by
Hurley, Chris.
Call Number
005.8 22
Publication Date
2007
Summary
Wireless networking has become standard in many business and government networks. Aimed primarily at those individuals that are tasked with performing penetration testing on wireless networks, this book focuses on the methods used by professionals to perform WarDriving and wireless penetration testing.
Format:
Electronic Resources
Relevance:
1.0497
by
Kouns, Barry.
Call Number
005.8
Publication Date
2011
Summary
Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.
Format:
Electronic Resources
Relevance:
0.0772
View Other Search Results
by
NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : Tétouan, Morocco)
Call Number
005.8 22
Publication Date
2006
Summary
Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates new opportunities for the benefit of society. However, it also opens an avenue that can be exploited for illicit purposes. The stakes are high and many attacks go undetected or unreported. In addition to losses such as data or other forms of intel.
Format:
Electronic Resources
Relevance:
0.0707
by
Furnell, Steven, 1970-
Call Number
005.8 22
Publication Date
2008
Summary
This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems.
Format:
Electronic Resources
Relevance:
0.0653
by
Neagu, Adrian.
Call Number
005.7585
Publication Date
2012
Summary
This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts.
Format:
Electronic Resources
Relevance:
0.0408
Limit Search Results
Narrowed by: