Results for *

Displaying results 26 to 50 of 92.

  1. Stealing the network
    how to own the box
    Published: c2003
    Publisher:  Syngress, Rockland, MA

    Hide and sneak Ido Dubrawsky -- The worm turns Ryan Russell and Tim Mullen -- Just another day at the office Joe Grand -- h3X's adventures in networkland FX -- The thief no one saw Paul Craig -- Flying the friendly skies Joe Grand -- dis-card Mark... more

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Universitätsbibliothek Rostock
    No inter-library loan

     

    Hide and sneak Ido Dubrawsky -- The worm turns Ryan Russell and Tim Mullen -- Just another day at the office Joe Grand -- h3X's adventures in networkland FX -- The thief no one saw Paul Craig -- Flying the friendly skies Joe Grand -- dis-card Mark Burnett -- Social (In)Security Ken Pfeil -- BabelNet Dan Kaminsky -- The art of tracking Mark Burnett -- The laws of security Ryan Russell "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--P. xix

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Series: Cyber-Fiction Ser
    Subjects: Electronic books; Short stories, American; Computer security; Hackers; Computer hackers; Electronic book collection; FICTION ; General; Hackers; Computer security; Short stories, American; Short stories; Fiction; Short stories
    Scope: Online Ressource (xxii, 303 p.), ill.
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Description based on print version record

    Ido Dubrawsky: Hide and sneak

    Ryan Russell and Tim Mullen: The worm turns

    Joe Grand: Just another day at the office

    FX: h3X's adventures in networkland

    Paul Craig: The thief no one saw

    Joe Grand: Flying the friendly skies

    Mark Burnett: dis-card

    Ken Pfeil: Social (In)Security

    Dan Kaminsky: BabelNet

    Mark Burnett: The art of tracking

    Ryan Russell.: The laws of security

  2. Zero day exploit
    countdown to darkness
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Universitätsbibliothek Rostock
    No inter-library loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098
    Series: Cyber-Fiction Ser
    Subjects: Computer security; Computer hackers; Computer networks; Computer networks; Computer security; Hackers; FICTION ; General; Hackers; Computer networks ; Security measures; Computer security; Fiction; Fiction
    Scope: Online Ressource
    Notes:

    "Rob Shein aka Rogue Shoten. - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' p

  3. Digital fortress
    Contributor: Sabath, Bruce
    Published: 2004
    Publisher:  Orion Audiobooks, London

    Stadtbibliothek Braunschweig
    e CD Brow
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Contributor: Sabath, Bruce
    Language: English
    Media type: Book; Data medium
    ISBN: 0752868926
    RVK Categories: HU 9800
    Edition: abridged
    Subjects: Intelligence officers; Computer security; Cryptographers; Suspense fiction
    Scope: 5 CDs, 398 Min
  4. Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment
    4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part II
    Contributor: Zhou, Jia (HerausgeberIn); Salvendy, Gavriel (HerausgeberIn)
    Published: 2018
    Publisher:  Springer International Publishing, Cham

    This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in... more

    Access:
    Resolving-System (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book Springer
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Technische Universität Chemnitz, Universitätsbibliothek
    No inter-library loan
    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    No inter-library loan
    Hochschule Furtwangen University. Informatik, Technik, Wirtschaft, Medien. Campus Furtwangen, Bibliothek
    eBook Springer
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    ebook
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    No inter-library loan
    Bibliothek der Hochschule Hannover
    No inter-library loan
    Bibliothek im Kurt-Schwitters-Forum
    No inter-library loan
    Bibliothek LIV HN Sontheim
    Springer E-Book
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Karlsruher Institut für Technologie, KIT-Bibliothek
    No loan of volumes, only paper copies will be sent
    Karlsruher Institut für Technologie, KIT-Bibliothek
    No loan of volumes, only paper copies will be sent
    Bibliotheksservice-Zentrum Baden-Württemberg (BSZ)
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    KaufEBook202103
    No inter-library loan
    Otto-von-Guericke-Universität, Universitätsbibliothek
    eBook Springer
    No inter-library loan
    Otto-von-Guericke-Universität, Universitätsbibliothek, Medizinische Zentralbibliothek
    eBook Springer
    No inter-library loan
    Hochschule Mannheim, Hochschulbibliothek
    eBook Springer
    No inter-library loan
    Universitätsbibliothek Mannheim
    No inter-library loan
    Universitätsbibliothek Mannheim
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book Springer
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Hochschule Osnabrück, Bibliothek Campus Westerberg
    No inter-library loan
    Universitätsbibliothek Osnabrück
    No inter-library loan
    Universität Potsdam, Universitätsbibliothek
    No inter-library loan
    Hochschulbibliothek Reutlingen (Lernzentrum)
    eBook
    No inter-library loan
    Universitätsbibliothek Rostock
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek Stuttgart
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan
    Technische Hochschule Ulm, Bibliothek
    eBook Springer
    No loan of volumes, only paper copies will be sent
    Universität Ulm, Kommunikations- und Informationszentrum, Bibliotheksservices
    No loan of volumes, only paper copies will be sent

