Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 20
- Computer security 18
- Computer networks 11
- Engineering & Applied Sciences 8
- History 8
- Penetration testing (Computer security) 8
- Blockchains (Databases) 7
- Computer Science 6
- Computer software 5
- Development 5
- Social welfare & social services 5
- Artificial intelligence 4
- Data protection 4
- Mass media 4
- Python (Computer program language) 4
- Video games 4
- arbetsliv 4
- työelämä 4
- Access control 3
- Application software 3
- Digital media 3
- Human-computer interaction 3
- Information society 3
- Linux 3
- Microsoft Office 3
- Peace 3
- Politics and government 3
- Research 3
- Social aspects 3
- Technological innovations 3
-
41
-
42Publicado 2018Libro electrónico
-
43
-
44Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Introduction -- Who This Book Is For -- What You'll Gain from This Book -- A Few Words for the Nonengineer -- Security Terminology -- How This Book Is Organized -- Chapter 1 Spoofing and Authenticity -- Identifiers and Authentication -- Technical Identifiers -- Human Identifiers -- Authenticating People to People -- Authenticating People to Computers -- Authenticating Computers to People -- Authenticating Computers to Computers -- Spoofing Attacks -- Spoofing Files -- Spoofing Processes -- Spoofing Machines -- Spoofing in Specific Scenarios -- Internet of Things -- Mobile Phones -- Cloud -- Considerations in Authenticating to Organizations -- Mechanisms for Spoofing Attacks -- Misrepresentation -- Attacks on Authentication Mechanisms -- Threats Against Authentication Types -- Defenses -- Authenticating People -- Authenticating Computers -- Conclusion -- Chapter 2 Tampering and Integrity -- Introduction -- Targets of Tampering -- Tampering with Storage -- Tampering with Communications -- Tampering with Time -- Process Tampering -- Tampering in Specific Technologies -- Mechanisms for Tampering -- Location for Tampering -- Tools for Tampering -- Defenses -- Cryptography -- The Kernel -- Detection -- Conclusion -- Chapter 3 Repudiation and Proof -- Introduction -- The Threat: Repudiation -- Message Repudiation -- Fraud -- Account Takeover -- Logging Threats -- Repudiation in Specific Technologies -- Internet of Things (Including Phones) -- Cloud -- AI/ML -- Crypto and Blockchain -- Repudiation Mechanisms -- Defenses -- Cryptography -- Keeping Logs -- Using Logs -- Antifraud Tools -- Conclusion -- Chapter 4 Information Disclosure and Confidentiality -- Threats to Confidentiality -- Information Disclosure, at Rest -- Information Disclosure, in Motion…”
Libro electrónico -
45
-
46
-
47Publicado 2017“…"Tampere3 project, general knowledge, multicultural education, relocation of upper secondary school in a university campus, educational institution safety, wellbeing at work, successful recruitment process - these topics are discussed in eleven articles of this publication. …”
Libro electrónico -
48
-
49
-
50Publicado 2015Libro electrónico
-
51
-
52
-
53
-
54
-
55
-
56Publicado 2019Libro electrónico
-
57por Wilson, Randal Paul, 1961-Tabla de Contenidos: “…The power of completion -- Communication is king -- Fix the processes -- Waste management -- Managing your resources -- Budget control -- Don't be afraid of risks -- Synergy in management -- Tamper-proof training -- The weakest link -- Organizing for efficiency -- Managing change…”
Publicado 2013
Libro electrónico -
58
-
59
-
60por Hope, PacoTabla de Contenidos: “…Installing some free tools -- Basic observation -- Web-oriented data encoding -- Tampering with input -- Automated bulk scanning -- Automating specific tasks with cURL -- Automating with LibWWWPerl -- Seeking design flaws -- Attacking AJAX -- Manipulating sessions -- Multifaceted tests…”
Publicado 2009
Libro electrónico