banner banner banner

Информационная безопасность

0
Аннотация на книгу:

Работа посвящена исследованию компьютерной информации и компьютерной техники с точки зрения ее правового статуса и правовой защиты. Раскрывается само понятие информации и ее тот эффект, который оказало на развитие человечества изобретение средств ее
автоматической обработки. Особое внимание уделено правовому регулированию статуса компьютерной информации и информационных сетей, включая глобальную сеть Интернет. Отдельная глава посвящена правовому регулированию вопросов информационной безопасности и
защиты информации. Также в книге исследованы вопросы уголовной ответственности за киберпреступления, их расследования и использования компьютерной информации в качестве доказательств.

Добавлено: 04.09.2023 03:09 Рейтинг: Будь первым кто оценит книгу Комментариев 0 шт.
0
Аннотация на книгу:

В монографии поднимается и глубоко анализируется актуальная проблема, связанная с возникновением и развитием естественного интеллекта и способами его воссоздания в программных и программно-аппаратных системах. В работе освещаются наиболее перспективные
технологии бионического направления при создании интеллектуальных систем: масштабное моделирование мозговой активности, биотехнические системы, перенос сознания на искусственные носители, что стало возможно в эпоху информационной революции, которая
определяет как огромные перспективы научного прорыва и развития человечества, так и риски, порождаемые интеллектуальной деятельностью человека.Работа рассчитана на широкий круг читателей, интересующихся указанным спектром проблем.

Добавлено: 04.09.2023 03:09 Рейтинг: Будь первым кто оценит книгу Комментариев 0 шт.
0
Автор: Peter Sommerlad
Название: Security Patterns
Жанр: информационная безопасность
Аннотация на книгу:

Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security in the broader engineering process. Essential for designers building large-scale systems who want best practice solutions to typical security problems Real world case studies illustrate how to use the patterns in specific domains For more information visit www.securitypatterns.org

Добавлено: 31.08.2023 19:08 Рейтинг: Будь первым кто оценит книгу Комментариев 0 шт.
0
Автор: Angelika Shafir
Название: Cryptology Unlocked
Жанр: информационная безопасность
Аннотация на книгу:

Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code-breaking and attack algorithms. Topics range from the simplest enciphering methods to precise investigations of modern algorithms. Everything you need to understand the delicate balance between complex and actual information, with a peppering of anecdotes along the way. Join the cryptology adventure, and understand: The difference between good and bad algorithms Whether or not secret services can read all messages The real-world affect cryptography had on World War II The unspoken security risks behind digital mobile standards GSM and UMTS The everyday implications on digital signatures, PINs and online banking

Добавлено: 31.08.2023 19:08 Рейтинг: Будь первым кто оценит книгу Комментариев 0 шт.
0
Автор: Richard M. Low
Название: Applied Cryptanalysis
Жанр: информационная безопасность
Аннотация на книгу:

The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.

Добавлено: 31.08.2023 19:08 Рейтинг: Будь первым кто оценит книгу Комментариев 0 шт.
0
Автор: Roger R. Dube
Жанр: информационная безопасность
Аннотация на книгу:

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices. This book provides a road map of the hardware-based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers: Cryptography Key generation and distribution The qualities of security solutions Secure co-processors Secure bootstrap loading Secure memory management and trusted execution technology Trusted Platform Module (TPM) Field Programmable Gate Arrays (FPGAs) Hardware-based authentification Biometrics Tokens Location technologies Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice. The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

Добавлено: 31.08.2023 18:08 Рейтинг: Будь первым кто оценит книгу Комментариев 0 шт.
0
Автор: Kevin Beaver
Название: Hacking For Dummies
Жанр: информационная безопасность
Аннотация на книгу:

Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you’re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently—with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There’s no such thing as being too safe—and this resourceful guide helps ensure you’re protected.

Добавлено: 31.08.2023 11:08 Рейтинг: Будь первым кто оценит книгу Комментариев 0 шт.
0
Автор: David Seidl
Жанр: информационная безопасность
Аннотация на книгу:

World-class preparation for the new PenTest+ exam The CompTIA PenTest+ Study Guide: Exam PT0-001 offers comprehensive preparation for the newest intermediate cybersecurity certification exam. With expert coverage of Exam PT0-001 objectives, this book is your ideal companion throughout all stages of study; whether you’re just embarking on your certification journey or finalizing preparations for the big day, this invaluable resource helps you solidify your understanding of essential skills and concepts. Access to the Sybex online learning environment allows you to study anytime, anywhere with electronic flashcards, a searchable glossary, and more, while hundreds of practice exam questions help you step up your preparations and avoid surprises on exam day. The CompTIA PenTest+ certification validates your skills and knowledge surrounding second-generation penetration testing, vulnerability assessment, and vulnerability management on a variety of systems and devices, making it the latest go-to qualification in an increasingly mobile world. This book contains everything you need to prepare; identify what you already know, learn what you don’t know, and face the exam with full confidence! Perform security assessments on desktops and mobile devices, as well as cloud, IoT, industrial and embedded systems Identify security weaknesses and manage system vulnerabilities Ensure that existing cybersecurity practices, configurations, and policies conform with current best practices Simulate cyberattacks to pinpoint security weaknesses in operating systems, networks, and applications As our information technology advances, so do the threats against it. It’s an arms race for complexity and sophistication, and the expansion of networked devices and the Internet of Things has integrated cybersecurity into nearly every aspect of our lives. The PenTest+ certification equips you with the skills you need to identify potential problems—and fix them—and the CompTIA PenTest+ Study Guide: Exam PT0-001 is the central component of a complete preparation plan.

Добавлено: 31.08.2023 11:08 Рейтинг: Будь первым кто оценит книгу Комментариев 0 шт.
0
Автор: Mark Stamp
Жанр: информационная безопасность
Аннотация на книгу:

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic «orange book» view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.

Добавлено: 31.08.2023 09:08 Рейтинг: Будь первым кто оценит книгу Комментариев 0 шт.
0
Автор: Lynn Margaret Batten
Жанр: информационная безопасность
Аннотация на книгу:

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based – such as the discrete logarithm problem and the difficulty of factoring integers. The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography: • Explains fundamentals of public key cryptography • Offers numerous examples and exercises • Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam • Provides solutions to the end-of-chapter problems Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.

Добавлено: 31.08.2023 09:08 Рейтинг: Будь первым кто оценит книгу Комментариев 0 шт.