     

    This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions. ITAP 2018 includes a total of 84 papers. They were organized in topical sections as follows: Part I: aging and technology acceptance; aging and interaction; intergenerational communication and social participation. Part II: health care technologies and services for the elderly; intelligent environments for aging; and games and entertainment for the elderly Health Care Technologies and Services for the Elderly -- Building an Ontology for Eldercare Service in China with a Hierarchical Clustering Method -- Interoperability and Convergence for Welfare Technology -- A Knowledge Graph for Eldercare: Constructing a Domain Entity Graph with Guidelines -- Augmented Reality in Tablets for the Yerkes Test for Older Adults -- Innovation Method of Health Products Design for Elderly Adults Based on Perceived Quality and User Experience -- A User-centred Ethical Assessment of Welfare Technologies for Elderly -- Obstacles of Utilizing a Self-management APP for Taiwanese Type II Diabetes Patients -- Impact of Virtual Reality (VR) Experience on Older Adults' Well-Being -- Positive Impact of Exergaming on Older Adults’ Mental and Social Well-being: In Search of Evidence -- AR-PETS: Development of an Augmented Reality Supported Pressing Evaluation Training System -- Technology-Enabled Medication Adherence for Seniors Living in the Community: Experiences, Lessons, and The Road Ahead -- The Old People Using Intelligent Mobile Equipment Influence Extent -- Factor Analysis of Perceived Quality and User Experience of Health Products for Elderly Adults -- Usability Assessment of a Web-based Self-Directed Learning (SDL) System for Chinese Dementia Caregivers -- The Effect of Hypertension Health Management (HHM) using IT for the Elderly: A Case Study in an Underdeveloped Area of China -- Decisions about Medical Data Disclosure in the Internet: An Age Perspective -- Intelligent Environments for Aging -- A Framework for Pervasive & Ubiquitous Geriatric Monitoring -- User-specific Concepts of Aging - A Qualitative Approach on AAL-Acceptance Regarding Ultrasonic Whistles -- Kinecting Frailty: A Pilot Study on Frailty -- Detecting Parkinson’s Disease Using Gait Analysis with Particle Swarm Optimization -- Methods to Design Home Support for Elders -- Unobtrusive detection of frailty in older adults -- Monitoring Thermal Comfort with IoT Technologies: A Pilot Study in Chinese Eldercare Centers -- Reflections on the effectiveness of a high density ambient sensor deployment for monitoring Healthy Aging -- Interpersonal Distancing in Cooperation - Effect of Confederate’s Interpersonal Distance Preferences -- Identifying Elderlies at Risk of Becoming More Depressed with Internet-of-Things -- Smart TV for Older Adults: A Comparative Study of the Mega Menu and Tiled Menu -- Privacy at Home: an Inquiry into Sensors and Robots for the Stay at Home Elderly -- Perspectives on Design of Sensor based Exergames Targeted Towards Older Adults -- Privacy and Future Consent in Smart Homes as Assisted Living Technologies -- Needs and Attitudes of Friendly Chinese Restaurant among Older Adults: Results from a Pilot Study -- Investigating Older Adults’ Preferences for Functions within a Human-Machine Interface Designed for Fully Autonomous Vehicles -- An Experimental Study on Intelligent Kitchen Appliances’ Interface Information Preference Based on Visual Characteristics of the Elderly -- Games and Entertainment for the Elderly -- Gen X and Digital Games: Looking Back to Look Forward -- An analysis of Crossword Learning: a mobile application for the elderly -- Creating an Online Escape Room Game for Older Adults: Needs Assessment, Design Process, and Usability Testing -- Innovative game concepts for Alzheimer patients -- Pumpkin Garden: A Mobile Game Platform for Monitoring Parkinson's Disease Symptoms -- Pilot study of Piano Learning with AR Smart glasses Considering Both Single and Paired Play -- Attitudes and Perceptions of Older Chinese People in Hong Kong towards Silver Gaming

