Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable.
CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals.
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource.
A new edition of this title is available, ISBN-10: 0789738074 ISBN-13: 9780789738073 The CISSP certification exam is one of the most difficult exams to pass because of the expansive knowledge base it covers.
In the 1970s and 1980s West Germany was a pioneer in both the use of the new information technologies for population surveillance and the adoption of privacy protection legislation.
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks.
This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable.
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction.
Understand what the emerging global information security law means for your businessIn today s business environment, our dependence on information technology and an interconnected information infrastructure to create, use, communicate and store key records has significant economic benefits.
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks.
A ground shaking expos on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "e;risk management"e; practices, and offers a series of improvement techniques that help you fill the holes and ramp up security.
Efficiently prepare yourself for the demanding CompTIA CySA+ exam CompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition offers readers the fastest and best way to prepare for the CompTIA Cybersecurity Analyst exam.
Efficiently prepare yourself for the demanding CompTIA CySA+ exam CompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition offers readers the fastest and best way to prepare for the CompTIA Cybersecurity Analyst exam.
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate.
A ground shaking expos on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "e;risk management"e; practices, and offers a series of improvement techniques that help you fill the holes and ramp up security.
Understand what the emerging global information security law means for your businessIn today s business environment, our dependence on information technology and an interconnected information infrastructure to create, use, communicate and store key records has significant economic benefits.
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate.
This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute.
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions.