
Edward Elgar Publishing UN iLibrary HeinOnline Directory of Open Access Books SAGE Journals ASTM Compass Arxiv
From this page you can:
Home |
Descriptors



Computer forensics
Title : Computer forensics : investigating file and operating systems, wireless networks, and storage Material Type: printed text Edition statement: 2nd edition Publisher: Cengage Learning (Boston, MA) Publication Date: 2017 Pagination: xix, 236 p. Layout: ill. Size: 23 cm ISBN (or other code): 978-1-305-88348-2 General note: Includes index Languages : English (eng) Original Language : English (eng) Descriptors: Computer crimes
Computer networks - Security measures
Investigation - Examinations - Study guidesClass number: 363.25 Abstract: The Computer Forensic : investigating file and operating systems, wireless networks, and storage" - by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of four books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this and the other three books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker's path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder's footprint and gather all necessary information and evidence to support prosecution in a court of law. File and Operating Systems, Wireless Networks, and Storage provides a basic understanding of file systems, storage and digital media devices. Boot processes, Windows and Linux Forensics and application of password crackers are all discussed. Contents note: Understanding file systems and hard disks; Understanding digital media devices; Windows, Linux, and Macintosh Boot Processes; Windows Forensics I; Windows Forensics II; Linux Forensics; Application password crackers; Investigating Wireless Attacks; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=17498 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002418 363.25 Comput 2017 General Collection Library "Max van der Stoel" English Available Computer Security / William Stallings
Title : Computer Security : Principles and Practice Material Type: printed text Authors: William Stallings, Author ; Lawrie Brown, Author Edition statement: 4rth edition, Global Edition Publisher: Pearson Education Limited Publication Date: 2018 Pagination: 800 p. Layout: ill. Size: 24 cm ISBN (or other code): 978-1-292-22061-1 General note: Includes bibliographical references (p. 764-776)
Includes index (p. 780-800)Languages : English (eng) Original Language : English (eng) Descriptors: Computer networks - Security measures
Computer security
Computer security - Examinations
Electronic data processing personnel - CertificationClass number: 005.8 Abstract: Computer Security: Principles and Practice - is ideal for courses in Computer/Network Security. The need for education in computer security and related topics continues to grow at a dramatic rate—and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides students with hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject. The new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the ‘gold standard’ when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more. Contents note: Overview; COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES : Cryptographic Tools; User Authentication; Access Control; Database and Data Center Security; Malicious Software; Denial-of-Service Attacks; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=21247 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002572 005.8 Sta-Com 2018 General Collection Library "Max van der Stoel" English Available 1702-002574 005.8 Sta-Com 2018 General Collection SEEU Library Skopje English Available Cryptography and Network Security / William Stallings
Title : Cryptography and Network Security : Principles and Practice Material Type: printed text Authors: William Stallings, Author Edition statement: 7th edition Publisher: Boston : Pearson Education Publication Date: 2017 Pagination: 766 p. Layout: ill. Size: 23 cm ISBN (or other code): 978-93-325-8522-5 General note: Includes bibliographical references (p. 744-752)
Includes index (p. 754-766)Languages : English (eng) Original Language : English (eng) Descriptors: Coding theory
Computer networks - Security measures
Computer security
Data encryption (Computer science)Class number: 005.8 Abstract: Pearson brings to you the revised edition of Cryptography and Network Security by Stallings. In an age of viruses and hackers, electronic eavesdropping and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security—practical applications that have been implemented and are in use to provide network security. Contents note: Background : Computer and Network Security Concepts; Symmetric Ciphers; Asymmetric Ciphers; Cryptographic Data Integrity Algorithms; Mutual Trust; Network and Internet Security; Appendices; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=21248 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002569 005.8 Sta-Cry 2017 General Collection Library "Max van der Stoel" English Available Cybersecurity essentials / Charles J. Brooks
Title : Cybersecurity essentials Material Type: printed text Authors: Charles J. Brooks, Author ; Christopher Grow, Author ; Philip Craig, Author Publisher: Indianapolis, IN : John Wiley & Sons, Inc. Publication Date: 2018 Pagination: xxvi, 758 p. Layout: ill Size: 24 cm ISBN (or other code): 978-1-11-936239-5 General note: Includes index Languages : English (eng) Original Language : English (eng) Descriptors: Computer networks - Security measures
Computer securityClass number: 005.8 Abstract: "Cybersecurity essentials"- Provides an overview of the essential topics required for entry-level cybersecurity certifications, discussing the concepts and practices within securing the infrastructure, devices, local networks and the perimeter. Contents note: Securing the Infrastructure. Infrastructure Security in the Real World; Understanding Access-Control and Monitoring Systems; Understanding Video Surveillance Systems; Understanding Intrusion-Detection and Reporting Systems; Infrastructure Security; Securing Local Hosts. Local Host Security in the Real World; Securing Devices; Protecting the Inner Perimeter; Protecting Remote Access; Local Host Security; Securing Local Networks. Local Network Security in the Real World; Networking Basics; Understanding Networking Protocols; Understanding Network Servers; Understanding Network Connectivity Devices; Understanding Network Transmission Media Security; Local Network Security; Securing the Perimeter. Perimeter Security in the Real World; Understanding the Environment; Hiding the Private Network; Protecting the Perimeter; Protecting Data Moving Through the Internet; Tools and Utilities; Identifying and Defending Against Vulnerabilities; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=18073 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002332 005.8 Bro-Cyb 2018 General Collection Library "Max van der Stoel" English Available Cybersecurity program development for business / Chris Moschovitis
Title : Cybersecurity program development for business : the essential planning guide Material Type: printed text Authors: Chris Moschovitis, Author Publisher: Hoboken, N.J. : Wiley Publication Date: 2018 Pagination: xvi, 206 p. Size: 24 cm ISBN (or other code): 978-1-11-942951-7 General note: Includes bibliographical references and index Languages : English (eng) Original Language : English (eng) Descriptors: Business and economics - Industries - Computer Industry
Business enterprises - Computer programs
Computer industry.
Computer networks - Security measures
Information technology - Management
Management scienceClass number: 658.4 Abstract: Cybersecurity program development for business - Get answers to all your cybersecurity questions In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you’re a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. "--
"This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise"--Contents note: Preface; About the Author; Acknowledgments; Understanding Risk; Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids); A Cybersecurity Primer; Management, Governance, and Alignment; Your Cyber Security Program : A High-Level Overview; Assets; Threats; Vulnerabilities; Environments; Controls; Incident Response Planning; People; Living Cybersecure!; Bibliography; Appendix; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=18072 Hold
Place a hold on this item (Today 2 current hold(s) for this item)
Copies
Barcode Call number Media type Location Section Status 1702-002336 658.4 Mos-Cyb 2018 General Collection Library "Max van der Stoel" English Available Dizajnimi dhe Implementimi i Sigurisë në Rrjetet Kompjuterike / Blerton Abazi
PermalinkHacking for dummies / Kevin Beaver
PermalinkInformation security / Marie A. Wright, Marie A.
PermalinkIntrusion detection / Terry Escamilla
PermalinkIT governance / Alan Calder
PermalinkMaximum Apache security
PermalinkProgramming .NET security / Adam Freeman
PermalinkБезбедност и заштита на мрежниот сообраќај / Simpson Garfinkel
Permalink