Search Results for management - Narrowed by: Computer security. SirsiDynix Enterprise https://wait.sdp.sirsidynix.net.au/client/en_US/WAILRC/WAILRC/qu$003dmanagement$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026st$003dRE?dt=list 2024-05-13T21:03:49Z Physical and logical security convergence powered by enterprise security management / Brian T. Contos [and others] ; foreword by Regis McKenna. ent://SD_ILS/0/SD_ILS:232918 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Contos, Brian T.<br/>Call Number&#160;658.478 P578 22<br/>Publication Date&#160;2007<br/>Summary&#160;Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=230832">Click here to view</a><br/> Enemy at the water cooler [electronic resource] : real-life stories of insider threats and Enterprise Security Management countermeasures / Brian T. Contos. ent://SD_ILS/0/SD_ILS:231895 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Contos, Brian T.<br/>Call Number&#160;005.8 22<br/>Publication Date&#160;2006<br/>Summary&#160;Packed with vivid real-life cases, this comprehensive book addresses the most difficult to manage and costly of all security threats: the insider.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=196374">Click here to view</a><br/> Enterprise devops for architects : leveraging AIops and devsecops for secure digital transformation / Jeroen Mulder. ent://SD_ILS/0/SD_ILS:311402 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Mulder, Jeroen, author.<br/>Call Number&#160;005.1068 23<br/>Publication Date&#160;2021<br/>Summary&#160;An architect&amp;#x2019;s guide to designing, implementing, and integrating DevOps in the enterprise Key Features Design a DevOps architecture that is aligned with the overall enterprise architecture Design systems that are ready for AIOps and make the move toward NoOps Architect and implement DevSecOps pipelines, securing the DevOps enterprise Book DescriptionDigital transformation is the new paradigm in enterprises, but the big question remains: is the enterprise ready for transformation using native technology embedded in Agile/DevOps? With this book, you'll see how to design, implement, and integrate DevOps in the enterprise architecture while keeping the Ops team on board and remaining resilient. The focus of the book is not to introduce the hundreds of different tools that are available for implementing DevOps, but instead to show you how to create a successful DevOps architecture. This book provides an architectural overview of DevOps, AIOps, and DevSecOps &amp;#x2013; the three domains that drive and accelerate digital transformation. Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this DevOps book will help you to successfully integrate DevOps into enterprise architecture. You'll learn what AIOps is and what value it can bring to an enterprise. Lastly, you will learn how to integrate security principles such as zero-trust and industry security frameworks into DevOps with DevSecOps. By the end of this DevOps book, you'll be able to develop robust DevOps architectures, know which toolsets you can use for your DevOps implementation, and have a deeper understanding of next-level DevOps by implementing Site Reliability Engineering (SRE). What you will learn Create DevOps architecture and integrate it with the enterprise architecture Discover how DevOps can add value to the quality of IT delivery Explore strategies to scale DevOps for an enterprise Architect SRE for an enterprise as next-level DevOps Understand AIOps and what value it can bring to an enterprise Create your AIOps architecture and integrate it into DevOps Create your DevSecOps architecture and integrate it with the existing DevOps setup Apply zero-trust principles and industry security frameworks to DevOps Who this book is for This book is for enterprise architects and consultants who want to design DevOps systems for the enterprise. It provides an architectural overview of DevOps, AIOps, and DevSecOps. If you're looking to learn about the implementation of various tools within the DevOps toolchain in detail, this book is not for you.<br/>Format:&#160;Electronic Resources<br/><a href="http://ezproxy.angliss.edu.au/login?url=http://ezproxy.angliss.edu.au/login?direct=true&scope=site&db=nlebk&AN=3026780">http://ezproxy.angliss.edu.au/login?url=http://ezproxy.angliss.edu.au/login?direct=true&scope=site&db=nlebk&AN=3026780</a><br/> Cyber terrorism : a guide for facility managers / by Joseph F. Gustin. ent://SD_ILS/0/SD_ILS:224694 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Gustin, Joseph F., 1947-<br/>Call Number&#160;658.478 22<br/>Publication Date&#160;2004<br/>Summary&#160;Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=107520">Click here to view</a><br/> Oracle 11g Anti-hacker's Cookbook [electronic resource]. ent://SD_ILS/0/SD_ILS:257116 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Neagu, Adrian.<br/>Call Number&#160;005.7585<br/>Publication Date&#160;2012<br/>Summary&#160;This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=499146">Click here to view</a><br/> Protecting your library's digital sources : the essential guide to planning and preservation / Miriam B. Kahn. ent://SD_ILS/0/SD_ILS:224797 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Kahn, Miriam (Miriam B.), Author.