Cargando…

Cyber security and IT infrastructure protection /

"Part 1 Performance Analysis and Coaching 1 The role of performance analysis in elite netball competition structures 2 Soccer match analysis. A qualitative study with Portuguese First League coaches 3 Coach behaviour analysis within elite youth soccer 4 Performance analysis in professional socc...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, [2014]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn861526594
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 130916t20142014maua ob 001 0 eng d
010 |z  2013388292 
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d YDXCP  |d OCLCO  |d N$T  |d B24X7  |d COO  |d OCLCQ  |d OCLCF  |d ICA  |d DEBSZ  |d COCUF  |d AGLDB  |d K6U  |d CNNOR  |d CCO  |d Z5A  |d PIFAG  |d FVL  |d LIV  |d SAV  |d OCLCA  |d U3W  |d OCLCA  |d D6H  |d STF  |d OCLCQ  |d VTS  |d CEF  |d INT  |d S4S  |d CNSPO  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d GGVRL  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d UK7LJ  |d UWK  |d OCLCQ  |d OCLCO  |d TUHNV  |d OCLCO  |d OCLCQ  |d INARC  |d QGK  |d OCLCO  |d OCLCQ  |d OCLCL 
016 7 |a 016471911  |2 Uk 
019 |a 867908977  |a 872699134  |a 879495415  |a 1055358267  |a 1065688233  |a 1081210002  |a 1103270335  |a 1129348997  |a 1152972366  |a 1156041772  |a 1166182927  |a 1192336141  |a 1228558254  |a 1259081812  |a 1393045772 
020 |a 9780124200470  |q (electronic bk.) 
020 |a 0124200478  |q (electronic bk.) 
020 |z 9780124166813 
020 |z 0124166814  |q (pbk.) 
029 1 |a AU@  |b 000052305205 
029 1 |a AU@  |b 000053308518 
029 1 |a CHNEW  |b 000634483 
029 1 |a CHVBK  |b 311575803 
029 1 |a DEBBG  |b BV043957926 
029 1 |a DEBSZ  |b 481276378 
029 1 |a NZ1  |b 15550105 
029 1 |a NZ1  |b 15962790 
029 1 |a AU@  |b 000053745400 
035 |a (OCoLC)861526594  |z (OCoLC)867908977  |z (OCoLC)872699134  |z (OCoLC)879495415  |z (OCoLC)1055358267  |z (OCoLC)1065688233  |z (OCoLC)1081210002  |z (OCoLC)1103270335  |z (OCoLC)1129348997  |z (OCoLC)1152972366  |z (OCoLC)1156041772  |z (OCoLC)1166182927  |z (OCoLC)1192336141  |z (OCoLC)1228558254  |z (OCoLC)1259081812  |z (OCoLC)1393045772 
037 |b Title purchased via Dawsonera PDA 
050 4 |a QA76.9.A25  |b C93 2014eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Cyber security and IT infrastructure protection /  |c edited by John R. Vacca. 
264 1 |a Waltham, MA :  |b Syngress,  |c [2014] 
264 4 |c ©2014 
300 |a 1 online resource (381 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (ebrary, viewed September 16, 2013). 
505 0 0 |g 1.  |t Fault Tolerance and Resilience in Cloud Computing Environments /  |r Vincenzo Piuri --  |g 1.  |t Introduction --  |g 2.  |t Cloud Computing Fault Model --  |g 3.  |t Basic Concepts on Fault Tolerance --  |g 4.  |t Different Levels of Fault Tolerance in Cloud Computing --  |g 5.  |t Fault Tolerance against Crash Failures in Cloud Computing --  |g 6.  |t Fault Tolerance against Byzantine Failures in Cloud Computing --  |g 7.  |t Fault Tolerance as a Service in Cloud Computing --  |g 8.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |t Acknowledgments --  |t References --  |g 2.  |t Data Encryption /  |r Dr. Pramod Pandya --  |g 1.  |t Need for Cryptography --  |g 2.  |t Mathematical Prelude to Cryptography --  |g 3.  |t Classical Cryptography --  |g 4.  |t Modern Symmetric Ciphers --  |g 5.  |t Algebraic Structure --  |g 6.  |t The Internal Functions of Rijndael in AES Implementation --  |g 7.  |t Use of Modern Block Ciphers --  |g 8.  |t Public-Key Cryptography --  |g 9.  |t Cryptanalysis of RSA --  |g 10.  |t Diffie-Hellman Algorithm --  |g 11.  |t Elliptic Curve Cryptosystems --  |g 12.  |t Message Integrity and Authentication --  |g 13.  |t Triple Data Encryption Algorithm (TDEA) Block Cipher --  |g 14.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |t References --  |g 3.  |t Public Key Infrastructure /  |r Terence Spies --  |g 1.  |t Cryptographic Background --  |g 2.  |t Overview of PKI --  |g 3.  |t The X.509 Model --  |g 4.  |t X.509 Implementation Architectures --  |g 5.  |t X.509 Certificate Validation --  |g 6.  |t X.509 Certificate Revocation --  |g 7.  |t Server-Based Certificate Validity Protocol --  |g 8.  |t X.509 Bridge Certification Systems --  |g 9.  |t X.509 Certificate Format --  |g 10.  |t PKI Policy Description --  |g 11.  |t PKI Standards Organizations --  |g 12.  |t PGP Certificate Formats --  |g 13.  |t PGP PKI Implementations --  |g 14.  |t W3C --  |g 15.  |t Is PKI Secure? --  |g 16.  |t Alternative PKI Architectures --  |g 17.  |t Modified X.509 Architectures --  |g 18.  |t Alternative Key Management Models --  |g 19.