Databehandling: allmänt
Filter
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their …
This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and …
Internet Management is an encyclopedia of Internet management know-how. Over the course of 50 chapters, experts provide advice on everything from choosing the right Web database to …
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the …
Offering hundreds of tips, templates, checklists, and pointers to information in the public domain, Business Resumption Planning, Second Edition assists you in creating a rock …
For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But …
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a …
The IT Security Governance Guidebook with Security Program Metrics provides clear and concise explanations of key issues in information protection, describing the basic structure …
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes …
The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay …