Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 8 of 8 matches in All Departments
Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security. It points out specific security fundamentals where social, medical, or business responses to the crisis failed or needed to make specific use of those concepts. For the most part, these lessons are simply reminders of factors that get neglected during times of non-crisis. The lessons particularly point out the importance of planning and resilience in systems and business. Those studying cybersecurity and its preventive measures and applications, as well as those involved in risk management studies and assessments, will all benefit greatly from the book. Robert Slade has had an extensive and prolific career in management, security, and telecommunications research, analysis, and consultancy. He has served as an educator visiting universities and delivering lecturers and seminars.
The Dictionary of Information Security is a compilation of security
terms and definitions that working security professionals and IT
students will find helpful.
This book gives a thorough explanation of what computer viruses are, how they work, and how much computer users should worry about them. It is written to apply to all systems: micro, network, and mainframe and for both professional managers of computing systems and users of personal computers of all types, PCs, Macintoshes, and others. Robert Slade presents details of many of the most virulent of the known viruses and of the damage that they have done, as well as providing quidelines and recommendations to protect systems from infection. In addition, the book provides the widest possible range of reviews of the major anti-virus software packages available as well as many of the books on viruses. Contact addresses, telephone numbers, and electronic mail addresses are also given. In the event of a suspected virus infection, this book is the one that users will reach for! Included with the book is a diskette containing both four antiviral pieces of software for the PC and Macintosh and the complete virus catalog as produced by the Virus Test Centre at the University of Hamburg.
Title: Narrative of a Journey to the North of Ireland, in the year 1802. Addressed to the Governor and Assistants (London) of the Plantation in Ulster. With a report by J. C. Beresford as to the state of the timber on their estates.]Publisher: British Library, Historical Print EditionsThe British Library is the national library of the United Kingdom. It is one of the world's largest research libraries holding over 150 million items in all known languages and formats: books, journals, newspapers, sound recordings, patents, maps, stamps, prints and much more. Its collections include around 14 million books, along with substantial additional collections of manuscripts and historical items dating back as far as 300 BC.The HISTORY OF BRITAIN & IRELAND collection includes books from the British Library digitised by Microsoft. As well as historical works, this collection includes geographies, travelogues, and titles covering periods of competition and cooperation among the people of Great Britain and Ireland. Works also explore the countries' relations with France, Germany, the Low Countries, Denmark, and Scandinavia. ++++The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to insure edition identification: ++++ British Library Slade, Robert; 1803. 8 . 10390.f.2.
Software forensics -- analyzing program code to track, identify, and prosecute computer virus perpetrators -- has emerged as one of the most promising and technically challenging aspects of information management and security. This is a technical tutorial that thoroughly examines the programming tools, investigative and analysis methods, and legal implications of the complex evidence chain. Also included are eye-opening case studies, including the famous Enron case, and sample code from real criminal investigations. Written by a security consultant whose clients include the Canadian Government, Software Forensics covers: * Basic concepts * Hackers, crackers, and phreaks * Objects of analysis: text strings, source code, machine code * User interfaces and commands * Program structures and versions * Virus families * Function indicators * Stylistic analysis * and much more There is no better or faster way for programmers, security analysts and consultants, security officers in the enterprise, application developers, lawyers, judges, and anyone else interested in software forensics to get up to speed on forensic programming tools and methods and the nature of cyber evidence.
|
You may like...
|