Contents: Chapter 1 The emergence medical information in the face of personal and sociental ethical challenges 1.1 An information-consuming society 1.2 E-health, m-health, the quantified self and big data 1.3 Medical secrecy in the face of the computerization of healthcare data 1.4 Cultural evolution of mentalities surrounding legitimacy of information 1.5 Processing of personal data in…
Contents: A is for advanced persistent threats B is for botnet C is for cloud D is for dwell-time E is for exploit F is for firewall G is for governance H is for hacker I is for indicators of compromise (IOC) J is for java K is for kill chain L is for logic bomb M is for malware N is for network segmentation O is for OWASP P is for patch management Q is for quarantine R is f…
Contents: Chapter 1 Satellite and terrestrial hybrid networks 1.1 Designing satellite and terrestrial hybrid networks 1.2 Hybrid scenarios 1.3 Case study: loose coupling integration 1.4 Conclusion Chapter 2 Quality of service on next- generation terrestrial networks 2.1 IETF approach 2.2 ITU-NGN approach 2.3 Conclusion Chapter 3 Quality of service in DVB-S/RCS satellite networks…
Contents: Introduction Assessment test Chapter 1 Secrets of successful auditor Understanding the demand for IS audits Understanding policies, standards, guidelines, and procedures Understanding professional ethics Understanding the purpose of an audit Differentiating between auditor and auditee roles Implementing audit standards Auditor is an executive position Understanding the …
Contents at a glance: Chapter 1 An introduction to linux Chapter 2 Working with the linux shell Chapter 3 Using the vi text editor Chapter 4 Managing linux files and directories Chapter 5 Installing ninux Chapter 6 Managing the linux boot process Chapter 7 Managing the graphical environment Chapter 8 Managing linux software Chapter 9 Managing linux users and groups Chapter …
Contents: 1 Introduction 1.1 Trust problem 1.2 Ciphertext access control problem 1.3 Efficiency problem in multi-message cryptology 1.4 The challenges from quantum and biological computing 1.5 Organization 2 Proxy re-cryptography 2.1 Introduction 2.2 Proxy re cryptography 2.3 Proxy re-encryption 3 Attribute-based cryptography 3.1 Introduction 3.2 Universal definitions 3.3 Bo…
Contents: 1 Why big data 1.1 Big data 1.2 What creates big data 1.3 How do we use big data 1.4 Essential issues related to big data References 2 Basic programs for analyzing network 2.1 UCINET 2.2 NetMiner 2.3 R 2.4 Gephi 2.5 NodeXL References 3 Understanding network analysis 3.1 Defining social network analysis 3.2 Basic SNA concepts 3.3 Social network data References …
Contents: Chapter 1 Could something like this really happen Chapter 2 It’s all about the information Chapter 3 A cyber pearl harbor Chapter 4 Eligible receiver Chapter 5 Solar sunrise, moonlight maze Chapter 6 The coordinator meets mudge Chapter 7 Deny, exploit, corrupt, destroy Chapter 8 Tailored access Chapter 9 Cyber wars Chapter 10 Buckshot yankee Chapter 11 The who…
Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …
Contents: Chapter 1 Getting started with fireSIGHT Chapter 2 Object management Chapter 3 IPS policy management Chapter 4 Access control policy Chapter 5 FireSIGHT technologies Chapter 6 Intrusion event analysis Chapter 7 Network-based malware detection Chapter 8 System settings Chapter 9 Account management Chapter 10 Dwvice management Chapter 11 Correlation policy Chapte…