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |t References --  |g 4.  |t Physical Security Essentials /  |r William Stallings --  |g 1.  |t Overview --  |g 2.  |t Physical Security Threats --  |g 3.  |t Physical Security Prevention and Mitigation Measures --  |g 4.  |t Recovery from Physical Security Breaches --  |g 5.  |t Threat Assessment, Planning, and Plan Implementation --  |g 6.  |t Example: A Corporate Physical Security Policy --  |g 7.  |t Integration of Physical and Logical Security --  |g 8.  |t Physical Security Checklist --  |g 9.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 5.  |t Disaster Recovery /  |r Lauren Collins --  |g 1.  |t Introduction --  |g 2.  |t Measuring Risk and Avoiding Disaster --  |g 3.  |t The Business Impact Assessment (BIA) --  |g 4.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 6.  |t Biometrics /  |r Luther Martin --  |g 1.  |t Relevant Standards --  |g 2.  |t Biometric System Architecture --  |g 3.  |t Using Biometric Systems --  |g 4.  |t Security Considerations --  |g 5.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 7.  |t Homeland Security /  |r Bhushan Kapoor --  |g 1.  |t Statutory Authorities --  |g 2.  |t Homeland Security Presidential Directives --  |g 3.  |t Organizational Actions --  |g 4.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 8.  |t Cyber Warfare /  |r Marco Slaviero --  |g 1.  |t Cyber Warfare Model --  |g 2.  |t Cyber Warfare Defined --  |g 3.  |t CW: Myth or Reality? --  |g 4.  |t Cyber Warfare: Making CW Possible --  |g 5.  |t Legal Aspects of CW --  |g 6.  |t Holistic View of Cyber Warfare --  |g 7.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 9.  |t System Security /  |r Lauren Collins --  |g 1.  |t Foundations of Security --  |g 2.  |t Basic Countermeasures --  |g 3.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 10.  |t Securing the Infrastructure /  |r Lauren Collins --  |g 1.  |t Communication Security Goals --  |g 2.  |t Attacks and Countermeasures --  |g 3.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 11.  |t Access Controls /  |r Lauren Collins --  |g 1.  |t Infrastructure Weaknesses: DAC, MAC, and RBAC --  |g 2.  |t Strengthening the Infrastructure: Authentication Systems --  |g 3.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 12.  |t Assessments and Audits /  |r Lauren Collins --  |g 1.  |t Assessing Vulnerabilities and Risk: Penetration Testing and Vulnerability Assessments --  |g 2.  |t Risk Management: Quantitative Risk Measurements --  |g 3.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 13.  |t Fundamentals of Cryptography /  |r Scott R. Ellis --  |g 1.  |t Assuring Privacy with Encryption --  |g 2.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 14.  |t Satellite Cyber Attack Search and Destroy /  |r Jeffrey Bardin --  |g 1.  |t Hacks, Interference, and Jamming --  |g 2.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |t References --  |g 15.  |t Advanced Data Encryption /  |r Pramod Pandya --  |g 1.  |t Mathematical Concepts Reviewed --  |g 2.  |t The RSA Cryptosystem --  |g 3.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise. 
520 |a "Part 1 Performance Analysis and Coaching 1 The role of performance analysis in elite netball competition structures 2 Soccer match analysis. A qualitative study with Portuguese First League coaches 3 Coach behaviour analysis within elite youth soccer 4 Performance analysis in professional soccer: Player and coach perspectives 5 Behaviour of academy soccer coaches during training sessions Part 2 Soccer This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: " Checklists throughout each chapter to gauge understanding " Chapter Review Questions/Exercises and Case Studies " Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc"--EBL 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Cyberterrorism  |x Prevention. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Cyberterrorism  |x Prevention  |2 fast 
700 1 |a Vacca, John R.,  |e editor. 
758 |i has work:  |a Cyber security and IT infrastructure protection (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFr8kYGpKXtK3FqXQFXkMq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Cyber security and IT infrastructure protection.  |d Waltham, MA : Syngress, [2014]  |w (DLC) 2013388292 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1377640  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00058870 
938 |a ebrary  |b EBRY  |n ebr10754065 
938 |a EBSCOhost  |b EBSC  |n 635568 
938 |a Cengage Learning  |b GVRL  |n GVRL8DFH 
938 |a YBP Library Services  |b YANK  |n 11119727 
938 |a Internet Archive  |b INAR  |n isbn_9780124166813 
994 |a 92  |b IZTAP