Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Data Protection from Insider Threats, Elisa Bertino


Варианты приобретения
Цена: 41580.00T
Кол-во:
 о цене
Наличие: Невозможна поставка.

в Мои желания

Автор: Elisa Bertino
Название:  Data Protection from Insider Threats
ISBN: 9781608457687
Издательство: Mare Nostrum (Eurospan)
Классификация:


ISBN-10: 1608457680
Обложка/Формат: Paperback
Страницы: 91
Вес: 0.18 кг.
Дата издания: 30.07.2012
Серия: Synthesis lectures on data management
Язык: English
Иллюстрации: Black & white illustrations
Размер: 235 x 191 x 5
Читательская аудитория: General (us: trade)
Ключевые слова: Information technology: general issues
Рейтинг:
Поставляется из: Англии
Описание: As data represent a key asset for todays organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques - such as firewalls and network security tools - are unable to protect data from attacks posed by those working on an organizations inside. These insiders usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization.Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks.Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges - such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions.

Trusted Computing: Principles and Applications

Автор: Dengguo Feng
Название: Trusted Computing: Principles and Applications
ISBN: 3110476045 ISBN-13(EAN): 9783110476040
Издательство: Walter de Gruyter
Рейтинг:
Цена: 123910.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Exchanging Terrorism Oxygen For Media Airwaves

Автор: Eid
Название: Exchanging Terrorism Oxygen For Media Airwaves
ISBN: 1466657766 ISBN-13(EAN): 9781466657762
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 189420.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The onset of the digital age and the ubiquity of media communications have presented new opportunities for terrorist groups and organisations to communicate globally and publicise their actions. Research surrounding the relationship between terrorism and both traditional and new media outlets is necessary in order to promote a better understanding of the ways in which the media can both fuel and inhibit terrorism in the era of increased digital connectivity.Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia presents a timely and thorough discussion on the integration of terrorism and the media, exploring the influence of traditional and new media on global terrorism. Featuring comprehensive research from leading experts in the field, this publication is ideally suited for scholars, upper-level students, professionals, and policymakers working and studying in fields such as media communications, international relations, national security, crisis management, criminology, and sociology.

Insider Threats in Cyber Security

Автор: Christian W. Probst; Jeffrey Hunker; Dieter Gollma
Название: Insider Threats in Cyber Security
ISBN: 1461426383 ISBN-13(EAN): 9781461426387
Издательство: Springer
Рейтинг:
Цена: 130430.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together.

Audacity to spy

Автор: Nolan, Catherine Wilson, Ashley M.
Название: Audacity to spy
ISBN: 1935504797 ISBN-13(EAN): 9781935504795
Издательство: Gazelle Book Services
Рейтинг:
Цена: 30010.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Ever get the feeling you are being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more. This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet. The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalise their own services and to sell to other advertisers for behavioural marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasnt enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users valuable personal and financial information. More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.

Data protection and privacy: (in)visibilities and infrastructures

Название: Data protection and privacy: (in)visibilities and infrastructures
ISBN: 3319507958 ISBN-13(EAN): 9783319507958
Издательство: Springer
Рейтинг:
Цена: 139750.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out.

Online Banking Security Measures and Data Protection

Автор: Aljawarneh Shadi A.
Название: Online Banking Security Measures and Data Protection
ISBN: 1522508643 ISBN-13(EAN): 9781522508649
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 208830.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever.Online Banking Security Measures and Data Protection is an authoritative reference source for the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary financial systems. Presenting emerging techniques to secure these systems against potential threats and highlighting theoretical foundations and real-world case studies, this book is ideally designed for professionals, practitioners, upper-level students, and technology developers interested in the latest developments in e-banking security.

Privacy in Mobile and Pervasive Computing

Автор: Marc Langheinrich, Florian Schaub
Название: Privacy in Mobile and Pervasive Computing
ISBN: 1681734583 ISBN-13(EAN): 9781681734583
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 76690.00 T
Наличие на складе: Невозможна поставка.
Описание: It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly—making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives.In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes ""privacy"" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research.The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.

Privacy in Mobile and Pervasive Computing

Автор: Marc Langheinrich, Florian Schaub
Название: Privacy in Mobile and Pervasive Computing
ISBN: 1681731177 ISBN-13(EAN): 9781681731179
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 56370.00 T
Наличие на складе: Невозможна поставка.
Описание: It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly—making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives.In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes ""privacy"" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research.The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.

Critical Infrastructure Protection X

Автор: Mason Rice; Sujeet Shenoi
Название: Critical Infrastructure Protection X
ISBN: 3319487361 ISBN-13(EAN): 9783319487366
Издательство: Springer
Рейтинг:
Цена: 72670.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: themes and issues; control systems security; infrastructure modeling and simulation; risk and impact assessment.This book is the tenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of fourteen edited papers from the Tenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2016.Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия