Search Results - "copyright"

Refine Results
  1. 1

    Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTG by Seagren, Eric

    Published: Syngress ; Elsevier Science [distributor], 2006
    Description: 1 online resource (xiv, 493 pages) : illustrations.
    Contents:
    Elsevier - Click here for access
    eBook
  2. 2
  3. 3
  4. 4

    CyberEthics by Cambridge Educational (Firm), Films for the Humanities & Sciences (Firm), Infobase

    Published: Infobase, 2007
    Description: 1 streaming video file (14 min.) : sd., col., digital file + instructional materials (online)
    Contents: “…(1:17) -- Cyberspace: Academic Dishonesty (2:07) -- Intellectual Property Rights and Copyright (2:23) -- Ethical Issues of Online Gaming and Cyber Bullying (2:39) -- How to Deal With Cyber Bullying (2:15)…”
    Films on Demand - Click here for access
    Video
  5. 5

    Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry by Carvey, Harlan A.

    Published: Elsevier Science, 2011
    Description: 1 online resource (225 pages)
    Contents: “…Front cover; Windows Registry Forensics; Copyright page; Dedication; Table of Contents; Preface; Acknowledgments; About the Author; Chapter 1. …”
    Elsevier - Click here for access
    eBook
  6. 6

    Wireless operational security by Rittinghouse, John W.

    Published: Elsevier/Digital Press, 2004
    Description: 1 online resource (xxvi, 468 pages) : illustrations.
    Contents: “…Front Cover; Wireless Operational Security; Copyright Page; Contents; List of Figures and Tables; Foreword; Preface; Acknowledgments; Section I: General Network Security; Section II: Wireless Network Security; Glossary; A Wireless Policy Essentials; B Wireless-related Legislative Links; C Additional WLAN References; Index.…”
    Elsevier - Click here for access
    eBook
  7. 7

    Windows forensic analysis : DVD toolkit by Carvey, Harlan A.

    Published: Syngress Pub., 2007
    Description: 1 online resource (xxvi, 348 pages) : illustrations.
    Contents: “…Front Cover; Windows Forensic Analysis: DVD Toolkit; Copyright Page; Contents; Preface; Chapter 1. Live Response: Collecting Volatile Data; Chapter 2. …”
    Elsevier - Click here for access
    eBook
  8. 8

    Zero day exploit : countdown to darkness by Shein, Rob

    Published: Syngress, 2004
    Description: 1 online resource.
    Contents: “…Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. …”
    Elsevier - Click here for access
    eBook
  9. 9

    Cybersecurity law by Kosseff, Jeff, 1978-

    Published: John Wiley & Sons, Inc., 2017
    Description: 1 online resource (xxvii, 496 pages).
    Contents: “…Data Security Laws and Enforcement Actions -- Cybersecurity Litigation -- Cybersecurity Requirements for Specific Industries -- Cybersecurity and Corporate Governance -- Anti-Hacking Laws -- Public-Private Cybersecurity Partnerships -- Surveillance and Cyber -- Cybersecurity and Federal Government Contractors -- Privacy Laws -- International Cybersecurity Law -- Text of Section 5 of the FTC Act -- Summary of State Data Breach Notification Laws -- Text of Section 1201 of the Digital Millennium Copyright Act -- Text of the Computer Fraud and Abuse Act -- Text of the Electronic Communications Privacy Act.…”
    Prospector EBC - Click here for access
    eBook
  10. 10

    Handbook of database security : applications and trends by SpringerLink (Online service)

    Published: Springer, 2008
    Description: 1 online resource (xiv, 577 pages) : illustrations.
    Contents: “…Front Matter; Recent Advances in Access Control; Access Control Models for XML; Access Control Policy Languages in XML; Database Issues in Trust Management and Trust Negotiation; Authenticated Index Structures for Outsourced Databases; Towards Secure Data Outsourcing; Managing and Querying Encrypted Data; Security in Data Warehouses and OLAP Systems; Security for Workflow Systems; Secure Semantic Web Services; Geospatial Database Security; Security Re-engineering for Databases: Concepts and Techniques; Database Watermarking for Copyright Protection; Database Watermarking: A Systematic View.…”
    SpringerLink - Click here for access
    eBook
  11. 11

    Internet security : a jumpstart for systems administrators and IT managers by Speed, Tim

    Published: Digital Press, 2003
    Description: 1 online resource (xviii, 398 pages) : illustrations.
    Contents: “…Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. …”
    Elsevier - Click here for access
    eBook
  12. 12

    How to cheat at VoIP security by Porter, Thomas, PhD, Gough, Michael, 1963-

    Published: Syngress, 2007
    Description: 1 online resource (xx, 412 pages) : illustrations.
    Contents: “…Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. …”
    Elsevier - Click here for access
    eBook
  13. 13

    AVIEN malware defense guide for the Enterprise by ScienceDirect (Online service)

    Published: Syngress, 2007
    Description: 1 online resource (xxxv, 540 pages) : illustrations.
    Contents: “…Front Cover; AVIEN Malware Defense Guide for the Enterprise; Copyright Page; Lead Author and Technical Editor; Foreword Author; Contributors; Contents; Foreword; Preface; Introduction; Chapter 1: Customer Power and AV Wannabes; Chapter 2: Stalkers on Your Desktop; Chapter 3: A Tangled Web; Chapter 4: Big Bad Botnets; Chapter 5: Cregraveme de la Cybercrime; Chapter 6: Defense-in-depth; Chapter 7: Perilous Outsorcery; Chapter 8: Education in Education; Chapter 9: DIY Malware Analysis; Chapter 10: Antimalware Evaluation and Testing; Chapter 11: AVIEN and AVIEWS: the Future; Appendix A: Resources.…”
    Elsevier - Click here for access
    eBook
  14. 14

    Dissecting the hack : the forb1dd3n network Rev. ed. by ScienceDirect (Online service)

    Published: Syngress, 2010
    Description: 1 online resource (xx, 333 pages) : illustrations.
    Contents: “…Front Cover; Half Title Page; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR010GU3; CHAPTER 0N3; CHAPTER TW0; CHAPTER THR33; CHAPTER F0UR; CHAPTER F1V3; CHAPTER S1X; CHAPTER S3V3N; CHAPTER E1GHT; CHAPTER N1N3; CHAPTER T3N; 3P1L0GU3; PART 2: SECURITY THREATS ARE REAL (STAR) 2.0; CHAPTER 1. …”
    Elsevier - Click here for access
    eBook
  15. 15

    Digital identity management by ScienceDirect (Online service)

    Published: ISTE Press Ltd ; Elsevier Ltd, 2015
    Description: 1 online resource.
    Contents: “…Front Cover ; Digital Identity Management; Copyright ; Contents ; Foreword ; List of Acronyms ; Chapter 1: Digital Identity ; 1.1. …”
    Elsevier - Click here for access
    eBook
  16. 16

    Cybersecurity of digital service chains : challenges, methodologies, and tools by SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource (xi, 257 pages) : illustrations (chiefly color).
    SpringerLink - Click here for access
    eBook
  17. 17

    Cyber operations : building, defending, and attacking modern computer networks by O'Leary, Mike, 1968-

    Published: Apress, 2015
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  18. 18

    Building a corporate culture of security : strategies for strengthening organizational resiliency by Sullivant, John

    Published: Butterworth-Heinemann is an imprint of Elsevier, 2016
    Description: 1 online resource.
    Contents: “…Front Cover; Building a Corporate Culture of Security: Strategies For Strengthening Organizational Resiliency; Copyright; Dedication; Contents; About the Author; Foreword; Preface; An Idea Is Born; What Could Possibly Make This Book Unequivocally Different?…”
    Elsevier - Click here for access
    eBook
  19. 19

    Computational network science : an algorithmic approach by Hexmoor, Henry, 1960-

    Published: Morgan Kaufmann, 2015
    Description: 1 online resource (129 pages) : illustrations.
    Contents: “…Cover; Title Page; Copyright Page; Table of contents; Preface; References; Chapter 1 -- Ubiquity of Networks; 1.1 -- Introduction; 1.2 -- Online social networking services; 1.3 -- Online bibliographic services; 1.4 -- Generic network models; 1.4.1 -- Random Networks; 1.4.2 -- Scale-Free Networks; 1.4.3 -- Trade-Off Model; 1.4.4 -- Game Theoretic Models; 1.5 -- Network model generators; 1.5.1 -- Kleinberg's Small-World Model; 1.5.2 -- Barabási and Albert's Scale-Free Network Generator; 1.5.3 -- Epstein and Wang's Power-Law Network Generator; 1.6 -- A real-world network; 1.7 -- Conclusions.…”
    Elsevier - Click here for access
    eBook
  20. 20

    Host integrity monitoring : using Osiris and Samhain by Wotring, Brian

    Published: Syngress Pub., 2005
    Description: 1 online resource (xxvi, 421 pages) : illustrations.
    Elsevier - Click here for access
    eBook