Research Anthology on Securing Medical Systems and Records,
Автор: Lammle Название: SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide - Exam 500-285 ISBN: 1119155037 ISBN-13(EAN): 9781119155034 Издательство: Wiley Рейтинг: Цена: 58080.00 T Наличие на складе: Поставка под заказ. Описание: Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives.
Автор: Regis J. Jr (Bud) Bates Название: Securing VoIP, ISBN: 0124170390 ISBN-13(EAN): 9780124170391 Издательство: Elsevier Science Рейтинг: Цена: 41530.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание:
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
Автор: Woody Aaron Название: Enterprise Security: A DataCentric Approach to Securing the ISBN: 1849685967 ISBN-13(EAN): 9781849685962 Издательство: Неизвестно Рейтинг: Цена: 60070.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Kevin Foltz, William R. Simpson Название: Enterprise Level Security, 1 ISBN: 1498764452 ISBN-13(EAN): 9781498764452 Издательство: Taylor&Francis Рейтинг: Цена: 107190.00 T Наличие на складе: Нет в наличии. Описание:
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process.
Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise.
The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project.
The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.