Categories Unlimited Books

NIST SP 800-58 Security Considerations for Voice Over IP Systems

NIST SP 800-58 Voice over IP – the transmission of voice over packet-switched IP networks – is one of the most important emerging trends in telecommunications. As with many new technologies, VOIP introduces both security risks and opportunities. VOIP has a very different architecture than traditional circuit-based telephony, and these differences result in significant security […]

Read More
Categories Unlimited Books

Pattern and Security Requirements: Engineering-Based Establishment of Secur…

Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations […]

Read More
Categories Unlimited Books

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compli…

While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization’s mission, industry, and size will affect the nature and scope of the task as […]

Read More
Categories Unlimited Books

CCNP Security FIREWALL 642-618 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. Master Cisco CCNP Security FIREWALL 642-618 exam topics Assess your knowledge […]

Read More
Categories Unlimited Books

Embedded Security in Cars: Securing Current and Future Automotive IT Applic…

Embedded Security in Cars Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection […]

Read More
Categories Unlimited Books

Hacked: The Inside Story of America’s Struggle to Secure Cyberspace

The spectacular cyber attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming—each one more […]

Read More