Your cart is empty
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Security, Privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013. The 20 revised full papers presented were carefully selected from numerous submissions. The papers are organized in topical sections on security, privacy; e-governance; e-government applications, virtualizations; politics, legislation: European initiatives.
This book constitutes the refereed proceedings of the 7th International Conference on Internet and Distributed Computing Systems, IDCS 2014, held in Calabria, Italy, in September 2014. The 23 revised full and 15 revised short papers presented were carefully reviewed and selected from 50 submissions. The papers cover the following topics: ad-hoc and sensor networks; internet and Web technologies; network operations and management; multi-agent systems; cloud-based information infrastructures.
This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow's threats, wherever they appear. Now, three Cisco network security experts introduce these products and solutions, and offer expert guidance for planning, deploying, and operating them. The authors present authoritative coverage of Cisco ASA with FirePOWER Services; Cisco Firepower Threat Defense (FTD); Cisco Next-Generation IPS appliances; the Cisco Web Security Appliance (WSA) with integrated Advanced Malware Protection (AMP); Cisco Email Security Appliance (ESA) with integrated Advanced Malware Protection (AMP); Cisco AMP ThreatGrid Malware Analysis and Threat Intelligence, and the Cisco Firepower Management Center (FMC). You'll find everything you need to succeed: easy-to-follow configurations, application case studies, practical triage and troubleshooting methodologies, and much more. Effectively respond to changing threat landscapes and attack continuums Design Cisco ASA with FirePOWER Services and Cisco Firepower Threat Defense (FTD) solutions Set up, configure, and troubleshoot the Cisco ASA FirePOWER Services module and Cisco Firepower Threat Defense Walk through installing AMP Private Clouds Deploy Cisco AMP for Networks, and configure malware and file policies Implement AMP for Content Security, and configure File Reputation and File Analysis Services Master Cisco AMP for Endpoints, including custom detection, application control, and policy management Make the most of the AMP ThreatGrid dynamic malware analysis engine Manage Next-Generation Security Devices with the Firepower Management Center (FMC) Plan, implement, and configure Cisco Next-Generation IPS-including performance and redundancy Create Cisco Next-Generation IPS custom reports and analyses Quickly identify the root causes of security problems
This book constitutes the refereed proceedings of the workshops held at the 16th Asia-Pacific Web Conference, APWeb 2014, in Changsha, China, in September 2014. The 34 full papers were carefully reviewed and selected from 59 submissions. This volume presents the papers that have been accepted for the following workshops: First International Workshop on Social Network Analysis, SNA 2014; First International Workshop on Network and Information Security, NIS 2014; First International Workshop on Internet of Things Search, IoTS 2014. The papers cover various issues in social network analysis, security and information retrieval against the heterogeneous big data.
This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
This book constitutes the refereed proceedings of the Third European Conference on Service-Oriented and Cloud computing, ESOCC 2014, held in Manchester, UK, in September 2014. The 13 papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on cloud technology, service composition, software development and cloud technology, cloud computing, industry track.
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.
This book constitutes the refereed proceedings of 6 workshops co-located with SAFECOMP 2014, the 33rd International Conference on Computer Safety, Reliability, and Security, held in Florence, Italy, in September 2014. The 32 revised full and 10 short papers presented were carefully reviewed and selected from 58 submissions. They are complemented with 6 introduction to each of the workshops: Architecting Safety in Collaborative Mobile Systems, ASCoMS'14; ERCIM/EWICS/ARTEMIS Workshop on Dependable Embedded and Cyberphysical Systems and Systems-of-Systems, DECSoS'14; DEvelopment, Verification and VAlidation of cRiTical Systems, DEVVARTS'14; Integration of Safety and Security Engineering, ISSE'14; Reliability and Security Aspects for Critical Infrastructure Protection, ReSA4CI'14; Next Generation of System Assurance Approaches for Safety-Critical Systems, SASSUR'14.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility."
Depository institutions experienced cyberattacks in recent years that are estimated to have resulted in hundreds of millions of dollars in losses. Depository institution regulators (the Office of the Comptroller of the Currency, the Board of Governors of the Federal Reserve, the Federal Deposit Insurance Corporation, and NCUA) oversee information security at these institutions and Treasury coordinates protection of the financial sector. The objectives of this book include examining how regulators oversee institutions' efforts to mitigate cyber threats; and sources of and efforts by agencies to share cyber threat information. This book also assesses the effectiveness of the corporation's controls in protecting the confidentiality, integrity, and availability of its financial systems and information.
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more. Beginning Security with Microsoft Technologies begins with an introduction to some common security challenges and then discusses options for addressing them. You will learn about Office Advanced Threat Protection (ATP), the importance of device-level security, and about various products such as Device Guard, Intune, Windows Defender, and Credential Guard. As part of this discussion you'll cover how secure boot can help an enterprise with pre-breach scenarios. Next, you will learn how to set up Office 365 to address phishing and spam, and you will gain an understanding of how to protect your company's Windows devices. Further, you will also work on enterprise-level protection, including how advanced threat analytics aids in protection at the enterprise level. Finally, you'll see that there are a variety of ways in which you can protect your information. After reading this book you will be able to understand the security components involved in your infrastructure and apply methods to implement security solutions. What You Will Learn Keep corporate data and user identities safe and secure Identify various levels and stages of attacks Safeguard information using Azure Information Protection, MCAS, and Windows Information Protection, regardless of your location Use advanced threat analytics, Azure Security Center, and Azure ATP Who This Book Is For Administrators who want to build secure infrastructure at multiple levels such as email security, device security, cloud infrastructure security, and more.
