Tag Archives: computer security

New title for Communication and Information Engineering

Information assurance handbook : effective computer security and risk management strategies
By Corey Schou, Steven Hernandez.
TK5105.59.S376, Lee Wee Nam Library

Synopsis:

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike. Common threats and vulnerabilities are described and applicable controls based on risk profiles are provided. Practical information assurance application examples are presented for select industries, including healthcare, retail, and industrial control systems
[As taken from Amazon]

New title for Communication and Information Engineering

Introduction to information security : a strategic-based approach
By Shimeall,Timoth.
TK5102.85.S556, Lee Wee Nam Library
Synopsis:
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. [As taken from Amazon]

New title for Communication and Information Engineering

Advances in cyber security : technology, operations, and experiences
By Hsu, Derbiau Frank.
TK5105.875.I57A244, Lee Wee Nam Library

Synopsis:
Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security – including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideas and construct feasible and practical solutions for defending against all kinds of adversaries and attacks. Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public-private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyber ecosystem. [As taken from Syndetics]

New title for Communication and Information Engineering

Title: The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
Author: Engebretson, Pat (Patrick Henry)
Call number: QA76.9.A25E57b
Availability:   Click here

Synopsis:
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. [As taken from Amazon]

New title for Communication and Information Engineering

Title: Handbook of digital forensics and investigation
Author: Casey, Eoghan
Call number: TK7868.H236
Availability: Click here

Synopsis:
This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). [As taken from Amazon]