<br/>Call Number&#160;025.82 22<br/>Publication Date&#160;2004<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=110055">Click here to view</a><br/> Cyber crime, security and digital intelligence / Mark Johnson. ent://SD_ILS/0/SD_ILS:277884 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Johnson, Mark, 1959-<br/>Call Number&#160;658.478 23<br/>Publication Date&#160;2013<br/>Summary&#160;&quot;Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables. Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations. Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without.&quot;--Unedited summary from book.<br/>Format:&#160;Electronic Resources<br/><a href="http://ezproxy.angliss.edu.au/login?direct=true&scope=site&db=nlebk&AN=559740">http://ezproxy.angliss.edu.au/login?direct=true&scope=site&db=nlebk&AN=559740</a><br/> The personal security handbook : practical tools for keeping yourself, your family &amp; your things safe at work, home or on the road. ent://SD_ILS/0/SD_ILS:229901 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z Call Number&#160;613.6 22<br/>Publication Date&#160;2005<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=135585">Click to view here</a><br/> Security technologies for the World Wide Web / Rolf Oppliger. ent://SD_ILS/0/SD_ILS:223567 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Oppliger, Rolf.<br/>Call Number&#160;005.8 22<br/>Publication Date&#160;2003<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=87709">Click here to view</a><br/> User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell. ent://SD_ILS/0/SD_ILS:226341 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Dent, Alexander W.<br/>Call Number&#160;005.8 22<br/>Publication Date&#160;2004<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=125231">Click here to view</a><br/> The chief information security officer [electronic resource] : insights, tools and survival skills / Barry L. Kouns &amp; Jake Kouns. ent://SD_ILS/0/SD_ILS:248258 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Kouns, Barry.<br/>Call Number&#160;005.8<br/>Publication Date&#160;2011<br/>Summary&#160;Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=391159">Click here to view</a><br/> Best damn firewall book period [electronic resource] / T.W. Shinder [and others]. ent://SD_ILS/0/SD_ILS:242650 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Shinder, Thomas W.<br/>Call Number&#160;005.8 22<br/>Publication Date&#160;2007<br/>Summary&#160;Allows IT professionals to manage over 15 different firewall products.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=214802">Click here to view</a><br/> Securing information and communications systems [electronic resource] : principles, technologies, and applications / Steven M. Furnell [and others], editors. ent://SD_ILS/0/SD_ILS:237153 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Furnell, Steven, 1970-<br/>Call Number&#160;005.8 22<br/>Publication Date&#160;2008<br/>Summary&#160;This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=284257">Click here to view</a><br/> IT Governance to Drive High Performance [electronic resource] : Lessons from Accenture. ent://SD_ILS/0/SD_ILS:241102 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Kress, Robert E.<br/>Call Number&#160;005.8<br/>Publication Date&#160;2010<br/>Summary&#160;This pocket guide provides you with an insider's detailed description of Accenture's IT governance policy and details its governance structure. It will showhow effective IT governance links IT strategy and IT decisions to Accenture's business strategy and business priorities. Following the best practices approach set out in this pocket guide will serve as an excellent starting point for any organisation with ambitions to achieve high performance.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=391140">Click here to view</a><br/> Trusted platform module basics : using TPM in embedded systems / Steven L. Kinney. ent://SD_ILS/0/SD_ILS:229847 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Kinney, Steven.<br/>Call Number&#160;621.3916 22<br/>Publication Date&#160;2006<br/>Summary&#160;Intended for embedded designers, this book provides a foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards. It covers the TPM basics, discussing the TPM Key Hierarchy and the Trusted Platform Module specification. It also includes an accompanying CD-ROM that contains source code.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=173590">Click to view here</a><br/> RFID security [electronic resource] / Frank Thornton et al. ent://SD_ILS/0/SD_ILS:239001 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Thornton, Frank.