Filter
Datasikkerhet
Filter
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration …
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their …
The author outlines a simple yet thorough process to guide readers in the analysis and mitigation of risks in IT systems.
If you had to evacuate from your building right now and were told you couldn’t get back in for two weeks, would you know what to do to ensure your business continues to operate? …
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. …
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily …
Analyze Key Security Mechanisms and Approaches with this practical primer, the first book on the market to cover critical IPv6 security considerations.Dan Minoli, author of over 50 …
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is …
Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the …
This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and …