this book, you will be well on your way to becoming a PowerPivot expert. This book is for people who want to learn about PowerPivot from end to end. You should have some rudimentary knowledge of databases and data analysis. Familiarity with Microsoft Excel and Microsoft SharePoint is helpful, since PowerPivot builds on those two products. This book covers the first version of PowerPivot, which ships with SQL Server 2008 R2 and enhances Microsoft Office 2010. It provides an overview of PowerPivot and a detailed look its two components: PowerPivot for Excel and PowerPivot for SharePoint. It explains the technologies that make up these two components, and gives some insight into why these components were implemented the way they were. Through an extended example, it shows how to build a PowerPivot application from end to end. The companion Web site includes all the sample applications and reports discussed. What This Book Covers After discussing self-service BI and the motivation for creating PowerPivot, the book presents a quick, end-to-end tutorial showing how to create and publish a simple PowerPivot application. It then drilsl into the features of PowerPivot for Excel in detail and, in the process, builds a more complex PowerPivot application based on a real-world case study. Finally, it discusses the server side of PowerPivot (PowerPivot for SharePoint) and provides detailed information about its installation and maintenance. Chapter 1, "Self-Service Business Intelligence and Microsoft PowerPivot," begins Part I of the book. This chapter describes self-service BI and introduces PowerPivot, Microsoft's first self-service BI tool. It provides a high-level look at the two components that make up PowerPivot - PowerPivot for Excel and PowerPivot for SharePoint. Chapter 2, "A First Look at PowerPivot," walks you through a simple example of creating a PowerPivot application from end to end. In the process, it shows how to set up the two components of PowerPivot, and describes the normal workflow of creating a simple PowerPivot application. Chapter 3, "Assembling Data," starts off Part II of the book, and explains how to bring data into PowerPivot from various external data sources. It also introduces the extended example that you will build in this and subsequent chapters. Chapter 4, "Enriching Data," shows how to enhance the data you brought into your application by creating relationships and using PowerPivot's expression language, Data Analysis Expressions (DAX). Chapter 5, "Self-Service Analysis," describes how to use your PowerPivot data with various Excel features, such as PivotTables, PivotCharts, and slicers to do analysis. Chapter 5 also delves further into DAX, showing how to create and use DAX measures. Chapter 6, "Self-Service Reporting," shows how to publish your PowerPivot workbook to the server side of PowerPivot (PowerPivot for SharePoint), and make use of its features to view and update PowerPivot reports. It also shows how to use the data in a PowerPivot workbook as a data source for reports created in other tools such as Report Builder 3.0 and Excel. Chapter 7, "Preparing for SharePoint 2010," is the first chapter in Part III of the book. It describes the components of SharePoint 2010 that are relevant for PowerPivot, and looks at how PowerPivot for SharePoint interacts with those components. Chapter 8, "PowerPivot for SharePoint Setup and Configuration," provides instructions on how to set up and configure a multi-machine SharePoint farm that contains PowerPivot for SharePoint. Chapter 9, "Troubleshooting, Monitoring, and Securing PowerPivot Services," gives tips on how to troubleshoot PowerPivot for SharePoint issues. It also shows how to monitor the health of your PowerPivot for SharePoint environment, and discusses relevant security issues. Chapter 10, "Diving into the PowerPivot Architecture," describes at a deeper level the architecture of PowerPivot, both client and server. It also explains the Windows Identity Foundation and discusses the use of Kerberos in the context of PowerPivot for SharePoint. Chapter 11, "Enterprise Considerations," talks about common PowerPivot for SharePoint enterprise considerations: capacity planning, optimizing the environment, upgrade considerations, and uploading performance. Appendix A provides instructions for setting up the data sources that are used to build the SDR Healthcare extended example in Chapters 3 through 6. Additionally, two "bonus" elements are available online at this book's companion Web site: Appendix B is a comprehensive DAX reference that describes all the DAX functions and provides code snippets that show how to use them. A special chapter describes real-world scenarios in which PowerPivot is used to solve common problems.

Sklep: Libristo.pl

Dark Web - 2826663972

780,86 zł

Dark Web Springer, Berlin

Książki / Literatura obcojęzyczna

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups, including web sites, forums, chat rooms, blogs, social networking sites, videos, virtual world, etc. We have developed various multilingual data mining, text mining, and web mining techniques to perform link analysis, content analysis, web metrics (technical sophistication) analysis, sentiment analysis, authorship analysis, and video analysis in our research. The approaches and methods developed in this project contribute to advancing the field of Intelligence and Security Informatics (ISI). Such advances will help related stakeholders to perform terrorism research and facilitate international security and peace. §This monograph aims to provide an overview of the Dark Web landscape, suggest a systematic, computational approach to understanding the problems, and illustrate with selected techniques, methods, and case studies developed by the University of Arizona AI Lab Dark Web team members. This work aims to provide an interdisciplinary and understandable monograph about Dark Web research along three dimensions: methodological issues in Dark Web research; database and computational techniques to support information collection and data mining; and legal, social, privacy, and data confidentiality challenges and approaches. It will bring useful knowledge to scientists, security professionals, counterterrorism experts, and policy makers. The monograph can also serve as a reference material or textbook in graduate level courses related to information security, information policy, information assurance, information systems, terrorism, and public policy.

Sklep: Libristo.pl

Counterterrorism and Cybersecurity - 2841438295

366,95 zł

Counterterrorism and Cybersecurity Springer, Berlin

Książki / Literatura obcojęzyczna

Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood.§Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace. The book offers practical advice for businesses, governments, and individuals to better secure the world and protect cyberspace. It quotes U.S. Navy Admiral and NATO s Supreme Allied Commander James Stavridis: Instead of building walls to create security, we need to build bridges. The book also provides a glimpse into the future of Plan X and Generation Z, along with an ominous prediction from security advisor Marc Goodman at TEDGlobal 2012: If you control the code, you control the world. §Counterterrorism and Cybersecurity: Total Information Awareness will keep you up at night but at the same time give you some peace of mind knowing that our problems are manmade therefore they can be solved by man [or woman], as President John F. Kennedy said at the American University commencement in June 1963.

Sklep: Libristo.pl

GeoSpatial Visual Analytics - 2826921285

1776,38 zł

GeoSpatial Visual Analytics Springer Netherlands

Książki / Literatura obcojęzyczna

The extremely wide range of often multidimensional environmental information made available at the global scale poses a great challenge to technologists and scientists and intelligence specialists, to find extremely sophisticated yet effective ways to provide access to very relevant data patterns within such a vast and highly dynamic information flow.§In the past years the domain of 3D scientific visualization has tried to provide a viable solution to operators willing to gain insight into the simulation results in a way that eases understanding of an evolving phenomenon. However 3D data visualization alone does not provide model and hypothesis-making and validation. In order to answer to this issue, in recent years research trends have brought to an effective combination of data mining and information visualization, often referred to as Visual Analytics (VA).§The main goal of this volume is to pin-point critical issues, to define a priority list to be addressed by the research agenda as well as to put forward recommendations and guidelines. The resulting volume tackles a wide range of application domains, all relevant to environmental security, it highlights current industrial trends, technological requirements and, last but not least, possible emerging market interests.

Sklep: Libristo.pl

szukaj w Kangoo krainaksiazek security and intelligence issues in an evolving world 20124277

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z krainaksiazek pl security and intelligence issues in an evolving world 20124277

2. Szukaj na wszystkich stronach serwisu

t1=0.076, t2=0, t3=0, t4=0.027, t=0.076

Dla sprzedawców

copyright © 2005-2016 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER