Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O’Reilly Media Company.  (5)
  • Computer networks ; Security measures
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781839214486 , 1839214481 , 9781839216992
    Language: English
    Pages: 1 online resource (330 pages)
    Edition: 1st edition
    DDC: 658.478
    Keywords: Cyberterrorism ; Business enterprises Computer networks ; Security measures ; Computer security ; Electronic books ; local ; Cyberterrorisme ; Sécurité informatique ; Cyberterrorism ; Computer security ; Business enterprises ; Computer networks ; Security measures ; Computer networks ; Security measures
    Abstract: Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book Description The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is for This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.
    Note: Online resource; Title from title page (viewed February 25, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469098050
    Language: English
    Pages: 1 online resource (27662 pages)
    Edition: 1st edition
    DDC: 658.4/78
    Keywords: Computer networks Security measures ; Computer security ; Computer Security ; Audiobooks ; Sécurité informatique ; BUSINESS & ECONOMICS ; General ; Computer networks ; Security measures ; Computer security ; Downloadable audio books ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Audiobooks ; Livres audio
    Abstract: Fascinating and highly readable, Digital Resilience opens with the infamous 2013 Target attack, which compromised the credit card information of 40 million customers. In hindsight, the hack (like most today) was preventable. This book helps businesses: - Understand the threats they face - Assess the resilience of their networks against attacks - Identify and address weaknesses - Respond to exploits swiftly and effectively Data theft. Downed servers. Malware. Even human error can trigger cyber events anytime from anywhere around the globe. This powerful guide provides the resilience-building strategies you need to prevail-no matter what strikes.
    Note: Online resource; Title from title page (viewed April 18, 2018) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781439845790 , 1439845794
    Language: English
    Pages: 1 online resource (388 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    Keywords: Transportation Security measures ; Terrorism Prevention ; Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local ; Homeland Security ; Computing & IT Security ; Supply Chain Management ; Transport ; Sécurité ; Mesures ; États-Unis ; Terrorism ; Prevention ; Transportation ; Security measures ; United States
    Abstract: Transportation is the lifeline of any nation, connecting people, supporting the economy, and facilitating the delivery of vital goods and services. The 9/11 attacks—and other attacks on surface transportation assets, including the bombings in Madrid, London, Moscow, and Mumbai—demonstrate the vulnerability of the open systems to disruption and the consequences of the attacks on people, property, and the economy. Now more than ever, it has become imperative for businesses operating in the transportation and transit sectors to develop comprehensive security programs accounting for both natural and man-made hazards and safeguarding people, places, and equipment—while at the same time ensuring operations continuity. Providing transportation managers with the knowledge, skills, and abilities to effectively manage the security of transportation assets, Introduction to Transportation Security examines: Basic theories of security and emergency management The integrated nature of the nation’s critical infrastructure and the threats to transportation in each surface mode Federal agencies working in emergency management and transportation security and their intelligence and response requirements and capabilities The types of disasters that have occurred in the U.S. and selected nations, and their significant economic impacts Cost-beneficial security strategies aimed at preventing catastrophic failures in each transportation mode Effective methods for organizing, testing, and evaluating transportation security across modes and professions The book covers all transportation modes and their interconnectivity—including highway, air cargo, freight and passenger rail, transit, and maritime. It presents learning objectives and discussion questions to test assimilation of the material and case studies to facilitate a practical understanding of the concepts. Introduction to Transportation Security provides essential information for students in transportation management programs and professionals charged with safeguarding the movement of assets within our interconnected transportation network.
    Note: Online resource; Title from title page (viewed April 19, 2016) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (418 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as well as its motivations and psychology. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. Topics include: Terrorist organizations and cells Phases of the terrorist cycle, including target selection, planning and preparation, escape and evasion, and media exploitation Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) Methods for deterrence and intelligence-driven counterterrorism The terrorist threat from Latin America, Europe, the Middle East, and Asia The impact of the Arab Spring Why suicide bombings are the ultimate terrorist tool The crime-terror nexus and terrorist funding Technology in terrorism and counterterrorism Providing real-world insight and solutions to terrorist threats and acts at home and abroad, the book goes beyond theory to deliver practitioner knowledge from the field straight into the reader’s hands.
    Note: Online resource; Title from title page (viewed November 11, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...