
Edward Elgar Publishing UN iLibrary HeinOnline Directory of Open Access Books SAGE Journals ASTM Compass
From this page you can:
Home |
Descriptors



Microsoft Windows security inside out for Windows XP and Windows 2000 / Ed Bott
Title : Microsoft Windows security inside out for Windows XP and Windows 2000 Material Type: printed text Authors: Ed Bott, Author ; Carl Siechert, Author Publisher: Redmond, Washington : Microsoft Press Publication Date: 2002 Pagination: xxiv, 763 p. Layout: ill. Size: 24 cm ISBN (or other code): 978-0-7356-1632-5 Price: CD General note: Includes index (p. 707-763) Languages : English (eng) Original Language : English (eng) Descriptors: Computer security
Microsoft Windows (Computer file)Class number: 005.8 Abstract: Hey, you know your way around Microsoft® Windows®–so now dig in and really put its security features to work! Covering Windows XP Professional, Windows XP Home Edition, and Windows 2000 Professional, this supremely organized reference packs hundreds of time saving solutions, troubleshooting tips, and handy workarounds–all in concise, fast-answer format. It's all muscle and no fluff. Discover the best and fastest ways to perform everyday security tasks, and challenge yourself to new levels of mastery!
• From firewalls to watchdog software, help keep intruders off your network and out of your data
• Exterminate viruses, worms, and other Web vermin
• Use authentication, certificates, and Group Policy to help control access to shared resources
• Monitor your system for suspicious activity and fend off attacks
• Keep spies and spam out of your e-mail
• Button up your VPN, remote access, and wireless networking services
• Take ultimate control of security by encrypting data, blocking ports, and locking down the RegistryContents note: Windows Security Essentials; Protecting your personal computer; Protecting a Network; Extreme security; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=17277 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-001986 005.8 Bot-Mic 2002 General Collection Library "Max van der Stoel" English Available .NET security and cryptography / Peter Thorsteinson
Title : .NET security and cryptography Material Type: printed text Authors: Peter Thorsteinson, Author ; G. Gnana Arun Ganesh, Author Publisher: London : Prentice Hall Publication Date: 2004 Pagination: xvii, 466 p. Layout: ill. Size: 24 cm ISBN (or other code): 978-0-13-100851-9 General note: Includes index (p. 443-466) Languages : English (eng) Original Language : English (eng) Descriptors: Computer security
Cryptography
Microsoft .NETClass number: 005.8 Abstract: Part of the Integrated .NET Series, this book provides a practical and comprehensive treatment on implementing both cryptography and security features on the .NET platform using the C# and VB .NET programming languages. It provides focused and detailed code examples that demonstrate the most important concepts, with commentary on how the code examples work. The book also provides a substantial mathematical and theoretical background on the underlying cryptographic concepts. After reading this book and experimenting with the provided example programs, the reader should have a good understanding of the major cryptographic algorithms and standard cryptographic programming techniques. Readers should also gain a solid understanding of how .NET security works and how to implement user-based and code access security in their own .NET programs. Contents note: NET Cryptography and Security; Fundamentals of Cryptography; Symmetric Cryptography; Asymmetric Cryptography; Digital Signatures; XML Cryptography; NET User-Based Security; NET Code Access Security; ASP.NET Security; Web Services Security; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=17251 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-001962 005.8 Tho-NET 2004 General Collection Library "Max van der Stoel" English Available XML security / Blake Dournaee
Title : XML security Material Type: printed text Authors: Blake Dournaee, Author Publisher: New York : McGraw-Hill Book Comp Publication Date: 2002 Pagination: xiii, 379 p. Layout: ill. Size: 24 cm ISBN (or other code): 978-0-07-219399-2 General note: Includes index (p. [365]-379)
Includes bibliographical referencesLanguages : English (eng) Original Language : English (eng) Descriptors: Computer security
XML (Document markup language)Class number: 005.8 Abstract: Keep XML applications and documents secure with help from the leading authority in e-security Get up to speed on XML and applied security technologies using this authoritative guide. Covering the fundamentals of XML structures and related security technologies including XML signatures, XML encryption, and the XML key management specification this resource contains both the conceptual information and the practical techniques you need to successfully work with this data-structuring language. You'll learn how to implement RSA Security's product CertJ which secures Java and XML-based applications and get advice for preventing against denial of service attacks and other security violations. Written by a member of RSA Security's developer support team, this definitive book gives you all the knowledge you need to keep XML-based programs and documents digitally secure.Learn to implement a solid XML security system using the latest technologies Use the book as both a security and XML primer Review schemas, DTDs, Xpointers, XSLT, namespaces, and more Learn about the various signature types--such as enveloped, enveloping, and detached Understand the structure, syntax, and processing rules of XML signature types Examine the need for an XML key management system (XKMS) Counteract specific security breaches--including denial of service and replay attacks Find out about recent W3C XML security standards Implement CERTJ RSA's product which ensures security for Java and XML-based programs See how data privacy can be applied to XML structures via encryption Protect your XML-based programs and improve security with the most authoritative guide to XML security available. Contents note: Introduction; Security Primer; XML Primer; XML Signatures; Processing Rules and Examples; XML Signatures; Structure and Syntax; XML Encryption;XML Key Management (XKMS); Case Studies; Case Study no.1 : An example of how XML is used today; Case Study no.2 : An example of how XML will be used tomorrow; Example Signature Implementation : RSA BSAFE Cert-J; What Is S2ML?; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=17321 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002000 005.8 Dou-XML 2002 General Collection Library "Max van der Stoel" English Available