Table of contents: 1. The system forensics landscape 2. System forensics fundamentals 3. Overview of computer crime 4. Challenges of system forensics 5. Forensics methods and labs 6. Technical overview: system forensics tools, techniques, and methods 7. System forensics technologies 8. Controlling a forensic investigation 9. Collecting, seizing, and protecting evidence 10. Understan…
Table of contents: Part I Overview of System and Network Security: A Comprehensive Introduction Chapter 1 Building a Secure Organization 1.1 Obstacles To Security 1.2 Ten Steps To Building A Secure Organization 1.3 Don’t Forget The Basics 1.4 Preparing For The Building Of Security Control Assessments 1.5 Summary 1.6 Chapter Review Questions/Exercises 1.7 Optional Team Case Project …
Contents: 1. Fault tolerance and resilience in cloud computing environments 2. Data encryption 3. Public key infrastructure 4. Physical security essentials 5. Disaster recovery 6. Biometrics 7. Homeland security 8. Cyber warfare 9. System security 10. Securing the infrastructure 11. Access controls 12. Assessments and audits 13. Fundamentals of cryptography 14. Satell…
DAFTAR ISI: 1. The threat to privacy and corporate vulnerability 2. The nature or privacy problems 3. The regulatory and legislative environment 4. Organizing to protect privacy 5. Conducting a privacy-needs audit 6. Evaluating technology needs for privacy protection 7. Developing the enterprise privacy plan 8. Implementing the enterprise privacy …
Anak judul: a guide to developing and implementing an ironclad e-business privasi plan Termasuk bibliografi dan indeks. DAFTAR ISI: 1. The threat to privacy and corporate vulnerability 2. The nature or privacy problems 3. The regulatory and legislative environment 4. Organizing to protect privacy 5. Conducting a privacy-needs audit 6. Evaluating technology needs f…