This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design," with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.
This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks. The book also contains 3 full-length invited talks.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with one short paper were carefully reviewed and selected from 10 submissions. The papers are organized in topical sections on regional data sets and case studies, cybercrime, information security engineering and text mining.
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise. Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Nexpose Community, Wireshark, Solarwinds Kiwi Syslog Server, Metasploit, Burp, Clonezilla and many more. Up-to-date and practical cybersecurity instruction, applicable to both management and technical positions - Straightforward explanations of the theory behind cybersecurity best practices - Designed to be an easily navigated tool for daily use - Includes training appendix on Linux, how to build a virtual lab and glossary of key terms The Cybersecurity Blue Team Toolkit is an excellent resource for anyone working in digital policy as well as IT security professionals, technical analysts, program managers, and Chief Information and Technology Officers. This is one handbook that won't gather dust on the shelf, but remain a valuable reference at any career level, from student to executive.
Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of big data and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches."
This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.
Federal agencies and our nation's critical infrastructures, such as communications and financial services, are dependent on information technology systems and electronic data to carry out operations and to process, maintain, and report essential information. Yet, cyber-based intrusions and attacks on federal and nonfederal systems have become not only more numerous and diverse, but also more damaging and disruptive as discussed in chapter 1. The IRS has a demanding responsibility to collect taxes, process tax returns, and enforce the nation's tax laws. It relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect the sensitive financial and taxpayer information that reside on those systems. As part of its audit of IRS's fiscal year 2017 and 2016 financial statements, GAO assessed whether controls over financial and tax processing systems were effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information as reported in chapter 2. Reliance on a global supply chain introduces multiple risks to federal information systems. Chapter 3 highlights information security risks associated with the supply chains used by federal agencies to procure IT systems. The Office of Personnel Management (OPM) collects and maintains personal data on millions of individuals, including data related to security clearance investigations. In June 2015, OPM reported that an intrusion into its systems had affected the personnel records of about 4.2 million current and former federal employees. Then, in July 2015, the agency reported that a separate but related incident had compromised its systems and the files related to background investigations for 21.5 million individuals. From February 2015 through August 2017, multiple reviews of OPM's information security were conducted. Four reports based on these reviews were issued. The reports contained 80 recommendations for improving the agency's security posture. Chapter 4 reviews relevant documents and artifacts reflecting OPM's actions and progress toward implementing the 80 recommendations contained in the four reports, and assessed the actions against the intent of the recommendations. CDC is responsible for detecting and responding to emerging health threats and controlling dangerous substances. In carrying out its mission, CDC relies on information technology systems to receive, process, and maintain sensitive data. Accordingly, effective information security controls are essential to ensure that the agency's systems and information are protected from misuse and modification. Chapter 5 reviews the extent to which CDC has taken corrective actions to address the previously identified security program and technical control deficiencies and related recommendations for improvement. Federal agencies are dependent on information systems to carry out operations. The risks to these systems are increasing as security threats evolve and become more sophisticated. To reduce the risk of a successful cyberattack, agencies can deploy intrusion detection and prevention capabilities on their networks and systems. Chapter 6 determined the reported effectiveness of agencies' implementation of the government's approach and strategy; the extent to which DHS and OMB have taken steps to facilitate the use of intrusion detection and prevention capabilities to secure federal systems; and the extent to which agencies reported implementing capabilities to detect and prevent intrusions. Recent large-scale data breaches of public and private entities have put hundreds of millions of people at risk of identity theft or other harm. Chapter 7 reviews issues related to consumers' options to address risks of harm from data breaches and examines information and expert views on the effectiveness of consumer options to address data breach risks. While Chapter 8 considers the answer to this question: what legal obligations do Internet companies have to prevent and respond to data breaches? Then discusses several factors Congress might consider when weighing future legislation.
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013. The 14 revised full papers presented were carefully selected and reviewed from numerous submissions and cover a wide range of applications, commercial and military such as mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, underground networks, personal area networks, home networks and large-scale metropolitan networks for smart cities. They are organized in topical sections on wireless sensor networks, routing, applications and security.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions, and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. This, the 28th issue of the Transactions on Computational Science journal, is comprised of extended versions of selected papers from the International Conference on Cyberworlds, CyberWorlds 2015, held in Gotland, Sweden, in October 2015. The first paper is a position paper, presenting open problems and identifying future directions within the domain. The remaining 8 papers focus on a range of topics, including virtual reality, games, haptic modeling, cybersecurity, brain wave analysis, shape parameterization, projects, and data mining.
You may like...
Wireless Network Security - Theories and…
Lei Chen, Jenny Ji, … Hardcover R2,726 Discovery Miles 27 260
Cyberpower and National Security
Larry Wentz, Stuart H. Starr, … Paperback
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,565 Discovery Miles 15 650
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback (1)
R860 Discovery Miles 8 600
Dark Mirror - Edward Snowden and the…
Barton Gellman Hardcover
Password Book - Logbook to keep track of…
Imaginary Planet Publishing Paperback R156 Discovery Miles 1 560
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback (1)
Password Logbook - Keep your usernames…
Dorothy J Hall Paperback R123 Discovery Miles 1 230