|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Coding for Penetration Testers: Building Better Tools, Second
Edition provides readers with an understanding of the scripting
languages that are commonly used when developing tools for
penetration testing, also guiding users through specific examples
of custom tool development and the situations where such tools
might be used. While developing a better understanding of each
language, the book presents real-world scenarios and tool
development that can be incorporated into a tester's toolkit. This
completely updated edition focuses on an expanded discussion on the
use of Powershell, and includes practical updates to all tools and
coverage.
Intelligent Data Analysis for e-Learning: Enhancing Security and
Trustworthiness in Online Learning Systems addresses information
security within e-Learning based on trustworthiness assessment and
prediction. Over the past decade, many learning management systems
have appeared in the education market. Security in these systems is
essential for protecting against unfair and dishonest conduct-most
notably cheating-however, e-Learning services are often designed
and implemented without considering security requirements. This
book provides functional approaches of trustworthiness analysis,
modeling, assessment, and prediction for stronger security and
support in online learning, highlighting the security deficiencies
found in most online collaborative learning systems. The book
explores trustworthiness methodologies based on collective
intelligence than can overcome these deficiencies. It examines
trustworthiness analysis that utilizes the large amounts of
data-learning activities generate. In addition, as processing this
data is costly, the book offers a parallel processing paradigm that
can support learning activities in real-time. The book discusses
data visualization methods for managing e-Learning, providing the
tools needed to analyze the data collected. Using a case-based
approach, the book concludes with models and methodologies for
evaluating and validating security in e-Learning systems. Indexing:
The books of this series are submitted to EI-Compendex and SCOPUS
Media reform plays an increasingly important role in the struggle
for social justice. As battles are fought over the future of
investigative journalism, media ownership, spectrum management,
speech rights, broadband access, network neutrality, the
surveillance apparatus, and digital literacy, what effective
strategies can be used in the pursuit of effective media reform?
Prepared by thirty-three scholars and activists from more than
twenty-five countries, Strategies for Media Reform focuses on
theorizing media democratization and evaluating specific projects
for media reform. This edited collection of articles offers readers
the opportunity to reflect on the prospects for and challenges
facing campaigns for media reform and gathers significant examples
of theory, advocacy, and activism from multinational perspectives.
U. S. critical infrastructures, such as financial institutions,
commercial buildings, and energy production and transmission
facilities, are systems and assets, whether physical or virtual,
vital to the nations security, economy, and public health and
safety. To secure these systems and assets, federal policy and the
National Infrastructure Protection Plan (NIPP) establish
responsibilities for federal agencies designated as Sector-specific
agencies (SSAs), including leading, facilitating, or supporting the
security and resilience programs and associated activities of their
designated critical infrastructure sectors. The objectives of this
book are to determine the extent to which SSAs have identified the
significance of cyber risks to their respective sectors networks
and industrial control systems; taken actions to mitigate cyber
risks within their respective sectors; collaborated across sectors
to improve cybersecurity; and established performance metrics to
monitor improvements in their respective sectors.
Computers and computer networking provide major benefits to modern
society, yet the growing costs of malicious cyber activities and
cybersecurity itself diminish these benefits. Advances in
cybersecurity are urgently needed to preserve the Internets growing
social and economic benefits by thwarting adversaries and
strengthening public trust of cyber systems. On December 18, 2014
the President signed into law the Cybersecurity Enhancement Act of
2014. This law requires the National Science and Technology Council
(NSTC) and the Networking and Information Technology Research and
Development (NITRD) Program to develop and maintain a cybersecurity
research and development (R&D) strategic plan (the Plan) using
an assessment of risk to guide the overall direction of
Federally-funded cybersecurity R&D. This plan satisfies that
requirement and establishes the direction for the Federal R&D
enterprise in cybersecurity science and technology (S&T) to
preserve and expand the Internets wide-ranging benefits. This book
reviews the strategy and implementation for research and
development of federal cybersecurity.
|
|