Безопасность серверов, сетей и информации

Информационная безопасность. Учебник для вузов

В современном информационном обществе информация превратилась в особый ресурс любой деятельности, следовательно, как и всякий другой ресурс, нуждается в защите, в обеспечении ее сохранности, целостности и безопасности. Кто и как угрожает информационной безопасности

Методология защиты программного обеспечения. Научные проблемы безопасности и противодействия терроризму

В книге рассмотрены теоретические и прикладные аспекты проблемы зашиты программного обеспечения от различного рода злоумышленных действий. Особое внимание уделено моделям и методам создания доказуемо защищенных программ для применения в компьютерных системах с высоким

The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the

Business Continuity and Disaster Recovery Planning for IT Professionals

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have

Implementation of Authentication and Transaction Security

Kerberos is a network authentication protocol & is designed to provide strong authentication for client/server applications by using secret-key cryptography. Our research was aimed at enhancing the security of transactions over a network.

Model-checking infinite state systems for information flow security

Information flow properties are a way of specifying security properties of systems, dating back to the work of Goguen and Meseguer in the eighties. In this framework, a system is modeled as having

Information Security in Enterprises — an Ontological Perspective

Security within Enterprises is complex and challenging. Enterprises today are vulnerable to sophisticated cyber-attacks and are poorly equipped to deal with the ever growing threats. Whilst there are many types of security models

COUNTDOWN TO ZERO DAY

In January 2010, inspectors with the International Atomic Energy Agency began to notice that Iran’s nuclear centrifuges were failing at an alarming rate. What was causing them to do so was a total