Table of contents: Introduction 1. Concepts of Project Management 2. Project Management Methodologies 3. Project Initiation 4. Advancing Beyond the Greenlight 5. The Project Plan & Project Approach 6. Project Kick-Off 7. Project Design 8. Creating The Project Schedule 9. Project Development 10. Managing Obstacles and Risks 11. Managing Communication 12. Integration and Testing …
Table of Contents 1. New dimensions in privacy: communications technologies, media practices and law Andrew T. Kenyon and Megan Richardson 2. Privacy and freedom of speech Eric Barendt 3. Revisiting the American action for public disclosure of private facts Brian C. Murchison 4. The internet and the private life in Europe: risks and aspirations Yves Poullet and J. Marc Dinant 5. APEC's p…
Contents: Chapter 1. Intrusion Detection Systems; Chapter 2. Introducing Snort 2.6; Chapter 3. Installing Snort 2.6; Chapter 4. Configuring Snort and Add-Ons; Chapter 5. Inner Workings; Chapter 6. Preprocessors; Chapter 7. Playing by the Rules; Chapter 8. Snort Output Plug-Ins; Chapter 9. Exploring IDS Event Analysis, Snort Style; Chapter 10. Optimizing Snort; Chapter 11. A…
Contents: Ch. 1 The Principles of Auditing Security Fundamentals: The Five Pillars Building a Security Program Security Controls Managing Risk How, What, and Why You Audit ch. 2 Information Security and the Law IT Security Laws Hacking, Cracking, and Fraud Laws Intellectual Property Laws Can-Spam Act of 2003 State and Local Laws Reporting a Crime Regulatory C…
Table of contents PART I. Theoretical Foundations Introduction Chapter 1. Security and Vulnerability of Cyber-Physical Infrastructure Networks 1.1 Introduction 1.2 Definitions for Security and Vulnerability of Network Dynamics 1.3 Network Control Tools for Characterizing and Designing Security and Vulnerability 1.4 Conclusions and Future Work Chapter 2. Game Theory for Infrastruct…
Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…
pt. I A JOURNEY TO KERNEL LAND ch. 1 From User-Land to Kernel-Land Attacks Introduction Introducing the Kernel and the World of Kernel Exploitation Why Doesn't My User-Land Exploit Work Anymore? An Exploit Writer's View of the Kernel User-Land Processes and the Scheduler Open Source versus Closed Source Operating Systems ch. 2 A Taxonomy of Kernel Vulnerabilities Uninitializ…
Table of Contents 1. Brief History of Corporate Information Security and Privacy Awareness and Training Once Upon a Time Welcome to the Information Age Information Security and Privacy Education Current Challenges Bring Changes in Professional Education 2. Why Training and Awareness Are Important Regulatory Requirements Compliance Customer Trust and Satisfaction …
Table of contents Introduction. Chapter 1 Understanding Core Security Principles. Chapter 2 Understanding Malware and Social Engineering. Chapter 3 Understanding User Authentication. Chapter 4 Securing Access with Permissions. Chapter 5 Using Audit Policies and Network Auditing. Chapter 6 Protecting Clients and Servers. Chapter 7 Protecting a Network. Chapter 8 Understanding Wireless S…
Contents: Ch.1 Introduction: approach and workplan Ch.2 Cyberspace Ch.3 Development and cyberspace: finance-universal access-cultural identity Ch.4 Competing cyber policies: US,EU,Japan Ch.5 Cyber regulation: access - the European example Ch.6 Trust: digital signatures and encryption Ch.7 Internet domain names Ch.8 Intellectual property rights Ch.9 Freedom of expression and human digni…