All counter of AlamanShop


John Honnold, Steven L. Harris, Charles W. Mooney
Security Interests in Personal Property: Cases, Problems and Materials (University Casebook Series)

— y.
Publisher: —
Description: The dominant theme of this book is the extension of credit. Chapter 1 covers the fundamentals of the legal rights of creditors. The remainder of the book focuses on the legal arrangements that give a creditor powers over personal property of the debtor. [detailed...]

ISBN: 1566629497
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Debra Cameron
Security Issues for the Internet and the World Wide Web

— y.
Publisher: —
Description: CTR`s 219-page report helps information systems (IS) managers evaluate what security measures are needed to ensure cost-effective, optimum protection for company resources when implementing Internet and Web applications. In addition to discussing the technological solutions to security problems, the report also explores how company policies and procedures must be arranged to ensure users and developers implement the necessary security practices. Are Your Corporate Resources at Risk? Security concerns, including hacker incidents, computer viruses, online theft, and the breaking of encryption schemes, represent the single most important factor information systems (IS) managers cite for delaying Internet adoption. CTR`s report, Security Issues for the Internet and the World Wide Web, helps IS managers evaluate what security measures are needed to ensure cost-effective, optimum protection for the corporate network. The growing trend towards connecting World Wide Web (the… [detailed...]

ISBN: 156607973X
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Jacob Babbin, Dave Kleiman, Everett F. Carter Jr., Jeremy Faircloth, Mark Burnett, Esteban Gutierrez
Security Log Management: Identifying Patterns in the Chaos

2006 y.
Publisher: —
Description: As a system administrator or security professionals, you probably find yourself inundated each day with a deluge of log files from seemingly countless devices, servers, and applications on your network ranging from Windows Server to Snort to your PIX firewall and everything in between. At times, the task of `seeing the forest through the trees` to extract useful, repeatable information from these logs may seem almost impossible. This unique book will show you how to use a combination of open source software such as Tcpdstats, and Snort perfmonitor to create succinct, meaningful reports that give you the big picture of your network`s overall health and well being. So, if you need to analyze and prioritize everything from how much of your bandwidth is devoted to browsing ESPN.com, to the most targeted machines in your IDS logs, this is the book for you. This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable… [detailed...]

ISBN: 1597490423
Book size: —; Page extent: 350.

 

PUT TO
THE BASKET

Security Management : Business Strategies for Success

— y.
Publisher: —
Description: Security personnel are being asked to justify their existence in a corporate environment. They must prove their worth in dollars and cents by showing the return on investing in loss prevention. This means security departments are being forced to contribute more to the business as a whole. This book will show security managers and personnel how to go about this, and how to achieve quality in their departments. Suggests security should be a valued resource within the corporation that can contribute to bottom line performance. Teaches security managers to approach their jobs as `business managers who specialize in security`. Written by Security Magazine`s 1987 Executive Achievement Award recipient. [detailed...]

ISBN: 0750694920
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 &, WG 11.5 Joint Working Conference (IFIP International Federation for Information Pr

2005 y.
Publisher: —
Description: The proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems address the increasing need for ensuring proper standards of integrity and control in information systems in an organizational context. The aim of this research is to guarantee that data, software, and the business processes are complete, adequate, and valid for the intended functionality and expectations of the owner (i.e. the user organization). [detailed...]

ISBN: 0387298266
Book size: —; Page extent: 373.

 

PUT TO
THE BASKET
P. J. Ortmeier
Security Management: An Introduction (2nd Edition)

2004 y.
Publisher: —
Description: - [detailed...]

ISBN: 0131137921
Book size: —; Page extent: 336.

 

PUT TO
THE BASKET
Donald Bruce Keim, William T. Ziemba
Security Market Imperfections in World Wide Equity Markets (Publications of the Newton Institute , No 9)

— y.
Publisher: —
Description: The study of security market imperfections, namely, the predictability of equity stock returns, is one of the fundamental research areas in financial modeling. In this book leading academics and investment researchers provide a complete and current account of work in this area, including both cross-sectional and time series analyses, as well as measurement of risk and prediction models that have been used by institutional investors. The case studies cover many worldwide markets including the United States, Japan, Asia, and Europe. Invaluable for courses in financial engineering, investment and portfolio management, the volume is also a superb reference for investment professionals seeking an up-to-date source on return predictability. [detailed...]