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Zhou, Jia (HerausgeberIn); Salvendy, Gavriel (HerausgeberIn)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9783319920375
    Other identifier:
    Series: Lecture Notes in Computer Science ; 10927
    Information Systems and Applications, incl. Internet/Web, and HCI ; 10927
    Array
    Subjects: Computer science; Computer Science; Computer science; Computer organization; Computer security; Computer organization; Computer security; User interfaces (Computer systems); Artificial intelligence; Computer graphics; User interfaces (Computer systems); Artificial intelligence; Computer graphics; Application software.; Computer networks .; Human-computer interaction.; Data protection.; Computer engineering.
    Scope: Online-Ressource (XXIII, 590 p. 180 illus, online resource)
  5. Enterprise Java security
    building secure J2EE applications
    Published: c2004
    Publisher:  Addison-Wesley, Boston, Mass. [u.a.]

    Technische Hochschule Ostwestfalen-Lippe, Service Kommunikation Information Medien
    TYD271
    Loan of volumes, no copies
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    ISBN: 0321118898
    Other identifier:
    2003063781
    Edition: 1. print.
    Subjects: Java (Computer program language); Computer security; Computersicherheit; Java 2 Enterprise Edition
    Scope: XXIII, 579 S., Ill., graph. Darst.
    Notes:

    Includes bibliographical references (p. 563) and index. - Formerly CIP

  6. Vulnerability management
    Published: 2019
    Publisher:  CRC Press, impring of Taylor & Francis Group, Boca Raton, FL ; Taylor & Francis Group, London

    Access:
    TU Darmstadt, Universitäts- und Landesbibliothek - Stadtmitte
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9780415015189; 0415015189; 9780429289651; 0429289650; 9780367235147; 0367235145; 9781000005097; 1000005097
    RVK Categories: EC 5250
    Edition: Second edition
    Subjects: Literaturkritik; Feminismus; Computer security; Information technology; Risk management
    Scope: 1 Online-Ressource
    Notes:

    Includes index

  7. Core security patterns
    best practices and strategies for J2EE, web services and identity management
    Published: 2005
    Publisher:  Prentice Hall, Upper Saddle River, NJ ; Munich [u.a.]

    Freie Universität Berlin, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Philologische Bibliothek, FU Berlin
    Language: English
    Media type: Book
    ISBN: 0131463071
    RVK Categories: ST 253 ; ST 250
    Edition: 1. print.
    Series: Prentice Hall core series
    Subjects: J2EE; Java 2 platform Enterprise Edition; Java 2; datasikkerhed; programmering; programmeringssprog; sikkerhed; vejledninger; Java (Computer program language); Computer security
    Scope: XLVI, 1041 S.
    Notes:

    Includes bibliographical references and index

  8. Core security patterns
    best practices and strategies for J2EE, web services and identity management
    Published: 2005
    Publisher:  Prentice Hall, Upper Saddle River, NJ

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Nagappan, Ramesh (Publisher); Lai, Ray (Publisher)
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0131463071
    RVK Categories: ST 250 ; ST 277
    Edition: 1. print.
    Series: Prentice Hall core series
    Subjects: J2EE; Java 2 platform Enterprise Edition; Java 2; datasikkerhed; programmering; programmeringssprog; sikkerhed; vejledninger; Java (Computer program language); Computer security
    Scope: XLVI, 1041 S.
    Notes:

    Includes bibliographical references and index

  9. Futureproof
    security aesthetics and the management of life
    Contributor: Ghertner, D. Asher (Publisher); McFann, Hudson (Publisher); Goldstein, Daniel M. (Publisher)
    Published: 2020
    Publisher:  Duke University Press, Durham ; London

    Alice Salomon Hochschule Berlin, Bibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule für Technik und Wirtschaft Berlin, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Bibliothek der Friedrich-Ebert-Stiftung
    Unlimited inter-library loan, copies and loan
    Brandenburgische Technische Universität Cottbus - Senftenberg, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Europa-Universität Viadrina, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule der Polizei des Landes Brandenburg, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Contributor: Ghertner, D. Asher (Publisher); McFann, Hudson (Publisher); Goldstein, Daniel M. (Publisher)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781478007517
    Other identifier:
    RVK Categories: MS 1190 ; LH 61360
    Series: Global insecurities
    Subjects: Human security; Emergency management; Risk management; Biosecurity; Computer security; Zukunft; Menschliche Sicherheit; Katastrophenmanagement; Ästhetik; Risikomanagement
    Scope: 1 Online-Ressource (xii, 298 Seiten), Illustrationen
  10. Information warfare in business
    strategies of control and resistance in the network society
    Author: Munro, Iain
    Published: 2005
    Publisher:  Routledge, London

    This book illustrates the relations between information technology and organization, and in particular, between business organizations and the recent revolution in military affairs that has been called 'information warfare' more

    Hochschulbibliothek Friedensau
    Online-Ressource
    No inter-library loan

     

    This book illustrates the relations between information technology and organization, and in particular, between business organizations and the recent revolution in military affairs that has been called 'information warfare'

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 0415339685
    Series: Routledge studies in business organizations and networks ; 29
    Subjects: Computer security; Business intelligence; Information technology; Information warfare
    Scope: Online-Ressource (xi, 200 p), ill, 24 cm
    Notes:

    Includes bibliographical references (p. [188]-196) and index

    Electronic reproduction; Available via World Wide Web

    Book Cover; Half-Title; Title; Copyright; Dedication; Contents; Acknowledgements; 1 Information warfare in business; Part l Creative organizational forms; Part II The weapon of information; Part III Changing power relations; Notes; Bibliography; Index

  11. Collaboration with cloud computing
    security, social media, and unified communications
    Author: Messier, Ric
    Published: 2014
    Publisher:  Elsevier, Amsterdam [u.a.]

    "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses... more

    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    A 2014/4376
    Unlimited inter-library loan, copies and loan

     

    "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9780124170407
    RVK Categories: ST 200
    Subjects: Information technology; Information technology; Cloud computing; Computer security; Computer crimes
    Scope: XIX, 222 S., zahlr. Ill.
    Notes:

    Includes bibliographical references and index

    Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers and Platform as a Service 6. Social Media 7. Mobile Computing 8. Unified Communications 9. Remote Workers 10. Risk Management and Policy Considerations 11. Future Technology 12. Pulling it all Together

  12. IT audit, control, and security
    Published: c2010
    Publisher:  Wiley, Hoboken, N.J

    Universität Potsdam, Universitätsbibliothek
    QQ 546 MOE
    No loan of volumes, only paper copies will be sent
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0471406767; 9780471406761
    Subjects: Information technology; Electronic data processing departments; Computer security; Computer networks
    Scope: XXIV, 667 S., graph. Darst., 26 cm
    Notes:

    Includes bibliographical references and index

  13. IT audit, control, and security
    Published: c2010
    Publisher:  Wiley, Hoboken, N.J

    Combines the areas of computer audit, computer control, and computer security in one book.; Offers step-by-step guidance on auditing, control, and security.; Provides numberous control objectives This section discusses IT audit cybersecurity and... more

    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    Combines the areas of computer audit, computer control, and computer security in one book.; Offers step-by-step guidance on auditing, control, and security.; Provides numberous control objectives This section discusses IT audit cybersecurity and privacy control activities from two focus areas. First is focus on some of the many cybersecurity and privacy concerns that auditors should consider in their reviews of IT-based systems and processes. Second focus area includes IT Audit internal procedures. IT audit functions sometimes fail to implement appropriate security and privacy protection controls over their own IT audit processes, such as audit evidence materials, IT audit workpapers, auditor laptop computer resources, and many others. Although every audit department is different, this

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9780470877685; 0470877413; 0470877685; 9780470877418
    Other identifier:
    RVK Categories: QQ 537 ; SR 860 ; ST 277
    Series: Wiley Global Finance Executive Select ; v.173
    Subjects: Information technology; Electronic data processing departments; Computer security; Computer networks
    Scope: Online Ressource (XXIV, 667 S.)
    Notes:

    Includes bibliographical references and index

    Electronic reproduction; Available via World Wide Web

    IT Audit, Control, and Security; Contents; Introduction: Importance of IT Auditing; Part One: Auditing Internal Controls in an IT Environment; Chapter 1: SOx and the COSO Internal Controls Framework; ROLES AND RESPONSIBILITIES OF IT AUDITORS; IMPORTANCE OF EFFECTIVE INTERNAL CONTROLS AND COSO; COSO INTERNAL CONTROL SYSTEMS MONITORING GUIDANCE; SARBANES-OXLEY ACT; WRAPPING IT UP: COSO INTERNAL CONTROLS AND SOx; NOTES; Chapter 2: Using CobiT to Perform IT Audits; INTRODUCTION TO CobiT; CobiT FRAMEWORK; USING CobiT TO ASSESS INTERNAL CONTROLS; USING CobiT IN A SOx ENVIRONMENT

    CobiT ASSURANCE FRAMEWORK GUIDANCECobiT IN PERSPECTIVE; NOTES; Chapter 3: IIA and ISACA Standards for the Professional Practice of Internal Auditing; INTERNAL AUDITING'S INTERNATIONAL PROFESSIONAL PRACTICE STANDARDS; CONTENT OF THE IPPF AND THE IIA INTERNATIONAL STANDARDS; STRONGLY RECOMMENDED IIA STANDARDS GUIDANCE; ISACA IT AUDITING STANDARDS OVERVIEW; CODES OF ETHICS: THE IIA AND ISACA; NOTES; Chapter 4: Understanding Risk Management through COSO ERM; RISK MANAGEMENT FUNDAMENTALS; QUANTITATIVE RISK ANALYSIS TECHNIQUES; IIA AND ISACA RISK MANAGEMENT INTERNAL AUDIT GUIDANCE

    COSO ERM: ENTERPRISE RISK MANAGEMENTIT AUDIT RISK AND COSO ERM; NOTES; Chapter 5: Performing Effective IT Audits; IT AUDIT AND THE ENTERPRISE INTERNAL AUDIT FUNCTION; ORGANIZING AND PLANNING IT AUDITS; DEVELOPING AND PREPARING AUDIT PROGRAMS; GATHERING AUDIT EVIDENCE AND TESTING RESULTS; WORKPAPERS AND REPORTING IT AUDIT RESULTS; PREPARING EFFECTIVE IT AUDITS; NOTES; Part Two: Auditing IT General Controls; Chapter 6: General Controls in Today's IT Environments; IMPORTANCE OF IT GENERAL CONTROLS; IT GOVERNANCE GENERAL CONTROLS; IT MANAGEMENT GENERAL CONTROLS

    IT TECHNICAL ENVIRONMENT GENERAL CONTROLSNOTE; Chapter 7: Infrastructure Controls and ITIL Service Management Best Practices; ITIL SERVICE MANAGEMENT BEST PRACTICES; ITIL'S SERVICE STRATEGIES COMPONENT; ITIL SERVICE DESIGN; ITIL SERVICE TRANSITION MANAGEMENT PROCESSES; ITIL SERVICE OPERATION PROCESSES; SERVICE DELIVERY BEST PRACTICES; AUDITING IT INFRASTRUCTURE MANAGEMENT; NOTE; Chapter 8: Systems Software and IT Operations General Controls; IT OPERATING SYSTEM FUNDAMENTALS; FEATURES OF A COMPUTER OPERATING SYSTEM; OTHER SYSTEMS SOFTWARE TOOLS

    Chapter 9: Evolving Control Issues: Wireless Networks, Cloud Computing, and VirtualizationUNDERSTANDING AND AUDITING IT WIRELESS NETWORKS; UNDERSTANDING CLOUD COMPUTING; STORAGE MANAGEMENT VIRTUALIZATION; Part Three: Auditing and Testing IT Application Controls; Chapter 10: Selecting, Testing, and Auditing IT Applications; IT APPLICATION CONTROL ELEMENTS; SELECTING APPLICATIONS FOR IT AUDIT REVIEWS; PERFORMING AN APPLICATION CONTROLS REVIEW: PRELIMINARY STEPS; COMPLETING THE IT APPLICATION CONTROLS AUDIT; APPLICATION REVIEW CASE STUDY: CLIENT-SERVER BUDGETING SYSTEM

    AUDITING APPLICATIONS UNDER DEVELOPMENT

  14. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: c2004
    Publisher:  Syngress Pub, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

    Zentrale Hochschulbibliothek Lübeck
    KaufEBook202103
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (An electronic book accessible through the World Wide Web; click for information)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Series: Cyber-Fiction
    Subjects: Computer hackers; Computer networks; Computer networks; Computer security; Hackers
    Scope: Online-Ressource (xxii, 339 p), 24 cm
    Notes:

    "Foreword by David Litchfield

    "Rob Shein aka Rogue Shoten

    Electronic reproduction; Mode of access: World Wide Web

    Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security

  15. Stealing the network
    how to own a shadow
    Published: c2007
    Publisher:  Syngress, Rockland, Mass

    Cover; Title; Authors & Creators; Preface; Foreword; Travel Plans; Back in the Saddle; Old Man and a Ghost; Rootkit; Paul; The Birth of Pawn; Dishonorable Discharge; McGaylver; Appendix: Flashback to Knuth; There's Something Else; The Chase. The... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    Cover; Title; Authors & Creators; Preface; Foreword; Travel Plans; Back in the Saddle; Old Man and a Ghost; Rootkit; Paul; The Birth of Pawn; Dishonorable Discharge; McGaylver; Appendix: Flashback to Knuth; There's Something Else; The Chase. The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781429456487; 1429456485
    Series: Stealing the Network Ser
    Subjects: Hackers; Computer security; Cyberterrorism; Computer hackers; Computer security; Cyberterrorism; Computer security; Cyberterrorism; Hackers; Computer security; Cyberterrorism; FICTION ; General; Fiction; Hackers
    Scope: Online Ressource (xxxvi, 409 p.), ill.
    Notes:

    "Black Hat"--Cover. - " ... fourth book in the "Stealing the network series."--Pref. - "The chase for Knuth"--Cover. - Description based on print version record

    "The chase for Knuth"--Cover

    " ... fourth book in the "Stealing the network series."--Pref

  16. Information warfare in business
    strategies of control and resistance in the network society
    Author: Munro, Iain
    Published: 2005
    Publisher:  Routledge, London

    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    V m 650
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0415339685; 0415439906; 9780415339681; 9780415439909
    RVK Categories: ST 277
    Series: Routledge studies in business organization and networks
    Subjects: Information technology; Information warfare; Business intelligence; Computer security
    Scope: xi, 200 p, 24cm
  17. Implementing the OECD "privacy guidelines" in the electronic environment
    focus on the Internet
    Published: 1998
    Publisher:  OECD, Paris

    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    Unlimited inter-library loan, copies and loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    K99-1766
    Unlimited inter-library loan, copies and loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    W 804 (6.77)
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    Other identifier:
    DSTI/ICCP/REG(97)6/FINAL
    RVK Categories: QG 010
    Series: Working papers ; 6,77
    Subjects: Datenschutz; Verbraucherschutz; Internet; OECD-Staaten; Internet Computer network; Computer security; Privacy, Right of
    Scope: 39 S., Ill.
  18. Core security patterns
    best practices and strategies for J2EE(TM), Web services, and identity management
    Published: 2006
    Publisher:  Pearson Education, London ; Prentice Hall PTR, Upper Saddle River, N.J.

    Technische Universität Chemnitz, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    Unlimited inter-library loan, copies and loan
    Hochschule für Angewandte Wissenschaften Hamburg, Hochschulinformations- und Bibliotheksservice (HIBS), Fachbibliothek Technik, Wirtschaft, Informatik
    Dat 346 JAV 293
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 06 B 2601
    Unlimited inter-library loan, copies and loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    Z 020/ Stec
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Ilmenau
    INF ST 250 J35 S813
    Unlimited inter-library loan, copies and loan
    Karlsruher Institut für Technologie, KIT-Bibliothek
    2005 A 12571
    Unlimited inter-library loan, copies and loan
    Universität Stuttgart, Institut für Kommunikationsnetze und Rechnersysteme, Bibliothek
    Inf 100
    No loan of volumes, only paper copies will be sent
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0131463071
    Other identifier:
    9780131463073
    2005020502
    RVK Categories: ST 250
    Series: Prentice Hall core series
    Subjects: Java (Computer program language); Computer security
    Scope: xlvi, 1041 S.
    Notes:

    Formerly CIP

  19. Collaboration with cloud computing
    security, social media, and unified communications
    Author: Messier, Ric
    Published: [2014]; ©2014
    Publisher:  Syngress, Amsterdam

    "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses... more

    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    A 2014/4376
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Leipzig
    Unlimited inter-library loan, copies and loan

     

    "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Konar, Allan (HerausgeberIn)
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0124170404; 9780124170407
    RVK Categories: ST 200
    Series: Syngress
    Subjects: Information technology; Information technology; Cloud computing; Computer security; Computer crimes; Cloud computing; Computer crimes; Computer security; Information technology; Information technology; Information technology; Information technology; Cloud computing; Computer security; Computer crimes
    Scope: xix, 222 Seiten, Diagramme, 24 cm
    Notes:

    Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers 6. Social Media Risks & Rewards 7. VOIP and Its Risks 8. The Risks and Rewards of Remote Workers 9. Policy Considerations 10. Risk Management 11. New Technologies and Being Agile 12. Future Trends and Outcomes. - Includes bibliographical references and index

    Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers and Platform as a Service 6. Social Media 7. Mobile Computing 8. Unified Communications 9. Remote Workers 10. Risk Management and Policy Considerations 11. Future Technology 12. Pulling it all Together

  20. Stealing the network
    the complete series collector's edition
    Published: c2009
    Publisher:  Syngress, Burlington, MA

    Hide and sneak -- The worm turns -- Just another day at the office -- h3X's adventures in network land -- The thief no one saw -- Flying the friendly skies -- dis-card -- Social (in)security -- BabelNet -- The art of tracking -- Control yourself --... more

    Hochschule Zittau / Görlitz, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan

     

    Hide and sneak -- The worm turns -- Just another day at the office -- h3X's adventures in network land -- The thief no one saw -- Flying the friendly skies -- dis-card -- Social (in)security -- BabelNet -- The art of tracking -- Control yourself -- The lagos creeper box -- The evolution of a hacker -- A real gullible genius -- For whom Ma Bell tolls -- Return on investment -- h3X and the big picture -- The story of Dex -- Automatic terror machine -- Get out quick -- In the beginning -- Sins of the father -- Saul on the run -- The seventh wave -- BlcktoW3r -- The Java Script Café -- Death by a thousand cuts -- A really gullible genius makes amends -- Near miss -- There's something else -- Epilogue : the chase -- The conversation -- Social insecurity -- Travel plans -- Back in the saddle -- Old man and a ghost -- Rootkit -- Paul -- The birth of Pawn -- Dishonorable discharge -- McGaylver -- The final chapter

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781597492997
    Subjects: Computer hackers; Computer security; Cyberterrorism; Short stories, American
    Scope: xxxi, 1038 S., graph. Darst.
  21. Visualization of time-oriented data
    Published: 2011
    Publisher:  Springer, Dordrecht

    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9780857290786
    RVK Categories: ZI 9705 ; ST 320
    Series: Human-Computer Interaction Series
    EBL-Schweitzer
    Subjects: Digital Humanities; Computer networks -- Security measures; Computer security; Human-computer interaction; Information visualization
  22. Futureproof
    security aesthetics and the management of life
    Contributor: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Published: 2020
    Publisher:  Duke University Press, Durham

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The... more

    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    Unlimited inter-library loan, copies and loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    K/LXV, 2495
    No inter-library loan
    Max-Planck-Institut für ethnologische Forschung, Bibliothek
    JC571 Gher2020
    No loan of volumes, only paper copies will be sent
    Universitätsbibliothek Heidelberg
    2020 A 8108
    Unlimited inter-library loan, copies and loan

     

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The Aesthetics of Insecurity in Bogota / Austin Zeiderman -- We All Have the Same Red Blood?: Security Aesthetics and Rescue Ethics on the Arizona's Sonora Border / Ieva Jusionyte -- Fugitive Horizons and the Arts of Security in Honduras / Jon Carter -- Security Aesthetics and Political Community Formation in Kingston, Jamaica / Rivke Jaffe -- Staging Safety in Brooklyn's Real Estate / Zaire Dinzey-Flores and Alexandra Demshock -- Expecting the Worst: Active-Shooter Scenario Play in American Schools / Rachel Hall -- H5N1 and the Aesthetics of Biosecurity: From Danger to Risk / Limor Samimian-Darash -- Securing Stand-by and Urban Space Making in Jakarta: Intensities in Search of Forms / -- AbdouMaliq Simone -- Securing the Street: Urban Renewal and the Fight Against 'Informality' in Mexico City / -- Alejandra Leal Martinez -- The Age of Security / Didier Fassin "From terrorism and public health to museums, schools, and homes, FUTUREPROOF asks us to expand our purview of security, turning our attention to how security is lived, felt, and perceived through the violences of everyday life. Editors Asher Ghertner, Daniel Goldstein, and Hudson Fann propose the modality of "security aesthetics" as a way to understand how sensory and affective experiences help regulate bodies, spaces, and states in the service of "futureproofing" society against anticipated risks and perils. Taken broadly as the domain of sense perception, aesthetics provides a framework for considering the body's interactions with the material world and the processes by which these interactions translate into subjective judgments of taste. The contributions to this volume show us how security aesthetics work to fashion differently imagined futures, illuminating the interplay of sense perception and articulated reason in the operations of security apparatuses"--

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781478006909; 9781478006091
    RVK Categories: MS 1190 ; LH 61360
    Series: Global insecurities
    Subjects: Human security; Emergency management; Risk management; Biosecurity; Computer security
    Scope: xii, 298 Seiten, Illustrationen, Karten
    Notes:

