HOME
ABOUT US
LINK TO US
SITE MAP
CONTACT US
Login
SignUp
CATEGORIES
Android Programming
ASP.NET
C
C#
C++
Computer Science
Databases
Information Technology - IT
Internet
iPhone Programming
IT Security
Java
Java EE
JavaScript
Linux
Microsoft Office
NET
Networking
Open Source
Perl
PHP
Physics
Programming
Project Management
Python
Revision Control
Ruby
Smalltalk
Software Engineering
SQL
Video Games
Web Development
Windows
XML
AI and Robotics
Ada
You are Here:
Home
>
itsecurity
IT Security
Managing Risk and Information Security 2nd Edition
ApressOpen title Managing Risk and Information Security: Protect to Enable, 2nd Edition provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed.
Cyber_Security_Essentials
There are three key concepts, known as the CIA triad, which anyone who protects an information system must understand: confidentiality, integrity, and availability.
Network Security
Although each hack is designed to stand on its own, this book makes extensive use of cross-referencing between hacks. If you find a reference to something you’re interested.
security_valuation_and_risk_analysis
This book has taken me almost four decades to write. And that makes the task of writing this Preface so difficult. If I might, I would like to offer some simple but hopefully helpful advice.
Wireless_And_Mobile_Networks_Security
Wireless networks and security might be considered an oxymoron. Indeed it is hard to believe in security when it is so easy to access communication media such as wireless radio media.