Search Results - id Software
Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- Online social networks 3
- Social aspects 3
- Computer security 2
- Internet 2
- Quality control 2
- Web 2.0 2
- Alternating current 1
- Application software 1
- Artificial intelligence 1
- Bibliotheekautomatisering 1
- Cloud computing 1
- Communication in politics 1
- Computer games 1
- Computer network resources 1
- Computer networks 1
- Computer simulation 1
- Computer software 1
- Computer-assisted instruction 1
- Computers 1
- Design 1
- Development 1
- Electric motors 1
- Electric power distribution 1
- Electronic control 1
- Engineering 1
- Foreign exchange futures 1
- Foreign exchange market 1
- Harmonics (Electric waves) 1
- Human-computer interaction 1
-
1
-
2
Educational social software for context-aware learning collaborative methods and human interaction /
Published 2010NetLibrary
MyiLibrary
Electronic eBook -
3
-
4
Handbook of research on social software and developing community ontologies
Published 2009NetLibrary
MyiLibrary
MyiLibrary
ebrary
Electronic eBook -
5
Emerging systems approaches in information technologies concepts, theories, and applications /
Published 2010NetLibrary
MyiLibrary
Electronic eBook -
6
Handbook of research on Web information systems quality
Published 2008NetLibrary
MyiLibrary
Electronic eBook -
7
Handbook of research on agent-based societies social and cultural interactions /
Published 2009MyiLibrary
NetLibrary
MyiLibrary
ebrary
Electronic eBook -
8
-
9
-
10
The basics of cloud computing understanding the fundamentals of cloud computing in theory and practice
Published 2013Table of Contents: “…Verification; Authorization; Advanced Authentication Methods; Multifactor authentication; Risk-based authentication; Identity Providers; Credential Store; Public IdPs; OpenID; Google; Facebook; Microsoft Account; Federated Identity; Microsoft Access Control Services. …”
Book -
11
The 10 essentials of Forex trading the rules for turning patterns into profit /
Published 2007NetLibrary
MyiLibrary
Electronic eBook -
12
-
13
Information technology in librarianship new critical approaches /
Published 2009NetLibrary
Google
MyiLibrary
ebrary
Electronic eBook -
14
Technology-assisted problem solving for engineering education interactive multimedia applications /
Published 2010NetLibrary
MyiLibrary
Electronic eBook -
15
-
16
Information security and IT risk management
Published 2014Table of Contents: “…-- Design case -- ch. 9 Hardware and Software Controls -- Overview -- Password management -- Access control -- Firewalls -- Intrusion detection/prevention systems -- Patch management for operating systems and applications -- End-point protection -- Example case -- AirTight networks -- Chapter review questions -- Example case questions -- Hands-on activity -- host-based IDS (OSSEC) -- Critical thinking exercise -- extra-human security controls -- Design case -- ch. 10 Shell Scripting -- Overview -- Introduction -- Output redirection -- Text manipulation -- Variables -- Conditionals -- User input -- Loops -- Putting it all together -- Example case -- Max Butler -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic scripting -- Critical thinking exercise -- script security -- Design case -- ch. 11 Incident Handling -- Introduction -- Incidents overview -- Incident handling -- The disaster -- Example case -- on-campus piracy -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- incident timeline using OSSEC -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 12 Incident Analysis -- Introduction -- Log analysis -- Event criticality -- General log configuration and maintenance -- Live incident response -- Timelines -- Other forensics topics -- Example case -- backup server compromise -- Chapter review questions -- Example case questions -- Hands-on activity -- server log analysis -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 13 Policies, Standards, and Guidelines -- Introduction -- Guiding principles -- Writing a policy -- Impact assessment and vetting -- Policy review -- Compliance -- Key policy issues -- Example case -- HB Gary -- Summary -- Reference -- Chapter review questions -- Example case questions -- Hands-on activity -- create an AUP -- Critical thinking exercise -- Aaron Swartz -- Design case -- ch. 14 IT Risk Analysis and Risk Management -- Overview -- Introduction -- Risk management as a component of organizational management -- Risk-management framework -- The NIST 800-39 framework -- Risk assessment -- Other risk-management frameworks -- IT general controls for Sarbanes--Oxley compliance -- Compliance versus risk management -- Selling security -- Example case -- online marketplace purchases -- Summary -- Chapter review questions -- Hands-on activity -- risk assessment using LSOF -- Critical thinking exercise -- risk estimation biases -- Design case.…”
Book -
17


