Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The idea of actively using the power of quantum mechanical principles and special entangled states has fueled a revolution in the computing and communications... Læs mere
Bemærk: Kan ikke leveres før jul.
Defines more than 900 metrics measuring compliance with legislation, resiliency of security controls, and return on investment. This book explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives.
Bemærk: Kan ikke leveres før jul.
Addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. This book... Læs mere
Bemærk: Kan ikke leveres før jul.
Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. This book provides a framework for organizations to align information assurance with the enterprise and their overall mission.
Bemærk: Kan ikke leveres før jul.
The IT Security Governance Guidebook with Security Program Metrics on downloadable resources provides clear and concise... Læs mere
Bemærk: Kan ikke leveres før jul.
Digital Rights Management is your guide to the challenges and opportunities facing the commercial world of intellectual property products.... Læs mere
Bemærk: Kan ikke leveres før jul.
Offers a formal framework for finding and eliminating network security threats. This title focuses on the steps necessary to manage an assessment, including... Læs mere
Bemærk: Kan ikke leveres før jul.
Discusses successful approaches for the CISSP exam, provides sample questions and test-taking tips, and contains an annotated bibliography section that provides advice on helpful references for a given domain.
Bemærk: Kan ikke leveres før jul.
User identification and authentication are essential to modern security. This book presents the general philosophy... Læs mere
Bemærk: Kan ikke leveres før jul.
Details the applications needed to investigate properties of PNs relevant to the improvement of modern wireless systems. This book proposes a... Læs mere
Bemærk: Kan ikke leveres før jul.
Clarifies the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography.... Læs mere
Bemærk: Kan ikke leveres før jul.
A how-to guide for implementing algorithms and protocols. Addressing real-world implementation issues, it emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems.