All counter of AlamanShop


Kijoon Chae, Moti Yung, WISA 200
Information Security Applications: 4th International Workshop, Wisa 2003, Jeju Island, Korea, August 2003 : Revised Papers (LECTURE NOTES IN COMPUTER SCIENCE)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 3540208275
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers (Lecture Notes … Computer Science / Security and Cryptology)

2009 y.
Publisher: —
Description: This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008. The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management. [detailed...]

ISBN: 3642003052
Book size: —; Page extent: 334.

 

PUT TO
THE BASKET
Timothy P. Layton Sr
Information Security Awareness

2005 y.
Publisher: —
Description: — [detailed...]

ISBN: 1420856324
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Ioana V. Bazavan, Ian Lim
Information Security Cost Management

2006 y.
Publisher: —
Description: Written in an accessible, informal style, Information Security Cost Management demonstrates how to strategically maximize a limited security budget without compromising the quality of risk management initiatives. Organized into management components, each chapter highlights common pitfalls in security initiatives and recommends cost saving methods to achieve intended results. It presents processes that show how to identify the most critical components of a system`s security, staff a security organization, prioritize spending, manage internal and external audits, assess costs for identity and access management, maximize the use of vendors, and evaluate the costs of outsourcing. [detailed...]

ISBN: 0849392756
Book size: —; Page extent: 280.

 

PUT TO
THE BASKET
Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates
Information Security Fundamentals

— y.
Publisher: —
Description: The purpose of information protection is to protect an organization`s valuable resources. Through the selection and application of appropriate safeguards, security helps an organization to meet its business objectives by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets. This book examines the elements of computer security, employee roles and responsibilities, and common threats. It also examines the need for management controls, policies and procedures, and risk analysis. Finally it presents a comprehensive list of tasks, responsibilities and objectives that make up a typical information protection program. [detailed...]

ISBN: 0849319579
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Michael G. Solomon
Information Security Illuminated (Jones and Barlett Illuminated)

2005 y.
Publisher: —
Description: Book DescriptionA comprehensive textbook that introduces students to current information security practices and prepares them for various related certifications. [detailed...]

ISBN: 076372677X
Book size: —; Page extent: 600.

 

PUT TO
THE BASKET
Thomas CALABRESE
Information Security Intelligence: Cryptographic Principles &, Applications

— y.
Publisher: —
Description: Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic techniques is presented and explained in simple mathematical terms. The text covers symmetrical and asymmetrical encryption, digital signatures, Kerberos, creation/deployment of strong keys and passwords, Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. A detailed examination of Tiny Encryption Algorithm (TEA) exposes readers to the inner workings of encryption. CD-ROM experiments help solidify the learning experience. Emphasis throughout is on the application of the cryptographic methods and support structures needed to effectively apply the principles to create a secure business setting. [detailed...]

ISBN: 1401837271
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Gurpreet Dhillon
Information Security Management : Global Challenges In the New Millennium

— y.
Publisher: —
Description: Information security is moving much higher up the agenda of corporate concerns. The potential pitfalls of corporate information are enormous. If information is our most important asset, then we must prepare ourselves for the task of protecting it properly. Information Security Management: Global Challenges in the New Millennium is a compilation of researchers and practitioners addressing issues, trends, and challenges facing the management of information security in the next millennium. The book focuses on aspects of information security planning, evaluation, design and implementation. [detailed...]

ISBN: 1878289780
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Gerard Blokdijk, Ivanka Menken
Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice

2008 y.
Publisher: —
Description: Contains ready to use Security policies and procedures. The book lays out in a comprehensive way an organization wide process to develop a secure information structure. The insights range from high level strategies, to lower level tactics, with a few verypractical examples thrown in here and there. Information security should be a critical concern of today`s high-tech organizations. But so often it is forgotten, or relegated into obscurity because there was too much (or not enough) process or the securty was too intrusive. The book strikes a good, pragmatic balance between convenience and security here. No company these days can afford to ignore the topic of information security, be it computers or just customer information. This book covers a proces approach to Manage Information Security Threats, Challenges, and Solutions. One of the things you will like about this book is its practicality. Because everything ties back into `what do you need to do`, there isn`t much filler… [detailed...]

ISBN: 1921523468
Book size: —; Page extent: 124.

 

PUT TO
THE BASKET

Information Security Management Handbook (Information Security Management Handbook)

2004 y.
Publisher: —
Description: Book DescriptionSince 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for use by practitioners to conduct the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Preparing for the examination is a major effort because it requires a thorough understanding of the topics contained in the Common Body of Knowledge (CBK) for thefield as specified in the Generally Accepted Systems Security Principles (GASSP). The handbook is one of the most important references used by candidates preparing for the exam.The Information Security Management Handbook maps the ten domains of the Common Body of Knowledge tested on the certification examination: access control issues and methodology, telecommunications and network security, security management practices, applications and systems development security, cryptography,… [detailed...]

