1.
by
Snedaker, Susan.
Call Number
005.8068 22
Publication Date
2006
Summary
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments.
Format:
Electronic Resources
Relevance:
8.5985
by
Foster, James C.
Call Number
005.8 22
Publication Date
2006
Summary
Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts.
Format:
Electronic Resources
Relevance:
5.2475
View Other Search Results
by
Loewengart, Victoria, author.
Call Number
005.8 23
Publication Date
2012
Summary
An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.
Format:
Electronic Resources
Relevance:
5.1865
by
Jahankhani, Hamid.
Call Number
658.478 22
Publication Date
2010
Summary
The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals. This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.
Format:
Electronic Resources
Relevance:
5.1191
by
Nordström, Kent.
Call Number
005.8 23
Publication Date
2012
Summary
Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them.
Format:
Electronic Resources
Relevance:
4.5257
by
Wallace, Michael, 1960-
Call Number
658.477 22
Publication Date
2004
Format:
Electronic Resources
Relevance:
2.5205
by
Büchner, Alex G.
Call Number
371.334 22
Publication Date
2008
Format:
Electronic Resources
Relevance:
0.2969
Limit Search Results