Seems you have not registered as a member of bride-power.com!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

INFORMATION SYSTEMS SECURITY: SECURITY MANAGEMENT, METRICS, FRAMEWORKS AND BEST PRACTICES (With CD )
  • Language: en
  • Pages: 1020

INFORMATION SYSTEMS SECURITY: SECURITY MANAGEMENT, METRICS, FRAMEWORKS AND BEST PRACTICES (With CD )

Market_Desc: · Undergraduate and graduate level students of different universities and examination syllabus for international certifications in security domain· Teachers of security topics Special Features: · Written by an experienced industry professional working in the domain, a professional with extensive experience in teaching at various levels (student seminars, industry workshops) as well as research.· A comprehensive treatment and truly a treatise on the subject of Information Security· Coverage of SOX and SAS 70 aspects for Asset Management in the context of information systems security.· Covers SOX and SAS 70 aspects for Asset Management in the context of Information Systems S...

Cybercrime and Cyberterrorism
  • Language: en
  • Pages: 52

Cybercrime and Cyberterrorism

Thirty-three countries, including the United States, have signed the Council of Europe's Convention on Cybercrime of November 2001. The Convention's goal is to combat cybercrime by harmonising national laws, improving investigative abilities and boosting international co-operation. Supporters argue that the Convention will enhance deterrence, while critics counter that it will have little effect without the participation of countries in which cybercriminals operate freely. Others warn that it will endanger privacy and civil liberties. This invaluable book addresses the issues of fighting cybercrime and evaluates measures undertaken by various governments to prevent these attacks from happening. America, Russia, Korea, Netherlands, Japan, Israel and France, are specifically discussed.

Software Quality Assurance
  • Language: en
  • Pages: 1066

Software Quality Assurance

  • Type: Book
  • -
  • Published: 2016-10-04
  • -
  • Publisher: Unknown

Principles and Practices for the New Paradigm provides valuable information about alignment of various improvement models explained from a management perspective COBIT, ITIL overview. The Role of Quality Assurance in Maintenance Projects explained in great details. An all new Chapter has been added to address quality issues related to Defect Management. The chapter on testing has been aligned with ISTQB syllabus. The book has a great appeal and value to a wider range of audience: not only Software Quality Assurance Professionals but also IT Service Professionals who need to understand Quality aspects of delivering IT Services to their global clients including their domestic clients. Also very useful is this book to Software Testing Professionals who wish to prepare for International Certifications such as the ISTQB (foundational and advanced levels), CSTE, CSQA etc. The book is also useful for CSQA and CSTE certification programs. -- Provided by publisher.

Network Security Secrets
  • Language: en
  • Pages: 1166

Network Security Secrets

Two computer security experts offer their advice on how to protect a network from hackers, viruses, corporate spies, and other threats.

Jalebi Management
  • Language: en
  • Pages: 464

Jalebi Management

An important addition to the literature of management as a discipline, this pioneering book gives importance to the social dynamics of business organizations. An outcome of the author`s practical experience of over three decades in the global market, this book ably demonstrates the importance of paying attention to human culture, lifestyle and trends, while conducting business. Marked by original thought, concepts, processes and graphics, it demonstrates that business organizations of today must be sensitive to the nuances of global social culture so as to bring about quantum growth. In particular, it establishes that there is no barrier between industry and society.

Cyber Security Essentials
  • Language: en
  • Pages: 342

Cyber Security Essentials

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures. To accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staf...

CyberForensics
  • Language: en
  • Pages: 170

CyberForensics

Cyberforensics is a fairly new word in the technology our industry, but one that n- ertheless has immediately recognizable meaning. Although the word forensics may have its origins in formal debates using evidence, it is now most closely associated with investigation into evidence of crime. As the word cyber has become synonymous with the use of electronic technology, the word cyberforensics bears no mystery. It immediately conveys a serious and concentrated endeavor to identify the evidence of crimes or other attacks committed in cyberspace. Nevertheless, the full implications of the word are less well understood. Cyberforensic activities remain a mystery to most people, even those fully im...

Hacking
  • Language: en
  • Pages: 216

Hacking

Be a Hacker with Ethics

CRYPTOGRAPHY AND INFORMATION SECURITY
  • Language: en
  • Pages: 416

CRYPTOGRAPHY AND INFORMATION SECURITY

This thoroughly revised and well-organised book is in its second edition, continues to present the principles, techniques, design and implementation of cryptography and information security algorithms, with a perfect balance in the presentation of theoretical and practical aspects. To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat’s theorem and Euler’s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also ...

Information Technology Law and Practice
  • Language: en