ISBN: 0849332109
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Harold F. Tipton, Micki Krause
Information Security Management Handbook on CD-ROM, 2003 Edition

— y.
Publisher: —
Description: The four-volume set of the Information Security Management Handbook is now available on CD-ROM. Containing the complete contents of the set, readers get a resource that is lightweight and portable, linked and searchable by keyword, and organized under the Common Body of Knowledge (CBK) domains. Exportable text and hard copies are available at the click of a mouse. In addition to the four volumes of the most comprehensive resource on information security management, the CD-ROM version provides an extra volume`s worth of information that readers will not find anywhere else. [detailed...]

ISBN: 0849315786
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Harold F. Tipton, Micki Krause, Micki, Cissp Krause
Information Security Management Handbook, Fifth Edition

— y.
Publisher: —
Description: Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a `must have` book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference. [detailed...]

ISBN: 0849319978
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Harold F. Tipton, Micki Krause
Information Security Management Handbook, Fourth Edition, Volume II

— y.
Publisher: —
Description: The runaway growth of computer viruses and worms and the ongoing nuisance posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an organization`s security system an issue of prime importance. And information systems technology is advancing at a frenetic pace. Against this background, the challenges facing information security professionals are increasing rapidly.Information Security Management Handbook, Fourth Edition, Volume 2 is an essential reference for anyone involved in the security of information systems. [detailed...]

ISBN: 0849308003
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
W. Krag Brotby
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

2009 y.
Publisher: Auerbach Publications
Description: `Information Security Management Metrics` offers a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management. With case studies and tools for monitoring specific items, this book offers practical guidance for implementing metrics across an entire organization, thereby improving budget and resource allocation, and reducing the possibility that unanticipated events will have catastrophic impacts. The book presents metrics that complement those used by IT managers, and demonstrates how to make adjustments to metrics without interrupting business processes. [detailed...]

ISBN: 1420052853
Book size: —; Page extent: 200.

 

PUT TO
THE BASKET
Mariagrazia Fugini, Carlo Bellettini
Information Security Policies and Actions in Modern Integrated Systems

— y.
Publisher: —
Description: Information Security Policies and Actions in Modern Integrated Systems is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, and layered architectures. Contributions come both from the academic and the industrial field. [detailed...]

ISBN: 1591401860
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Thomas R. Peltier
Information Security Risk Analysis, Second Edition

2005 y.
Publisher: —
Description: Information Security Risk Analysis, Second Edition enables CIOs, CSOs, and MIS managers to understand when, why, and how risk assessments and analyses can be conducted effectively. This book discusses the principle of risk management and its three key elements: risk analysis, risk assessment, and vulnerability assessment. It examines the differences between quantitative and qualitative risk assessment, and details how various types of qualitative risk assessment can be applied to the assessment process. The text offers a thorough discussion of recent changes to FRAAP and the need to develop a pre-screening method for risk assessment and business impact analysis. [detailed...]

ISBN: 0849333466
Book size: —; Page extent: 360.

 

PUT TO
THE BASKET

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, … 2008 (Lecture Notes in Computer Science)

2008 y.
Publisher: —
Description: This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book, they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography. [detailed...]

ISBN: 3540799656
Book size: —; Page extent: 151.

 

PUT TO
THE BASKET

Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science)

2008 y.
Publisher: —
Description: This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007. The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security. [detailed...]

ISBN: 3540794980
Book size: —; Page extent: 534.

 

PUT TO
THE BASKET
Marian Quigley, Marian Quiqley
Information Security and Ethics: Social and Organizational Issues

— y.
Publisher: —
Description: Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student and industry professional. With individual chapters focusing on areas including: web accessibility, the digital divide, youth protection and surveillance, this book provides an invaluable resource for students, scholars and professionals currently working in Information Technology related areas. [detailed...]

ISBN: 1591402336
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings (Lecture Notes in Computer Science)

2008 y.
Publisher: —
Description: This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security. [detailed...]

ISBN: 3540699716
Book size: —; Page extent: 480.

 

PUT TO
THE BASKET
Acisp `9, Ed Dawson, Colin Boyd
Information Security and Privacy: Third Australasian Conference, Acisp`98, Brisbane, Australia, July 13-15, 1998 : Proceedings (Lecture Notes in Computer Science, 1438)

— y.
Publisher: —
Description: This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP`98, held in Brisbane, Australia, in Kuly 1998. The volume presents 35 revised full papers selected from a total of 66 submissions, also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures. [detailed...]

ISBN: 3540647325
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Vincent LeVeque
Information Security: A Strategic Approach

2006 y.
Publisher: —
Description: Bridging the gap between information security and strategic planning This publication is a reflection of the author`s firsthand experience as an information security consultant, working for an array of clients in the private and public sectors. Readers discover how to work with their organizations to develop and implement a successful information security plan by improving management practices and by establishing information security as an integral part of overall strategic planning. The book starts with an overview of basic concepts in strategic planning, information technology strategy, and information security strategy. A practical guide to defining an information security strategy is then provided, covering the `nuts and bolts` of defining long-term information security goals that effectively protect information resources. Separate chapters covering technology strategy and management strategy clearly demonstrate that both are essential,… [detailed...]

ISBN: 0471736120
Book size: —; Page extent: 272.

 

PUT TO
THE BASKET
Marie A., Ph.D. Wright, John S., Ph.D. Kakalik
Information Security: Contemporary Cases

2006 y.
Publisher: —
Description: Information Security: Contemporary Cases addresses fundamental information security concepts in realistic scenarios. Through a series of substantive cases, different aspects of information security are addressed by real organizations. The organizations include Kraft Foods, Advo, IBM, SRA, Aetna, the FBI, and the Yale New Haven Center for Emergency Preparedness and Disaster Response. Case topics include data protection, integrating IT and physical security, contingency planning, disaster recovery, network security, hardware design, encryption, standards compliance, tracking intruders, and training and awareness programs. This casebook will enable students to develop the practical understanding needed for today`s information security/information assurance profession. [detailed...]

ISBN: 0763738190
Book size: —; Page extent: 214.

 

PUT TO
THE BASKET
Donald L. Pipkin, Donald Pipkin
Information Security: Protecting the Global Enterprise

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0130173231
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Isw 200, Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Information Security: Third International Workshop, Isw 2000, Wollongong, Australia, December 20-21, 2000 : Proceedings (Lecture Notes in Computer Science, 1975)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 3540414169
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Timothy P. Layton
Information Security

2006 y.
Publisher: —
Description: Information Security presents an in-depth perspective of the ISO/IEC 17799 Information Security Standard and provides a detailed analysis of how to effectively measure an information security program using this standard. It includes a qualitative-based risk assessment methodology and describes a quantitative measurement framework that organizations can adopt and implement within the risk assessment process, allowing firms to customize practices to their own needs. This text also includes a comprehensive gap analysis of the recently rescinded standard against the newly released version, making the transition to the new standard much easier for organizations and practitioners. [detailed...]

ISBN: 0849370876
Book size: —; Page extent: 222.

 

PUT TO
THE BASKET
Gary Marchionini, J. Long
Information Seeking in Electronic Environments (Cambridge Series on Human-Computer Interaction)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0521586747
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Information Services for Innovative Organizations (Library and Information Science)

— y.
Publisher: —
Description: This well-written guide for the design and management of information services it tailored to suit the needs of students in information services management, both in schools of library and information science and in schools of business management. It is also intended for practitioners--librarians and other managers--who provide information to services in business, industry, and government, either from within an organization or as external consultants and contractors. In addition this book will assist thosemanagers of computer and communications facilities. Key Features * This book offers a sound basis for the design and management of information services to: * Provide decision makers with help for the management of change * Make corporate decision makers aware of information as an asset and as a strategy for improved, innovative decisions * Make information service providers potential sources of innovation for any organization that processes information [detailed...]

ISBN: 0124650309
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Alistair S. Duff
Information Society Studies (Routledge Research in Information Technology and Society)

— y.
Publisher: —
Description: We are often told that we are `living in an information society` or that we are `information workers`. But what exactly do these claims mean, and how might they be verified? In this important methodological study, Alistair Duff cuts through the rhetoricto get to the bottom of the `information society thesis`. Duff presents the argument that there are in reality several `information society theses`, each with its own disciplinary origin and tradition. One talks about an `information economy`. Another, the Japanese theory of the `informationised society`, measures communication flows, while a third focuses on IT and the `information revolution`. This book brings together the various schools and examines them systematically in a comparative setting. It represents one of the first in-depth treatments of the field as a whole. Wide-ranging in coverage, this work will be of interest to scholars in information science, communication and media studies and social theory. It is a… [detailed...]

ISBN: 041521551X
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Slavko Splichal, Andrew Calabrese
Information Society and Civil Society: Contemporary Perspectives on the Changing World Order

1994 y.
Publisher: Purdue University Press
Description: A number of authors, including several contributors to this collection, argue that on the eve of the twenty-first century, civil society is beginning to disintegrate everywhere. In this volume, fifteen scholars from ten different countries address that argument by problematizing the relation between the older concept, civil society, and the newer one, information society, and offering perspectives on future directions. [detailed...]

ISBN: 1557530432
Book size: —; Page extent: 372.

 

PUT TO
THE BASKET
Tuula Heiskanen, Jeff Hearn, Tuula Heiskannen, Jeff Hearne
Information Society and the Workplace: Spaces, Boundaries and Agency (Routledge Studies in Technology, Work and Organisations)

— y.
Publisher: —
Description: Bringing together studies of everyday local practices in workplaces within information society, this book has a special focus on social space and the agency of actors. It includes both theoretical reviews and detailed qualitative research. It also highlights the political challenges of the information society, challenges which are likely to become subjects of international concern. [detailed...]

ISBN: 0415272238
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Сайт создан в системе uCoz