ISBN: 0521571383
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Security Markets : Stochastic Models (Economic Theory, Econometrics, and Mathematical Economics)

— y.
Publisher: —
Description: This is a graduate level work covering the economic principles of security markets. Interested readers include students and researchers in economics and finance, as well as financial analysts following the latest theoretical developments in capital assetpricing. [detailed...]

ISBN: 012223345X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Andrew Jaquith
Security Metrics: Replacing Fear, Uncertainty, and Doubt

2007 y.
Publisher: Addison-Wesley Professional
Description: Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization`s unique requirements. You`ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management`s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith`s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You`ll learn how to: Replace nonstop… [detailed...]

ISBN: 0321349989
Book size: —; Page extent: 336.

 

PUT TO
THE BASKET
Jeffrey J. P. Tsai
Security Modeling And Analysis of Mobile Agent Systems (Electrical and Computer Engineering)

2006 y.
Publisher: —
Description: - [detailed...]

ISBN: 1860946348
Book size: —; Page extent: 212.

 

PUT TO
THE BASKET

Security Operations Management

— y.
Publisher: —
Description: Security Operations Management takes concepts from business administration and criminal justice schools and incorporates them into the world of security management. It is comprehensive text focused on theoretical and research-oriented overviews of the core principles of security management. The book includes critical issues faced by real-life security practitioners and explores how they were resolved. The book is written for practitioners, students, and general managers who wish to understand and manage security operations more effectively. The book explains the difficult task of bringing order to the security department`s responsibilities of protecting people, intellectual property, physical assets and opportunity. In addition, the book covers theoretical and practical management-oriented developments in the security field, including new business models and e-management strategies. Discussions provide coverage of both the business and technical sides of… [detailed...]

ISBN: 0750670878
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Security Planning and Design : A Guide for Architects and Building Design Professionals (Security)

2003 y.
Publisher: —
Description: Book DescriptionThis important reference from the American Institute of Architects provides architects and other design professionals with the guidance they need to plan for security in both new and existing facilities Security is one of the many design considerations that architects must address and in the wake of the September 11th 2001 events, it has gained a great deal of attention This book emphasises basic concepts and provides the architect with enough information to conduct an assessment of client needs as well as work with consultants who specialise in implementing security measures. Included are chapters on defining security needs, understanding threats, blast mitigation, building systems, facility operations and biochemical protection. * Important reference on a design consideration that is growing in importance * Provides architects with the fundamental knowledge they need to work with clients and with security consultants * Includes… [detailed...]

ISBN: 047127156X
Book size: —; Page extent: 256.

 

PUT TO
THE BASKET
Michele Graziadei
Security Rights in Movable Property in European Private Law (The Common Core of European Private Law)

2004 y.
Publisher: —
Description: Book DescriptionThe book presents a survey of the law relating to secured transactions in all member states of the European Union. Following the Common Core Approach, the national reports are centered around 15 hypothetical cases dealing with the most important issues of secured transactions law such as the creation of security rights in different business situations, the relationship between debtor and secured creditor, the nature of the creditor`s rights and their enforcement as against third parties. Each case is followed by a comparative summary. A general report evaluates the possibilities of European harmonization. [detailed...]

ISBN: 052183967X
Book size: —; Page extent: 826.

 

PUT TO
THE BASKET
Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O`Connor
Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures

2007 y.
Publisher: —
Description: Proven set of best practices for security risk assessment and management, explained in plain English This guidebook sets forth a systematic, proven set of best practices for security risk assessment and management of buildings and their supporting infrastructures. These practices are all designed to optimize the security of workplace environments for occupants and to protect the interests of owners and other stakeholders. The methods set forth by the authors stem from their research at Sandia National Laboratories and their practical experience working with both government and private facilities. Following the authors` step-by-step methodology for performing a complete risk assessment, you learn to: Identify regional and site-specific threats that are likely and credible Evaluate the consequences of these threats, including loss of life and property, economic impact, as well as damage to symbolic value and public confidence Assess the… [detailed...]

ISBN: 0471793523
Book size: —; Page extent: 384.

