• формат pdf
  • размер 2.68 МБ
  • добавлен 30 января 2012 г.
Raina P. PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
Wiley Publishing, Inc., 2003. – 337 pages.

The audience for this book can be quite varied, ranging from novices in PKI technology to security experts looking to gain specific knowledge. In general, the first part of the book has been designed to give an overview of the PKI technology along with the challenges and advantages the technology offers. The next part of the book would be common for any reader as it highlights current, realistic examples of how PKI has been used. This will serve as an ideal model for all readers. The final part of the book is meant as a reference guide to help readers understand specific companies and products.
Похожие разделы
Смотрите также

Труды 3-ей Европейской конференции по теории информационной войны и безопасности. Royal Holloway, University of London, UK. 28-29 June 2004

  • формат pdf
  • размер 11.41 МБ
  • добавлен 16 января 2012 г.
3rd European Conference on Information Warfare and Security. Royal Holloway, University of London, UK. 28-29 June 2004. Ваш покорный слуга принимал в ней участие с двумя докладами. Правда произошёл анекдотичныий случай: барышня, которая верстала материалы трудов конференции, назвала меня Давидом А. Мельниковым, вместо Дмитрия А. Мельникова. Я на англичан не обиделся, а от души посмеялся. Людям свойственно ошибаться. Всем моим коллегам и специалис...

Acquisti A., Gritzalis S., Lambrinoudakis C., di Vimercati S. (eds.) Digital Privacy. Theory, Technologies, and Practices

  • формат pdf
  • размер 2.96 МБ
  • добавлен 09 ноября 2011 г.
Издательство Auerbach Publications, 2008, -494 pp. Privacy as a social and legal issue has been a concern of social scientists, philosophers, and lawyers for a long time. Back in 1890, two American lawyers, S. Warren and L. Brandeis, defined privacy as the right of an individual to be alone, and it has been recognized as a fundamental human right by the United Nations Declaration of Human Rights, the International Convenant on Civil and Politica...

Bidwell Teri. Cross Michael. Russell Ryan. Hack Proofing Your Identity

  • формат pdf
  • размер 8.9 МБ
  • добавлен 17 сентября 2011 г.
PUBLISHED BY Syngress Publishing, Inc. Copyright © 2002. ISBN: 1-931836-51- 5. (393 pages). Protect Your Family on the Internet! Hack Proofing Your Identity is designed to answer these questions, and teach you the methodology of how to find answers to questions this book will inevitably be unable to address. Unfortunately, it is impossible to anticipate all the possible ways in which someone might steal your identity given the current rapid evol...

Garcia M.L. The Design and Evaluation of Physical Protection Systems. Part 1

  • формат pdf
  • размер 95.78 МБ
  • добавлен 14 марта 2011 г.
Mary Lynn Garcia. The Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann, 2001. - 332 p. - ISBN: 0750673672 Книга разбита на 2 rar-архива. The book emphasizes the use of component performance measures to establish the effectiveness of physical protection systems, applying scientific and engineering principles to meet goals. The author takes a problem-solving approach to security and risk assessment, explaining the use o...

Garcia M.L. The Design and Evaluation of Physical Protection Systems. Part 2

  • формат pdf
  • размер 56.28 МБ
  • добавлен 14 марта 2011 г.
Mary Lynn Garcia. The Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann, 2001. - 332 p. - ISBN: 0750673672 Книга разбита на 2 rar-архива. The book emphasizes the use of component performance measures to establish the effectiveness of physical protection systems, applying scientific and engineering principles to meet goals. The author takes a problem-solving approach to security and risk assessment, explaining the use o...

Liu K.J.R., Trappe W., Wang Z.J., Wu M., Zhao H. Multimedia Fingerprinting Forensics for Traitor Tracing

  • формат pdf
  • размер 9.07 МБ
  • добавлен 07 октября 2011 г.
Издательство Hindawi, 2005, -260 pp. Multimedia is becoming an integral part of our daily life. It is a means for us to communicate important information with each other, as well as a way to express our creative sides. The information and art contained inside media have economic value, personal value, and often broader impacts on the general welfare of our society. Consequently, multimedia is a form of digital information that must be protected....

Saadawi T., Jordan L. (eds.) Cyber Infrastructure Protection

  • формат pdf
  • размер 3.22 МБ
  • добавлен 06 января 2012 г.
Strategic Studies Institute, 2011, -324 pp. The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these informa...

Schryen G. Anti-Spam Measures. Analysis and Design

  • формат pdf
  • размер 1.47 МБ
  • добавлен 10 января 2012 г.
Издательство Springer, 2007, -217 pp. I am not sure about the meaning of a preface, neither about its convenience or needlessness nor about the addressees. However, I suppose that it is expected to tell a (part of the) story behind the story and that it is read by at least two types of readers: The first group consists of friends, colleagues, and all others who have contributed to the opus in any way. Presumably, most of them like being named in...