Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
The First Edition of the The Information Security Dictionary defines over 1200 of the most commonly used words in the security field, with particular attention to those terms used most often in forensics, malware, viruses, vulnerabilities and IPv6. A new world of words has emerged from technology¿s affect on the language of our modern culture. The Information Security Dictionary is a reference tool that should become part of any IT professional and IT student's library, concisely formatted in one volume.Special attention is paid to terms which most often prevent educated readers from understanding journal articles and books in cryptology, security and information systems, and computer science, in addition to applied fields that build on these disciplines, such as system design, security auditing, vulnerability testing, and role-based access management. The emphasis throughout The Information Security Dictionary is on concepts, rather than implementations. Since concepts often complicate matters, readers may find a definition makes sense only after it has been illustrated by an example which the author provides in this dictionary. TOC:List of Figures.- List of Tables.- Preface: Something for Everyone.- Acknowledgements.- Why is IT Security Important?- About this Dictionary.- About the Author.- How to Use This Dictionary.- Epilogue: Critical Infrastructure Protection (CIP).- Appendices: Suggestions for Additional Resources.- Appendix 1: On-Line Databases for Vulnerabilities and Security.- Appendix 2: Dictionaries & Encyclopedias.- Appendix 3: Miscellaneous Resources.- Appendix 4: Legislation and Regulation - European Union.- Appendix 5: Legislation and Regulation.- Appendix 6: Standards and Best Practice.- Security and Utility Tools.- Appendix 7: `Nearly' or Outright Free Security Tools for System Administrators.- Appendix 8: `Nearly' or Outright Free Security Tools for Home Users.- Awareness Raising - Skill Development.- Appendix 9: Newsletters.- Appendix 10: Alerts and Advisories.
Like its financial counterpart, the social media audit (SMA) can be described as a formalized review of anorganization's social media activities. This book will address social media marketing issues using a cost benefit approach, while presenting a systematic approach to review the organization's social media activities.
This text addresses Internet and multimedia issues from an international perspective by outlining issues of international sovereignty and the potential impact of national interests on global technology policy. It supplies a survey that points out accomplishments, issues and problems.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.