Search Results - id Software

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Managing security with Snort and IDS tools by Cox, Kerry

    Published 2004
    Book
  2. 2
  3. 3

    Social software and Web 2.0 technology trends

    Published 2009
    NetLibrary
    MyiLibrary
    Electronic eBook
  4. 4
  5. 5
  6. 6

    Handbook of research on Web information systems quality

    Published 2008
    NetLibrary
    MyiLibrary
    Electronic eBook
  7. 7
  8. 8
  9. 9

    Careers in focus.

    Published 2009
    NetLibrary
    MyiLibrary
    ebrary
    Electronic eBook
  10. 10

    The basics of cloud computing understanding the fundamentals of cloud computing in theory and practice by Rountree, Derrick, Castrillo, Ileana

    Published 2013
    Table of Contents: “…Verification; Authorization; Advanced Authentication Methods; Multifactor authentication; Risk-based authentication; Identity Providers; Credential Store; Public IdPs; OpenID; Google; Facebook; Microsoft Account; Federated Identity; Microsoft Access Control Services. …”
    Book
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Power quality issues current harmonics by Mikkili, Suresh, Panda, Anup Kumar

    Published 2016
    Book
  16. 16

    Information security and IT risk management by Agrawal, Manish

    Published 2014
    Table of Contents: “…-- Design case -- ch. 9 Hardware and Software Controls -- Overview -- Password management -- Access control -- Firewalls -- Intrusion detection/prevention systems -- Patch management for operating systems and applications -- End-point protection -- Example case -- AirTight networks -- Chapter review questions -- Example case questions -- Hands-on activity -- host-based IDS (OSSEC) -- Critical thinking exercise -- extra-human security controls -- Design case -- ch. 10 Shell Scripting -- Overview -- Introduction -- Output redirection -- Text manipulation -- Variables -- Conditionals -- User input -- Loops -- Putting it all together -- Example case -- Max Butler -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic scripting -- Critical thinking exercise -- script security -- Design case -- ch. 11 Incident Handling -- Introduction -- Incidents overview -- Incident handling -- The disaster -- Example case -- on-campus piracy -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- incident timeline using OSSEC -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 12 Incident Analysis -- Introduction -- Log analysis -- Event criticality -- General log configuration and maintenance -- Live incident response -- Timelines -- Other forensics topics -- Example case -- backup server compromise -- Chapter review questions -- Example case questions -- Hands-on activity -- server log analysis -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 13 Policies, Standards, and Guidelines -- Introduction -- Guiding principles -- Writing a policy -- Impact assessment and vetting -- Policy review -- Compliance -- Key policy issues -- Example case -- HB Gary -- Summary -- Reference -- Chapter review questions -- Example case questions -- Hands-on activity -- create an AUP -- Critical thinking exercise -- Aaron Swartz -- Design case -- ch. 14 IT Risk Analysis and Risk Management -- Overview -- Introduction -- Risk management as a component of organizational management -- Risk-management framework -- The NIST 800-39 framework -- Risk assessment -- Other risk-management frameworks -- IT general controls for Sarbanes--Oxley compliance -- Compliance versus risk management -- Selling security -- Example case -- online marketplace purchases -- Summary -- Chapter review questions -- Hands-on activity -- risk assessment using LSOF -- Critical thinking exercise -- risk estimation biases -- Design case.…”
    Book
  17. 17

    Routledge handbook of Internet politics

    Published 2009
    NetLibrary
    MyiLibrary
    Electronic eBook