Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
18,373
result(s) for
"Computer networks Access control."
Sort by:
Wiki at war : conflict in a socially networked world
2012,2011
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.
WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide Web that concerns airstrikes in Iraq, US diplomatic communications, and other sensitive matters.
In Wiki at War, James Jay Carafano explains why these and other Internet-born initiatives matter and how they are likely to affect the future face of war, diplomacy, and domestic politics.
“The war for winning dominance over social networks and using that dominance to advantage is already underway,” Carafano writes in this extremely timely analysis of the techno-future of information and the impact of social networking via the Internet. Drawing on his extensive knowledge of history and defense strategy, Carafano creates a cogent analysis of what is truly new about the “new media,” and what is simply a recasting of human warfare in contemporary forms.
Wiki at War is written in a lively, accessible style that will make this technological development comprehensible and engaging for general readers without sacrificing the book’s usefulness to specialists. Outlining the conditions under which a difference in degree becomes a difference in kind, detailing how ancient wisdom can still apply to national security decisions, and examining the conditions under which new expertise is required to wage effective diplomacy or successful military strategy, Carafano casts in stark relief the issues that face political, military, and social leaders in trying to manage and control information, in both the international and domestic arenas. Wiki at War affords stimulating thought about and definitive discussion of this vital emerging topic.
Beyond cybersecurity : protecting your digital business
\"The book's content is based on McKinsey's proprietary research, client experience and interviews with over 200 executives, regulators and security experts. This effort has four main findings: Pervasive digitization, open and inter-connected technology environments and sophisticated attackers make cyber-attacks a critical social and business issue that could materially slow the pace of technology and bushiness innovation with as much as $3 trillion in aggregate impact. There's a high degree of consensus among enterprise technology executives about the nature of a step-change capability improvement required to make their institutions cyber-resilient. While institutions need to start acting to improve their capabilities now, there should be enhanced collaboration across the cyber-security ecosystem to get alignment on a broad range of policy issues. Progress toward cyber-resiliency can only be achieved with active engagement from the most senior business and public leaders\"--Publisher's description.
Beyond cybersecurity
by
Marcus, Alan
,
Kaplan, James M
,
Rezek, Chris
in
Access control
,
Business enterprises
,
Business enterprises--Computer networks--Security measures
2015
Protecting your digital assets is no longer a technical conversation alone, but one that should involve the Board and senior executives. This study offers concrete, actionable and business-wise recommendations to strengthen cyber resilience.
Practical cloud security : a guide for secure design and deployment
\"With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. Chris Dotson--an IBM senior technical staff member--shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment.\"--Back cover.
Interception of Electronic Communications in the Czech Republic and Slovakia
by
Abelovský, Tomá
,
Polák, Radim
,
Stupka, Václav
in
Comparative politics
,
Computer networks-Access control-Czech Republic
,
Computer networks-Access control-Slovakia
2016
One of the most important forming factors of the distribution of public powers in the Czech Republic is its totalitarian history. There is a strong sense of distrust towards official institutions in the general public. It is probably due to this fact, that the procedures and powers of public bodies and agencies are set very rigidly. The principle of legality is set in Art. 2 para. 3 of the Czech Constitution (Act No. 1/1993 Sb. Constitution of the Czech Republic), which states that State authority is to serve all citizens and may be asserted only in cases, within the bounds, and in the manner provided forby law and in Art. 2 para. 2 of the Charter of Fundamental Rights and Freedoms (the Resolution of the Presidium of the Czech National Council of 16 December 1992 on the declaration of the Charter of Fundamental Rights and Freedoms as a part of the constitutional order of the Czech Republic No. 2/1993 Sb.), which states that State authority may be asserted only in cases and within the bounds provided for by law and only in the manner prescribed by law. Since all the public authorities authorized to intercept telecommunication fall within the scope of these articles, they are permitted to act only within the framework of what is expressly allowed for them by law.
Implementing NAP and NAC Security Technologies
by
Hoffman, Daniel V
,
Hoffman, Daniel
in
Access control
,
Computer network protocols
,
Computer networks
2008
Prevent hacker exploits with this comprehensive implementation guide You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits Determine which security solutions will stop the exploits from happening Gain a strong understanding of the various NAP/NAC terms, standards, and organizations Learn all about the standard components of any NAP/NAC solution Analyze a security posture, set policies for device analysis, communicate to the device, and take action Explore NAP and NAC solutions from different vendors, including Cisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC.
Network security : private communication in a public world
by
Kaufman, Charlie, author
,
Perlman, Radia, author
,
Speciner, Michael, author
in
Computer security.
,
Computer networks Security measures.
,
Computers Access control.
2023
The classic guide to cryptography and network security -- now fully updated! \"Alice and Bob are back!\" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) - back of cover.
Hands-On Security in DevOps
by
Hsu, Tony Hsiang-Chih
in
Computer networks-Access control
,
Computer networks-Security measures
,
COMPUTERS / Enterprise Applications / Business Intelligence Tools
2018
Hands-On Security in DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide through risk management and training.