Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
1,993
result(s) for
"Computers-Access control"
Sort by:
Mastering Metasploit
by
Jaswal, Nipun
in
COMPUTERS / Security / General
,
Computers-Access control
,
Penetration testing (Computer security)
2018,2024
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.
Identity Management for Internet of Things
by
Mahalle, Parikshit N
,
Railkar, Poonam N
in
Communication, Networking and Broadcast Technologies
,
Computers
,
Computers-Access control
2020,2015,2022
The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis. Technical topics discussed in the book include: • Internet of Things; • Identity Management; • Identity models in Internet of Things; • Identity management and trust in the Internet of Things context; • Authentication and access control; Identitymanagement for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identitymanagement and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control.Key milestones identified for Identitymanagement are clustering with hierarchical addressing, trust management, mutual authentication and access control. Identitymanagement for Internet of Things is ideal forpersonnel in computer/communication industries as well as academic staff and master/research students in wireless communication, computer science, operational research, electrical engineering andtelecommunication systems Internet, and cloud computing.
Network security : private communication in a public world
by
Kaufman, Charlie, author
,
Perlman, Radia, author
,
Speciner, Michael, author
in
Computer security.
,
Computer networks Security measures.
,
Computers Access control.
2023
The classic guide to cryptography and network security -- now fully updated! \"Alice and Bob are back!\" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) - back of cover.
Attribute-Based Access Control
by
Chandramouli, Ramaswamy
,
Ferraiolo, David F
,
Hu, Vincent C
in
Computer networks-Access control
,
Computer security
,
Computers-Access control
2017
This book presents a combination of technical and administrative instructions for the development of attribute-based access control to improve information sharing within organizations.
Passwords : philology, security, authentication
Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls \"crypto-philology\" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- Provided by publisher
Integrated Security Systems Design
2007
Enterprise-class security for government and corporate installations worldwide.
Becoming the hacker : the playbook for getting inside the mind of an attacker
\"Things you will learn : study the mindset of an attacker, adopt defensive strategies, classify and plan for standard web application security threats, prepare to combat standard system security problems, defend WordPress and mobile applications, use security tools and plan for defense against remote execution.\"--Back cover.
Critical information infrastructure protection and the law : an overview of key issues
by
National Research Council (U.S.). Committee on Critical Information Infrastructure Protection and the Law
,
Patterson, Cynthia A.
,
Personick, Stewart D.
in
Computer security
,
Computer security -- Law and legislation -- United States
,
Computer security-United States
2003,2004
All critical infrastructures are increasingly dependent on the information infrastructure for information management, communications, and control functions.Protection of the critical information infrastructure (CIIP), therefore, is of prime concern.