Автор: Oettinger William Название: Learn Computer Forensics: A beginner`s guide to searching, analyzing, and securing digital evidence ISBN: 1838648178 ISBN-13(EAN): 9781838648176 Издательство: Неизвестно Рейтинг: Цена: 73550.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator.
Автор: Gallagher Scott Название: Securing Docker ISBN: 1785888854 ISBN-13(EAN): 9781785888854 Издательство: Неизвестно Рейтинг: Цена: 36770.00 T Наличие на складе: Нет в наличии.
Автор: Deka & Bakshi Название: Handbook Of Research On Securing Cloud-Based Databases With Biometric Applications ISBN: 1466665599 ISBN-13(EAN): 9781466665590 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 325250.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern.The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
Автор: Katzer, Matthew Название: Securing office 365 ISBN: 1484242297 ISBN-13(EAN): 9781484242292 Издательство: Springer Рейтинг: Цена: 69870.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание:
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.
Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today’s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business.
What You’ll Learn
Manage security with the Azure Security Center and the Office 365 Compliance CenterConfigure information protection for document and electronic communicationsMonitor security for your business in the cloudUnderstand Mobile Application Management (MAM) and Mobile Device Management (MDM)Prevent data loss in Office 365Configure and manage the compliance manager tools for NIST and GDPR
Who This Book Is For
IT managers and compliance and cybersecurity officers who have responsibility for compliance and data security in their business
Автор: Lim, Ian Название: Securing Cloud and Mobility ISBN: 1439850550 ISBN-13(EAN): 9781439850558 Издательство: Taylor&Francis Рейтинг: Цена: 74510.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Lim, Ian , Coolidge, E. Coleen , Hourani, Paul Название: Securing Cloud and Mobility ISBN: 0367380366 ISBN-13(EAN): 9780367380366 Издательство: Taylor&Francis Рейтинг: Цена: 60220.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: A practitioners' handbook on securing virtualization, cloud computing, and mobility, this book bridges academic theory with real world implementation. It provides pragmatic guidance on securing the multi-faceted layers of private and public cloud deployments as well as mobility infrastructures. The book offers in-depth coverage of implementation plans, workflows, process consideration points, and project planning. Topics covered include physical and virtual segregation, orchestration security, threat intelligence, identity management, cloud security assessments, cloud encryption services, audit and compliance, certifications, secure mobile architecture and secure mobile coding standards.
Автор: Franklin Jr., Curtis Название: Securing the Cloud ISBN: 1032475714 ISBN-13(EAN): 9781032475714 Издательство: Taylor&Francis Рейтинг: Цена: 45930.00 T Наличие на складе: Нет в наличии.
Автор: Winkler, Vic (J.R.) Название: Securing The Cloud ISBN: 1597495921 ISBN-13(EAN): 9781597495929 Издательство: Elsevier Science Рейтинг: Цена: 52770.00 T Наличие на складе: Поставка под заказ. Описание: As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. This title discusses making the move to the cloud while securing your piece of it.
Автор: Kevin Foltz, William R. Simpson Название: Enterprise Level Security, 1 ISBN: 1498764452 ISBN-13(EAN): 9781498764452 Издательство: Taylor&Francis Рейтинг: Цена: 107190.00 T Наличие на складе: Нет в наличии. Описание:
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process.
Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise.
The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project.
The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.
Автор: Macaulay Название: Securing Converged IP Networks ISBN: 0849375800 ISBN-13(EAN): 9780849375804 Издательство: Taylor&Francis Рейтинг: Цена: 100030.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of convergence, details how to measure the sensitivity and assurance requirements of different data assets and discusses a range of ICT security threats and vulnerabilities.
Автор: Rountree, Derrick Название: Windows 2012 Server Network Security ISBN: 1597499587 ISBN-13(EAN): 9781597499583 Издательство: Elsevier Science Рейтинг: Цена: 39290.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Provides the guide to deploying and maintaining a secure Windows network. This book drills down into all the features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: secure remote access; network vulnerabilities and mitigations; DHCP installations configuration; and MAC filtering.
We live in a digital age where everyone needs to be cyber security aware, and understand the cyber security basics to stay safe online. Hack Proof Yourself gives you all the information you need to keep yourself and your family secure in today's digital world. This book provides practical to the point guidance and step-by-step instructions on how to stay safe and secure and identify the various types of scams that turn individuals into victims of cyber crime. A must for anyone who has an online presence in today's connected world.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz