48 results - showing 1 - 10
1 2 3 4 5
Ordering
Cyber Infrastructure Protection by Tarek N. Saadawi, Louis H. Jordan Jr.
 
0.0 (0)
Ebooks May 29, 2022 4

Ebook Details

Author
Tarek N. Saadawi, Louis H. Jordan Jr.
Publisher
Strategic Studies Institute 2011
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection.
Information Security in Education
 
0.0 (0)
Ebooks May 29, 2022 2

Ebook Details

Publisher
Wikibooks 2010
This Wikibook is an introduction to information security aimed primarily at K-12 administrators, educators, and (to a lesser extent) technology staff.
Policing Cyber Crime by Petter Gottschalk
 
0.0 (0)
Ebooks May 26, 2022 3

Ebook Details

Author
Petter Gottschalk
Publisher
BookBoon 2010
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
Hacking Secret Ciphers with Python by Al Sweigart
 
0.0 (0)
Ebooks May 26, 2022 4
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers.
Cryptography and Security in Computing by Jaydip Sen (ed.)
 
0.0 (0)
Ebooks May 26, 2022 3

Ebook Details

Author
Jaydip Sen (ed.)
Publisher
InTech 2012
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
What If Crime Were Impossible? by N. Richard Wagner
 
0.0 (0)
Ebooks May 26, 2022 5

Ebook Details

Author
N. Richard Wagner
Publisher
Univ. of Texas San Antonio 2002
Imagine societies with better planning, tighter control, more interference, and at the same time with openness and privacy. What if we made full use of computer technology, to enhance our security and our lives? Indeed, what if crime were impossible.
The Laws of Cryptography with Java Code by Neal R. Wagner
 
0.0 (0)
Ebooks May 26, 2022 4

Ebook Details

Author
Neal R. Wagner
Publisher
Univ. of Texas San Antonio 2003
In this book the author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible and of interest to many others.
 
0.0 (0)
Ebooks May 26, 2022 3

Ebook Details

Author
WeiQi Yan, Jonathan Weir
Publisher
BookBoon 2010
This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding. 
The Protection of Information in Computer Systems by J.H. Saltzer, M.D. Schroeder
 
0.0 (0)
Ebooks May 24, 2022 2

Ebook Details

Author
J.H. Saltzer, M.D. Schroeder
Publisher
MIT 1975
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures -- whether hardware or software -- that are necessary to support information protection.
Safeguarding Your Technology by Tom Szuba
 
0.0 (0)
Ebooks May 24, 2022 3

Ebook Details

Author
Tom Szuba
Publisher
NCES 1998
This guide has been developed specifically for educational administrators at the building, campus, district, system, and state levels. It is meant to serve as a framework to help them better understand why, and how, to effectively secure their organization's information, software, and computer and networking equipment.
48 results - showing 1 - 10
1 2 3 4 5
0
Shares