The Good and Not So Good of Enforcing Password Composition Rules
Information Systems Security
Enhancing IA performance capability through an active learning capstone seminar
Proceedings of the 5th annual conference on Information security curriculum development
Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions
Information Networking. Towards Ubiquitous Networking and Services
On the security of a popular web submission and review software (WSaR) for cryptology conferences
WISA'07 Proceedings of the 8th international conference on Information security applications
Embedding security into visual programming courses
Proceedings of the 2011 Information Security Curriculum Development Conference
Using image steganography for decryptor distribution
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Hi-index | 0.00 |
Learn the essentials of computer and network security while getting complete coverage of all the objectives for CompTIA’s Security+ certification exam, plus coverage of the (ISC)2 SSCP certification, which focuses on best practices, roles, and responsibilities of security experts. Written and edited by leaders in the IT security field, this text explains the fundamentals of communication, infrastructure, and operational security. You’ll also get details on methods to defend your computer systems and networks and how to prevent attacks.Table of contents 1: Introduction and Security Trends 2: General Security Concepts 3: Operational/ Organizational Security 4: The Role of People in Security 5: Cryptography 6: Public Key Infrastructure 7: Standards and Protocols 8: The Impact of Physical Security on Network Security 9: Network Fundamentals 10: Infrastructure Security 11: Remote Access 12: Wireless and Instant Messaging 13: Intrusion Detection Systems 14: Security Baselines 15: Attacks and Malware 16: E-mail 17: Web Components 18: Software Development 19: Disaster Recovery, Business Continuity, and Organizational Policies 20: Risk Management 21: Change Management 22: Privilege Management 23: Computer Forensics 24: Security and Law A: About the CD-ROM B: About the Security+ Exam