Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
54
result(s) for
"Computer security Handbooks, manuals, etc."
Sort by:
Becoming an ethical hacker
\"It's impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. In Becoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where it's going, while providing vivid case studies illustrating how to become one of these 'white hats' who specializes in ensuring the security of an organization's information systems. He shows how companies pay these specialists to break into their protected systems and networks to test and assess their security. Readers will learn how these white hats use their skills to improve security by exposing vulnerabilities before malicious hackers can detect and exploit them. Weaving practical how-to advice with inspiring case studies, Rivlin provides concrete, practical steps anyone can take to pursue a career in the growing field of cybersecurity.\"-- Provided by publisher.
Handbook on securing cyber-physical critical infrastructure : foundation and challenges
by
Das, Sajal K.
,
Zhang, Nan
,
Kant, Krishna
in
Computer networks
,
Computer networks -- Security measures -- Handbooks, manuals, etc
,
Computer security
2012
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout
Handbook on Securing Cyber-Physical Critical Infrastructure
by
Das, Sajal K
,
Zhang, Nan
,
Kant, Krishna
in
Computer networks
,
Computer security
,
Handbooks, manuals, etc
2012
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenariosIncludes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so onLoaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout
Information assurance handbook : effective computer security and risk management strategies
\"Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike\"-- Provided by publisher.
The car hacker's handbook : a guide for the penetration tester
by
Smith, Craig
in
Automobiles
,
Automobiles - Vandalism - Prevention
,
Automobiles -- Customizing -- Handbooks, manuals, etc
2016
A deep technical look at the internals of vehicle networks and ways to research potential vulnerabilities, attacks, and exploits. Author is a recognized expert and trainer A deep technical look at the internals of vehicle networks and ways to research potential vulnerabilities, attacks, and exploits. Author is a A deep technical look at the internals of vehicle networks and ways to research potential vulnerabilities, attacks, and exploits. Author is a recognized expert and trainer.
Information Security Management Handbook, Volume 6
by
Krause Nozaki, Micki
,
Tipton, Harold F
in
Computer security
,
Computer security -- Management -- Handbooks, manuals, etc
,
Data protection
2012,2011
This annually updated handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required by IT security professionals. It covers the CISSP Common Body of Knowledge (CBK) that forms the standard on which all IT security programs and certifications are based. Topics covered include access control, physical (environmental) security, cryptography, application security, and operations security. This new edition features the latest developments in information security and the (ISC)2 CISSP CBK, including advanced persistent threats, new HIPAA requirements, social networks, virtualization, and SOA.
Handbook of image-based security techniques
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The first section explores basic to advanced concepts of visual cryptography (VC). The second section covers Digital Image Watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The final section analyzes Steganography, including the notion, terminology and building blocks of steganographic communication. The book includes many examples and applications, as well as implementation using MATLAB-- Provided by publisher.