 

PUT TO
THE BASKET
Erik Pace Birkholz, Brian Kenyon, Steven Andre
Security Sage`s Guide to Hardening the Network Infrastructure

— y.
Publisher: —
Description: Security Sage`s Guide to Hardening the Network Infrastructure will be the only publication that provides security and Information Technology (IT) professionals an in-depth and comprehensive view of network devices, protocols and architectures. It provides detailed guidance on real-world network threats and exposures. While most network security books focus on ancillary topics, such as operating systems, RDBMS, groupware, and other applications, this book will concentrate strictly on the nuts and bolts of networks, such as routers, firewalls, Intrusion Detection Systems (IDS) and the networking protocols that work in congress with them. It has over 200 pages dedicated to the most up-to-date network layer attacks and mitigation techniques across an wide assortment of vendors and not just the typical attention paid to market leaders such as Cisco and Checkpoint. This expanded breadth will help reach a wider range of network engineers who may not have the budget to purchase and install… [detailed...]

ISBN: 1931836019
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
F.-A. Allaert, Bernd Blobel, Lees Louwerse, Barry Barber, Francois-Andre Allaert
Security Standards for Healthcare - MEDSEC

— y.
Publisher: —
Description: The Information Society initiatives that have been launched around the world will ensure that the citizens of Europe will be increasingly dependent upon Information Systems for the delivery of their Healthcare. The security issues that arise from this dependence are slowly being recognised and the development of appropriate standards to address these security issues is now under way. This book brings together a standards-based perspective on these developments and an outline of the available standards and the issues associated with them. It, also, outlines the MEDSEC training course on the Healthcare Security Standards. [detailed...]

ISBN: 1586030000
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Mary Pat McCarthy, Stuart Campbell
Security Transformation: Digital Defense Strategies to Protect your Company`s Reputation and Market Share

— y.
Publisher: —
Description: A revolutionary approach to digital security as a tool for protecting information assets and building customer loyalty, operational efficiency, and market share Much has been written lately about the many competitive advantages of using Web technologies to create `transparent` organizations, open to customers, suppliers, and alliance partners. Yet, until now, there have been no comprehensive accounts of the grave security risks those very same advantages can pose. Written by a coauthor of the bestselling Digital Transformation, Security Transformation brings executives and managers up to speed on E-business security issues and offers tried-and-true methods for protecting precious information assets. More important, with thehelp of fascinating case studies, the authors describe a proven approach to the strategic use of digital security as a powerful front-office tool for building a company`s reputation as well as customer loyalty. [detailed...]

ISBN: 0071379665
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Lecture Notes in Computer Science)

2008 y.
Publisher: —
Description: This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were careflly reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange. [detailed...]

ISBN: 3540858547
Book size: —; Page extent: 423.

 

PUT TO
THE BASKET
Philip Purpura
Security and Loss Prevention, Fifth Edition: An Introduction

2007 y.
Publisher: —
Description: - [detailed...]

ISBN: 0123725259
Book size: —; Page extent: 448.

 

PUT TO
THE BASKET
Tomas Sander, Acm Conference on Computer and Communications Security 2001 Philadelp
Security and Privacy in Digital Rights Management

— y.
Publisher: —
Description: This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Security and Privacy in Digital Rights Management, DRM 2001, held during the ACM CCS-8 Conference in Philadelphia, PA, USA, in November 2001. The 14 revised full papers presented were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on renewability, fuzzy hashing, cryptographic techniques and fingerprinting, privacy and architectures, software tamper resistance,cryptanalysis, and economic and legal aspects. [detailed...]

ISBN: 3540436774
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, … Federation for Infor

2006 y.
Publisher: —
Description: The IT environment now includes novel, dynamic approaches such as mobility, wearability, ubiquity, ad hoc use, mind/body orientation, and business/ market orientation. This modern environment challenges the whole information security research community to focus on interdisciplinary and holistic approaches while retaining the benefit of previous research efforts. This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on `Security and Privacy in Dynamic Environments`. The papers in this have a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics. [detailed...]

ISBN: 038733405X
Book size: —; Page extent: 494.

 

PUT TO
THE BASKET
Jorg Schreck
Security and Privacy in User Modeling (Kluwer International Series on Hci, 2,)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 140201130X
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Ifip Tc11 International Conference on Information Security 2003 Athen, Sabrina De Capitani De Vimercati, Pierangela Samarati, Sokratis Katsikas
Security and Privacy in the Age of Uncertainty: Ifip Tc11 18th International Conference on Information Security (Sec2003), May 26-28, 2003, Athens, Greece (International Federation for Information Processing (Series), 122.)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 1402074492
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Leonard J. Hopper
Security and Site Design : A Landscape Architectural Approach to Analysis, Assessment and Design Implementation

2005 y.
Publisher: —
Description: Book DescriptionWritten for the design professional, this book offers basic concepts for site security design and risk/threat assessment, and their relationship and integration into the overall design/streetscape projects. * This book is the only reference to offer coverage of security design for the site, rather than for the building * It provides landscape architects and other design professionals with the fundamental knowledge they need in order to work with clients and security consultants * It includes guidelines for conducting security/risk assessments as well as case studies that offer a variety of site designs that successfully integrate security [detailed...]

