Computer Security Procedures - Security Through Obscurity, Full Disclosure, Automated Information Systems Security, Trusted Computing Base (Paperback)


Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 60. Chapters: Security through obscurity, Full disclosure, Automated information systems security, Trusted computing base, Security management, Exit procedure, Canary trap, Mobile device forensics, Identity management, Filesystem permissions, XTS-400, Computer forensics, Cyber security standards, Penetration test, Fuzz testing, Evaluation Assurance Level, Cyber-security regulation, Setuid, Control system security, XACML, Chroot, Host protected area, Cyber spying, Patch Tuesday, Same origin policy, Security controls, Security-evaluated operating system, Information technology security audit, AAA protocol, Protection Profile, Open Vulnerability and Assessment Language, Vulnerability management, Secure by default, Common Criteria Testing Laboratory, Off-site data protection, Privilege separation, Responsible disclosure, National Strategy to Secure Cyberspace, Computer Underground Digest, Computer security policy, CESG Claims Tested Mark, Need to know, Cryptographic Module Testing Laboratory, Defense in depth, Department of Defense Information Assurance Certification and Accreditation Process, Intruder detection, Trust negotiation, RISKS Digest, Privilege revocation, Network security policy, Presumed security, Protection mechanism, Google hacking, System High Mode, CBL Index, Hardening, Department of Defense Information Technology Security Certification and Accreditation Process, Secure error messages in software systems, National Information Assurance Training and Education Center, Shibboleth, Schneier's Law, Security Target, DShield, System Security Authorization Agreement, Commercial Product Assurance, Secure attention key, Not Just Another Bogus List, Internet ethics, Composite Blocking List, National Information Assurance Certification and Accreditation Process, Enterprise Privacy Authorization Language, Differentiated security, ...

R383

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles3830
Delivery AdviceOut of stock

Toggle WishListAdd to wish list
Review this Item

Product Description

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 60. Chapters: Security through obscurity, Full disclosure, Automated information systems security, Trusted computing base, Security management, Exit procedure, Canary trap, Mobile device forensics, Identity management, Filesystem permissions, XTS-400, Computer forensics, Cyber security standards, Penetration test, Fuzz testing, Evaluation Assurance Level, Cyber-security regulation, Setuid, Control system security, XACML, Chroot, Host protected area, Cyber spying, Patch Tuesday, Same origin policy, Security controls, Security-evaluated operating system, Information technology security audit, AAA protocol, Protection Profile, Open Vulnerability and Assessment Language, Vulnerability management, Secure by default, Common Criteria Testing Laboratory, Off-site data protection, Privilege separation, Responsible disclosure, National Strategy to Secure Cyberspace, Computer Underground Digest, Computer security policy, CESG Claims Tested Mark, Need to know, Cryptographic Module Testing Laboratory, Defense in depth, Department of Defense Information Assurance Certification and Accreditation Process, Intruder detection, Trust negotiation, RISKS Digest, Privilege revocation, Network security policy, Presumed security, Protection mechanism, Google hacking, System High Mode, CBL Index, Hardening, Department of Defense Information Technology Security Certification and Accreditation Process, Secure error messages in software systems, National Information Assurance Training and Education Center, Shibboleth, Schneier's Law, Security Target, DShield, System Security Authorization Agreement, Commercial Product Assurance, Secure attention key, Not Just Another Bogus List, Internet ethics, Composite Blocking List, National Information Assurance Certification and Accreditation Process, Enterprise Privacy Authorization Language, Differentiated security, ...

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Books LLC, Wiki Series

Country of origin

United States

Release date

September 2011

Availability

Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available.

First published

September 2011

Authors

Editors

Creators

Dimensions

246 x 189 x 3mm (L x W x T)

Format

Paperback - Trade

Pages

62

ISBN-13

978-1-157-46010-7

Barcode

9781157460107

Categories

LSN

1-157-46010-0



Trending On Loot