Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
8,365
result(s) for
"Computer networks Security measures"
Sort by:
Applied Cyber Security and the Smart Grid
2013
Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The \"Smart Grid\" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
Discover the potential of the Smart GridLearn in depth about its systemsSee its vulnerabilities and how best to protect it
Information Security Breaches
2009,2014,2008
If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.
Plugged in : cybersecurity in the modern age
\"In Plugged In, we meet the men and women at the Florida Institute for Cybersecurity Research who have devoted their careers to studying and staying one step ahead of the bad guys. The stories chronicled in Gatorbytes span all colleges and units across the UF campus. They detail the far-reaching impact of UF's research, technologies, and innovations--and the UF faculty members dedicated to them. Gatorbytes describe how UF is continuing to build on its strengths and extend the reach of its efforts so that it can help even more people in even more places.\"--Publisher description.
Network Anomaly Detection
by
Bhattacharyya, Dhruba Kumar
,
Kalita, Jugal Kumar
in
Anomaly detection (Computer security)
,
Computer networks
,
Computer networks -- Security measures
2013,2014
This book discusses the detection of anomalies in computer networks from a machine learning perspective. It examines how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. You'll learn how to look for patterns in captured network traffic data to unearth potential intrusion attempts. Coverage includes machine learning techniques and algorithms, a taxonomy of attacks, and practical tools for launching attacks, capturing packet or flow traffic, extracting features, detecting attacks, and evaluating performance.
Integrated security technologies and solutions. Volume II, Cisco security solutions for network access control, segmentation, context sharing, secure connectivity and virtualization
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions - Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting.
Introduction to network security : theory and practice
2015
Introductory textbook in the important area of network security for undergraduate and graduate students
* Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security
* Fully updated to reflect new developments in network security
* Introduces a chapter on Cloud security, a very popular and essential topic
* Uses everyday examples that most computer users experience to illustrate important principles and mechanisms
* Features a companion website with Powerpoint slides for lectures and solution manuals to selected exercise problems, available at http://www.cs.uml.edu/~wang/NetSec
Computer and information security handbook
by
Vacca, John R.
in
Computer networks
,
Computer networks -- Security measures
,
Penetration testing (Computer security)
2013
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.
Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions