by
Bradley, Tony, 1969-
Call Number
005.80218 22
Publication Date
2007
Summary
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. *PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data *Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant *The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needs.
Format:
Electronic Resources
Relevance:
3.8134
by
Thue, William A.
Call Number
621.31934 21
Publication Date
1999
Format:
Electronic Resources
Relevance:
0.1905
View Other Search Results
by
Clark, Champ, III.
Call Number
005.8 22
Publication Date
2008
Summary
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence.
Format:
Electronic Resources
Relevance:
0.1698
by
Erickson, Paul A., 1941-
Call Number
658.382 22
Publication Date
1996
Summary
Written with corporate regulatory compliance officers, health and safety managers, loss control managers, and human resource specialists in mind, this book offers workplace-tested strategies for meeting the health and safety needs of a modern corporation. Emphasizing the practical means of achieving compliance with OSHA regulations, this book also provides a unique assessment of the more extensive factors that influence the management of workplace health and safety. The integration of practical regulation strategies with corporate objectives is particularly relevant to graduate curricula in business management, public policy, and occupational medicine. Key Features * Provides practical guidelines for industrial compliance with major OSHA regulations * Presents concise explanations of technical and scientific concepts underlying regulatory requirements * Integrates specific examples of the global economy's influence on the design and implementation of workplace health and safety * Elucidates the effects of health and safety programs on financial and legal risk management practices in industry * Includes explanations of practical alternative compliance strategies for company health and safety officers.
Format:
Electronic Resources
Relevance:
0.1698
by
Banks, James.
Call Number
364.1720285
Publication Date
2014
Summary
Offering the first empirically driven assessment of the development, marketisation, regulation and use of online gambling organisations and their products, this book explores the relationship between online gambling and crime. It draws upon quantitative and qualitative data, including textual and visual analyses of e-gambling advertising and the records of player-protection and standards organisations, together with a virtual ethnography of online gambling subcultures, to examine the ways in which gambling and crime have been approached in practice by gamers, regulatory agencies and online gambling organisations. Building upon contemporary criminological theory, it develops an understanding of online gambling as an arena in which risks and rewards are carefully constructed and through which players navigate, employing their own agency to engage with the very real possibility of victimisation. With attention to the manner in which online gambling can be a source of criminal activity, not only on the part of players, but also criminal entrepreneurs and legitimate gambling businesses, Online Gambling and Crime discusses developments in criminal law and regulatory frameworks, evaluating past and present policy on online gambling. A rich examination of the prevalence, incidence and experience of a range of criminal activities linked to gambling on the Internet, this book will appeal to scholars and policy makers in the fields of sociology and criminology, law, the study of culture and subculture, risk, health studies and social policy.
Format:
Electronic Resources
Relevance:
0.1617
by
Chou, Philip A.
Call Number
006.7 22
Publication Date
2007
Summary
This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overview of the fundamental principles and challenges of multimedia communication and networking, this book then branches off organically to tackle compression and networking next before moving on to systems, wireless multimedia and more advanced topics. The Compression section advises on the best means and methodology to ensure multimedia signal (images, text, audio and data) integrity for transmissions on wireless and wired systems. The Networking section addresses channel protection and performance. In the Systems section the focus is on streaming media on demand, live broadcast and video and voice's role in real-time communication. Wireless multimedia transmission and Quality of Service issues are discussed in the Wireless Multimedia section. An Advanced Topics section concludes the book with an assortment of topics including Peer-to-Peer multimedia communication and multipath networks. * Up-to-date coverage of existing standards for multimedia networking * Synergistic tutorial approach reinforces knowledge gained in previous chapters * Balanced treatment of audio and video with coverage of end-to-end systems.
Format:
Electronic Resources
Relevance:
0.1547
by
Mordini, E. (Emilio)
Call Number
362.82 22
Publication Date
2010
Summary
This book, Ageing and Invisibility, is the result of two years of research and part of the European Union (EU) FP7 project SENIOR (social, ethical and privacy needs in ICT for older people). The project was initiated to provide a systematic assessment of the social, ethical and privacy issues surrounding the use of computers and information technology for and by an ageing population. The direction of demographic change is clear in many societies worldwide: the population is ageing rapidly. By 2050 the number of people over 50 is expected to have increased by 35%, and those over 80 by a stagger
Format:
Electronic Resources
Relevance:
0.1066
by
Campbell, W. Bruce.
Call Number
577.55
Publication Date
2012
Format:
Electronic Resources
Relevance:
0.0831
Limit Search Results