<br/>Call Number&#160;658.787 22<br/>Publication Date&#160;2006<br/>Summary&#160;RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=157307">Click here to view</a><br/> Microsoft windows security fundamentals / Jan De Clercq, Guido Grillenmeier. ent://SD_ILS/0/SD_ILS:230789 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Clercq, Jan de, 1968-<br/>Call Number&#160;005.8 22<br/>Publication Date&#160;2007<br/>Summary&#160;This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 &amp; SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks. Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software. * Covers all SP1 and SP2 updates * Details strategies for patch management * Provides key techniques to maintain security application upgrades and updates.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=195156">Click here to view</a><br/> Techno security's guide to e-discovery and digital forensics / Jack Wiles [and others]. ent://SD_ILS/0/SD_ILS:232929 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Wiles, Jack.<br/>Call Number&#160;363.25968 22<br/>Publication Date&#160;2007<br/>Summary&#160;This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The TechnoSecurity Guide to Digital Forensics and E-Discovery features: * Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics * Bonus chapters on how to build your own Forensics Lab * 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=239209">Click here to view</a><br/> Information assurance [electronic resource] : dependability and security in networked systems / [edited by] Yi Qian [and others]. ent://SD_ILS/0/SD_ILS:232001 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Qian, Yi, 1962-<br/>Call Number&#160;005.8 22<br/>Publication Date&#160;2008<br/>Summary&#160;In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks.&#160;Printbegr&aelig;nsninger: Der kan printes kapitelvis.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=214765">Click here to view</a><br/> Securing IM and P2P applications for the enterprise / Paul. L. Piccard [and others] ; technical editor, Marcus H. Sachs. ent://SD_ILS/0/SD_ILS:227742 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Piccard, Paul L.<br/>Call Number&#160;005.8 22<br/>Publication Date&#160;2006<br/>Summary&#160;This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic. * A recent study by the Yankee group ranked &quot;managing and securing IM and P2P applications&quot; as the #3 priority for IT managers in 2004 * The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time * The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=149586">Click here to view</a><br/> Syngress force emerging threat analysis : from mischief to malicious / David Maynor [and others]. ent://SD_ILS/0/SD_ILS:230728 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Maynor, David.<br/>Call Number&#160;005.8 22<br/>Publication Date&#160;2006<br/>Summary&#160;A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrows Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the best of this years top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future. * From Practical VoIP Security, Thomas Porter, Ph. D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security. * From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam. * From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware. * Also from Combating Spyware in the Enterprise, About.coms security expert Tony Bradley covers the transformation of spyware. * From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well. * From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security. * Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security. * From RFID Security, Brad Renderman Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks. * Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg covers attacking the people layer. * Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks. * The best of this year: Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats * Complete Coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more * Covers secure enterprise-wide deployment of hottest technologies including Voice Over IP, Pocket PCs, smart phones, and more.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=174833">Click to view here</a><br/> Securing HP NonStop servers in an open systems world : TCP/IP, OSS, &amp; SQL / XYPRO Technology. ent://SD_ILS/0/SD_ILS:230307 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;XYPRO Technology Corporation.<br/>Call Number&#160;005.8 22<br/>Publication Date&#160;2006<br/>Summary&#160;Second of two books by XYPRO which are the only Comprehensive Security references on HP NonStop Server.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=193651">Click to view here</a><br/> The Cloud [electronic resource] : understanding the security, privacy and trust challenges / Neil Robinson [and others]. ent://SD_ILS/0/SD_ILS:252176 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Robinson, Neil, 1964-<br/>Call Number&#160;342.40858<br/>Publication Date&#160;2011<br/>Summary&#160;This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=408758">Click here to view</a><br/> Getting started with Citrix XenApp 6.5 [electronic resource] : design and implement Citrix farms based on XenApp 6.5 / Guillermo Musumeci. ent://SD_ILS/0/SD_ILS:255984 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Musumeci, Guillermo.