51jj4qZeORL._SX218_BO1,204,203,200_QL40_
PDF
Paul Piccard - Combating Spyware in the Enterprise

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware’s ongoing transformation from nuisance to malicious, sophisti...

511BITT0VhL._SY291_BO1,204,203,200_QL40_
PDF
Security and Auditing of Smart Devices

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure an...

00421fdc_medium
PDF
Security-Aware Design for Cyber-Physical Systems: A Platform-Based Approach

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints.Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet s...

58d67e2983204.jpeg
PDF
Image and Video Encryption

Image and Video Encryption provides a unified overviewof techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). The authors experimentally comp...

58d621ad15745.jpeg
PDF
Mapping and Analysing Crime Data

One of the key methods of reducing and dealing with criminal activity is to accurately gauge and then analyse the geographical distribution of crime (from small scale to large scale areas). Once the police and government know what areas suffer most from criminal activity they can assess why this is the case and then deal with it in the most effective way. Crime mapping and the spatial analysis of crime data have become recognised as ...

515lNNoJgtL._SX218_BO1,204,203,200_QL40_
PDF
Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures

The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today’s headlines are littered with news ...

0041ec1d_medium
PDF
Cisco ISE for BYOD and Secure Unified Access

Plan and deploy identity-based secure access for BYOD and borderless networks Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, an...

58d213b0a0e68.jpeg
PDF
Soil Quality, Sustainable Agriculture and Environmental Security in Central and Eastern Europe

Agriculture is a crucial component of the economies of many of the countries in transition from a centrally-planned to a market economy and the sector is by no means immune to the environmental and socioeconomic problems confronting the countries as a whole. The concept of sustainable development provides a convenient framework for the formulation of government environmental policy for such countries, especially those of them that as...

58d1ec81cf28d.jpg
PDF
AAA Identity Management Security

Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS AAA solutions are very frequently used by customers to provide secure access to devices and networks AAA solutions are difficult and confusing to implement even though they are almost mandatory Helps IT Pros choose the best identity management protocols and designs for their environments Covers AAA on Cisco rout...

58d1ae85108c4.jpg
PDF
Wireless Safety (EC-Council Press)

Intended for anyone from the mobile user to a student or professional working in a wireless environment, Wireless Safety serves to expose the reader to diverse technologies while mapping them to real world applications. It provides an overview of WAP (wireless application protocol) and how developers view these enabling technologies, and gives a peek into future trends. Topics include wireless signal propagation, IEEE and ETSI Wirele...