ISBN: 047165583X
Book size: —; Page extent: 208.

 

PUT TO
THE BASKET
Helen James
Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series)

2006 y.
Publisher: —
Description: Helen James considers security in Myanmar/Burma. She uses the ideas put forward in the United Nations Development Programme`s 1994 report, of human, as opposed to state and security, going on to argue that freedom from want, and freedom from fear (of the regime) are in fact mutually supportive ideas, and that the security of the people and the security of the state are in fact in a symbiotic relationship with each other. Presenting new and significant information of the security concept of Myanmar/Burma, James original work considers economic development, health, education, environmental issues, the drugs trade, human rights, minority peoples and political, social and economic reforms, arguing that improved governance, the development of civil society and economic development would both strengthen the state and ensure the security and well-being of its citizens. [detailed...]

ISBN: 0415355591
Book size: —; Page extent: 231.

 

PUT TO
THE BASKET
Roy H. Campbell, Prasad G. Naldurg
Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems

2008 y.
Publisher: —
Description: Security and Survivability presents new research on the emerging discipline of design and analysis of security systems that are survivable. Such systems are designed to continue to provide verifiable security guarantees, and allow the system to degrade gracefully, even under threat or actual incidence of attack. The book introduces a theory of recovery-oriented security and provides well-developed case studies that corroborate the utility of the theory, addressing privilege-escalation and Denial of Service (DoS) attacks. Using their automated verification methodology, the authors formally prove for the first time whether strategies such as selective filtering, strong authentication, and client puzzles actually reduce the vulnerability of a network to DoS attacks. [detailed...]

ISBN: 0387276270
Book size: —; Page extent: 240.

 

PUT TO
THE BASKET
Ed Robinson, Michael James Bond
Security for Microsoft Visual Basic .NET

— y.
Publisher: —
Description: This is the first book every Visual Basic .NET programmer should read on security. This is an end-to-end guide, with clear prescriptive guidance for best practices, application design, and coding techniques for Windows and Web-based applications. This book makes writing secure applications easier than ever before. It features plain-language explanations of security terms illustrated with step-by-step code walk-throughs and sample files for both Visual Basic .NET 2002 and Visual Basic .NET 2003. Programmers will learn how to use encryption, role-based security, code access security, authentication, authorization along with techniques to help protect against common exploits. Also covered in this end-to-end guide are techniques for locking down Microsoft Windows, Internet Information Services and Microsoft SQL server. Readers will learn how to perform a security audit, how to test for security, how to design with security in mind, and security techniques for deploying Windows and… [detailed...]

ISBN: 0735619190
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Selim Aissi, Nora Dabbous, Anand R. Prasad
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)

2006 y.
Publisher: —
Description: With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology`s special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology`s security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book`s complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation… [detailed...]

ISBN: 159693008X
Book size: —; Page extent: 332.

 

PUT TO
THE BASKET
Patrick Traynor, Patrick McDaniel, Thomas La Porta
Security for Telecommunications Networks (Advances in Information Security)

2008 y.
Publisher: —
Description: Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around t. Given the significant focus on securing critical infrastructure in recent years, Security for Telecommunications Networks creates a starting place for new researchers in the field of secure telecommunications networks. This volume not only discusses eming threats, along with system vulnerability, but also presents the open questions posited by network evolution and defense mechanisms. This is one of the first books to discuss securing current and next generation telecommunications networks by the secur community. Security for Telecommunications Networks is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable as a secondary text book or reference for advanced-level… [detailed...]

ISBN: 0387724419
Book size: —; Page extent: 182.

 

PUT TO
THE BASKET
D. Richard Kuhn, Miles C. Tracy, Sheila E. Frankel
Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0756733219
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Frank Stajano
Security for Ubiquitous Computing

— y.
Publisher: —
Description: * Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks * Focuses on two very hot topics: ad-hoc wireless networking and security * Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP * Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions * Includes a primer on security and the basics of cryptography * Describes the security issues in `peer-to-peer networking,` a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat [detailed...]

ISBN: 0470844930
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Сайт создан в системе uCoz