<br/>Call Number&#160;005.376 23<br/>Publication Date&#160;2012<br/>Summary&#160;If you are a system administrator or consultant who wants to implement and administer Citrix XenApp 6.5 farms, then this book is for you. This book will help both new and experienced XenApp professionals to deliver virtualized applications. XenApp is the leader in application hosting and virtualization delivery, allowing users from different platforms such Windows, Mac, Linux, and mobile devices to connect to their business applications. Using XenApp, you can deploy secure applications quickly to thousands of users. XenApp 6.5 brings with it exciting new features such as a brand new management console, Instant App access, Multi-stream ICA, Single Sign-on and SmartAuditor enhancements, and more. Getting Started with Citrix XenApp 6.5 provides comprehensive details on how to design, implement, and maintain Citrix farms based on XenApp 6.5. Additionally, you will learn to use management tools and scripts for daily tasks such as managing servers, published resources, printers, and connections. Getting Started with Citrix XenApp 6.5 starts by introducing the basics and new features of the brand new version such as installing servers and configuring components, and then teaches you how to publish applications and resources on the client device before moving on to configuring content redirection. Author Guillermo Musumeci includes a use case throughout the book to explain advanced topics like creating management scripts and deploying and optimizing XenApp for Citrix XenServer, VMware ESX, and Microsoft Hyper-V virtual machines. It will guide you through an unattended installation of XenApp and components on physical servers. By the end of this book you will have enough knowledge to successfully design and manage your own XenApp 6.5 Farms.--Publisher description.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=473300">Click here to view</a><br/> Techno Security's guide to managing risks : for IT managers, auditors, and investigators / Jack Wiles ; Russ Rogers, technical editor. ent://SD_ILS/0/SD_ILS:230948 2024-05-13T21:03:49Z 2024-05-13T21:03:49Z by&#160;Wiles, Jack.<br/>Call Number&#160;658.478 22<br/>Publication Date&#160;2007<br/>Summary&#160;This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and thoughts discussed here are as new as tomorrows headlines, whereas others have been around for decades without being properly addressed. I hope you enjoy this book as much as we have enjoyed working with the various authors and friends during its development. Donald Withers, CEO and Cofounder of TheTrainingCo. Jack Wiles, on Social Engineering offers up a potpourri of tips, tricks, vulnerabilities, and lessons learned from 30-plus years of experience in the worlds of both physical and technical security. Russ Rogers on the Basics of Penetration Testing illustrates the standard methodology for penetration testing: information gathering, network enumeration, vulnerability identification, vulnerability exploitation, privilege escalation, expansion of reach, future access, and information compromise. Johnny Long on No Tech Hacking shows how to hack without touching a computer using tailgating, lock bumping, shoulder surfing, and dumpster diving. Phil Drake on Personal, Workforce, and Family Preparedness covers the basics of creating a plan for you and your family, identifying and obtaining the supplies you will need in an emergency. Kevin OShea on Seizure of Digital Information discusses collecting hardware and information from the scene. Amber Schroader on Cell Phone Forensics writes on new methods and guidelines for digital forensics. Dennis OBrien on RFID: An Introduction, Security Issues, and Concerns discusses how this well-intended technology has been eroded and used for fringe implementations. Ron Green on Open Source Intelligence details how a good Open Source Intelligence program can help you create leverage in negotiations, enable smart decisions regarding the selection of goods and services, and help avoid pitfalls and hazards. Raymond Blackwood on Wireless Awareness: Increasing the Sophistication of Wireless Users maintains it is the technologists responsibility to educate, communicate, and support users despite their lack of interest in understanding how it works. Greg Kipper on What is Steganography? provides a solid understanding of the basics of steganography, what it can and cant do, and arms you with the information you need to set your career path. Eric Cole on Insider Threat discusses why the insider threat is worse than the external threat and the effects of insider threats on a company. *Internationally known experts in information security share their wisdom *Free pass to Techno Security Conference for everyone who purchases a book$1,200 value *2-HOUR DVD with cutting edge information on the future of information security.<br/>Format:&#160;Electronic Resources<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e900xww&AN=211556">Click here to view</a><br/>