by
Institute for Career Research.
Call Number
005.8023 22
Publication Date
2005
Format:
Electronic Resources
Relevance:
219539.1250
by
NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : Tétouan, Morocco)
Call Number
005.8 22
Publication Date
2006
Summary
Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates new opportunities for the benefit of society. However, it also opens an avenue that can be exploited for illicit purposes. The stakes are high and many attacks go undetected or unreported. In addition to losses such as data or other forms of intel.
Format:
Electronic Resources
Relevance:
113902.1016
View Other Search Results
by
Bradley, Tony, 1969-
Call Number
005.8 22
Publication Date
2006
Summary
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely. * Written in easy to understand non-technical language that novices can comprehend * Provides detailed coverage of the essential security subjects that everyone needs to know * Covers just enough information to educate without being overwhelming.
Format:
Electronic Resources
Relevance:
92252.4766
by
Gazeau, Jean-Pierre.
Call Number
004.0151 22
Publication Date
2007
Format:
Electronic Resources
Relevance:
76072.1250
by
Shinder, Thomas W.
Call Number
005.8 22
Publication Date
2007
Summary
Allows IT professionals to manage over 15 different firewall products.
Format:
Electronic Resources
Relevance:
5.4612
by
Dubrawsky, Ido.
Call Number
005.8 22
Publication Date
2007
Summary
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrit. Printbegrænsninger: Der kan printes kapitelvis.
Format:
Electronic Resources
Relevance:
5.1607
by
Hurley, Chris.
Call Number
005.8 22
Publication Date
2007
Summary
Over 300 New Penetration Testing Tools in this Volume 2.
Format:
Electronic Resources
Relevance:
5.1573
by
Mendell, Ronald L.
Call Number
005.8
Publication Date
2007
Summary
This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in.
Format:
Electronic Resources
Relevance:
5.1471
by
Smith, Russell.
Call Number
005.8 22
Publication Date
2010
Format:
Electronic Resources
Relevance:
5.1145
by
Yu, Zhenwei.
Call Number
005.8 23
Publication Date
2011
Summary
This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.
Format:
Electronic Resources
Relevance:
5.1140
by
Ben-Ari, Erez.
Call Number
005.8 23
Publication Date
2012
Summary
While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customization to meet their needs. With this book in hand, you will be equipped to deal with these types of customization scenarios, and you will be confident in using such workarounds without hassle and trial and error. Written by some of the leading experts on UAG, Mastering Microsoft Forefront UAG 2010 Customization covers the most complex and challenging options for customizing UAG in a way that is friendly and easy to follow. It walks you through various customization tasks, including explanations and code samples, as well as creative ideas for troubleshooting your work. Until now, only a few of the extensions to UAGs services have been publicly available, and most were only known to a select few. Now, this can include you!Throughout this book, you will tackle how to change the systems look-and-feel, deal with advanced authentication schemes and write special functions that need to be executed as part of the client interaction. With Mastering Microsoft Forefront UAG 2010 Customization, you too can learn how to customize various aspects of UAGs functionality to enhance your organization or customers experience.
Format:
Electronic Resources
Relevance:
5.0729
by
Ben-Ari, Erez.
Call Number
005.8 22
Publication Date
2011
Summary
Annotation Microsoft Forefront Unified Access Gateway (UAG) is the latest in a line of Application Publishing (Reverse Proxy) and Remote Access (VPN) Server products. The broad set of features and technologies integrated into UAG makes for a steep learning curve. Understanding all the features and abilities of UAG is a complex task that can be daunting even to experienced networking and security engineers. This book is the first to be dedicated solely to Microsoft Forefront UAG. It guides you step-by-step throughout all the stages of deployment, from design to troubleshooting. Written by the absolute experts who have taken part of the product_s development, official training and support, this book covers all the primary features of UAG in a friendly style and a manner that is easy to follow. It takes you from the initial planning and design stage, through deployment and configuration, up to maintenance and troubleshooting. The book starts by introducing UAG's features and and abilities, and how your organization can benefit from them. It then goes on to guide you through planning and designing the integration of the product into your own unique environment. Further, the book guides you through the process of publishing the various applications, servers and resources - from simple web applications to complex client/server based applications. It also details the various VPN technologies that UAG provides and how to take full advantage of them. The later chapters of the book educate you with common routine _upkeep_ tasks like monitoring, backup and troubleshooting of common issues. Finally, the book includes an introduction to ASP, which some of the product's features are based on, and can help the advanced administrator with enhancing and customizing the product. Explore Microsoft Forefront Unified Access Gateway_s wide range of features and abilities to publish applications to remote users or partners, and provide remote-access to your network with world-class security.
Format:
Electronic Resources
Relevance:
5.0329
Limit Search Results