5c4edbb4c4b4d.jpg
PDF
RFID Protocol Design, Optimization, and Security for the Internet of Things

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localization, supply chain management, automotive, inventory control, anti-theft, anti-counterfeit, and access control. The Internet of Things (IoT) promis...

5c34518793c00.jpg
PDF
Security, Privacy, and Anonymization in Social Networks

Technology has become profoundly integrated into modern society; however, this increases the risk of vulnerabilities, such as hacking and other system errors, along with other online threats. Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities is a pivotal reference source for the most up-to-date research on edge clustering models and weighted social networks. Presenting widespread coverage ac...

5c345186220fc.jpg
PDF
Information Technology Risk Management and Compliance in Modern Organizations

Attacks on information systems and applications have become more prevalent with new advances in technology. Management of security and quick threat identification have become imperative aspects of technological applications. Information Technology Risk Management and Compliance in Modern Organizations is a pivotal reference source featuring the latest scholarly research on the need for an effective chain of information management and...

5c2488722237c.jpg
PDF
CISSP Certification All-in-One Exam Guide, Fourth Edition

All-in-One is All You Need Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains developed by the International Information Systems Security Certification Consortium (ISC²). Inside, you'll find l...

5c248870579cc.jpg
PDF
21st Century Security and CPTED: Second Edition

The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, vi...

5c2328a3026d9.jpg
PDF
Surveillance, Privacy and Security

This volume examines the relationship between privacy, surveillance and security, and the alleged privacy–security trade-off, focusing on the citizen’s perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The res...

5c208083442e6.jpg
PDF
Protection, Security, and Safeguards, Second Edition

Much has changed on the security landscape since the last edition of this book was published in 2000. Today’s security personnel face greater demands than ever before and are expected to be more highly trained and educated. Updated to reflect the heightened security climate of the current age, Protection, Security, and Safeguards: Practical Approaches and Perspectives, Second Edition offers a critical survey of the field, introduces ...

5c1de5a00c20d.jpg
PDF
Black Middle Class Delinquents

Most criminal justice research on African Americans focuses on poor Blacks living in poor Black communities. Hassett-Walker expands this focus to middle class blacks and empirically tests an assertion from Pattillo-McCoy (1999)'s Black Picket Fences i.e., that little difference in delinquency exists between poor versus middle class Black youth using two national probability samples. Independent variables included class status, parent...

5c1de59e45498.jpg
PDF
Computer Incident Response and Product Security

Computer Incident Response and Product Security The practical guide to building and running incident response and product security teams Damir Rajnovic Organizations increasingly recognize the urgent importance of effective, cohesive, and efficient security incident response. The speed and effectiveness with which a company can respond to incidents has a direct impact on how devastating an incident is on the company’s operations and ...

5c135cd466335.png
PDF
Linux : Sécuriser un réseau - Bernard Boutherin

Quelles règles d'or appliquer pour préserver la sûreté d'un réseau Linux ? Comment protéger les systèmes de données ? Grâce à des principes simples et à la mise en œuvre d'outils libres réputés pour leur efficacité, on apprendra dans ce cahier à améliorer l'architecture d'un réseau d'entreprise et à le protéger contre les intrusions, dénis de service et autres attaques. On verra notamment comment filtrer des flux (netfilter/lPtables…...