    Includes bibliographical references and index

  23. La fortaleza digital
    Author: Brown, Dan
    Published: 2006
    Publisher:  Umbriel, Barcelona

    La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa criptógrafa Susan Fletcher. La única pista para romper ese código parece estar en el... more

    Ibero-Amerikanisches Institut Preußischer Kulturbesitz, Bibliothek
    A 19 / 12609
    Unlimited inter-library loan, copies and loan

     

    La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa criptógrafa Susan Fletcher. La única pista para romper ese código parece estar en el cadáver de un hombre fallecido en Espańa, donde ha sido enviado el prometido de Susan, David Becker. Mientras David intenta hallar la clave y sobrevivir a la persecución de un metódico e implacable asesino en las calles de Sevilla, Susan se enfrentará a su propio drama en las desoladas instalaciones de máxima seguridad de la Agencia, durante una larga noche en la que la mentira y el asesinato acechan tras cada puerta The supercomputer of the National Security Agency has encountered a code which it can not decipher. The deputy director of the agency calls the beautiful cryptographer Susan Fletcher. The only way to break the code seems to be in the body of a man who died in Spain. Susan's fiance, David Becker, is sent to Spain to investigate. While David tries to find the key and survive a methodical and ruthless murderer on the streets of Seville, Susan will face her own drama in the isolated maximum security facilities of the Agency, during a long night where lies and murder lurk behind every door

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
  24. Understanding new security threats
    Contributor: Gueldry, Michel R. (HerausgeberIn); Gokcek, Gigi (HerausgeberIn); Hebron, Lui (HerausgeberIn)
    Published: 2019
    Publisher:  Routledge, Taylor & Francis Group, London

    This textbook examines non-traditional forms of security and expands the notion of security to include non-state actors and non-human actors. Proposing an expansive view of non-traditional forms of security that go beyond traditionally recognized... more

    Fachinformationsverbund Internationale Beziehungen und Länderkunde
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Peace Research Institute Frankfurt, Bibliothek
    E-Book HSFK
    Unlimited inter-library loan, copies and loan
    German Institute for Global and Area Studies, Bibliothek
    E-Book EBA TF-21
    Unlimited inter-library loan, copies and loan

     

    This textbook examines non-traditional forms of security and expands the notion of security to include non-state actors and non-human actors. Proposing an expansive view of non-traditional forms of security that go beyond traditionally recognized issues of threats to state and national territory, this new textbook rests on the following premises: traditional state-centered threats, such as nuclear proliferation and espionage, remain a concern; old and new threats combine and create interlocking puzzles - a feature of wicked problems and wicked messes; because of the global erosion of borders, new developments of unconventional insecurity interact in ways that frustrate traditional conceptual definitions, conceptual maps, and national policies; unconventional security challenges which have traditionally been seen as "low politics" or "soft" issues are now being recognized as "hard security" challenges in the twenty-first century; many of the so-called "new" threats detailed here are in fact very old: diseases, gender violence, food insecurity, under-development, and crime are all traditional security threats, but deeply modified today by globalization. The chapters offer local and global examples and engage with various theoretical approaches to help readers see the bigger picture. Solutions are also suggested to these problems. Each chapter contains discussion questions to help readers understand the key points and facilitate class discussion.

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Staatsbibliothek zu Berlin
    Contributor: Gueldry, Michel R. (HerausgeberIn); Gokcek, Gigi (HerausgeberIn); Hebron, Lui (HerausgeberIn)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781315102061
    Other identifier:
    RVK Categories: MF 9500 ; MK 8000
    Subjects: Security, International; National security; Human security; Energy security; Biosecurity; Computer security; Non-state actors (International relations); Terrorism; Computer Security; Kollektive Sicherheit; Bedrohungsvorstellung; Vorstellung; Sicherheitspolitik; Ursache; Einflussgröße; Risikofaktor; Wandel; Entwicklung; Security, International; National security; Human security; Energy security; Biosecurity; Computer security; Non-state actors (International relations); Terrorism ; Prevention; Electronic books; HISTORY / Military / Other; TECHNOLOGY & ENGINEERING / Military Science
    Scope: 1 Online-Ressource (xviii, 254 Seiten), Diagramme
    Notes:

    Literaturangaben, Register

    Michel Gueldry, Gigi gokcek and Lui Hebron: Introduction : Yesterday’s security debates, today’s realities

    Amy Below: Climate change : the existential security threat multiplier

    Michael D. Beevers: Geoengineering : a new and emerging security threat?

    Neda A. Zawahri and Erika Weinthal: The intersecting dimensions of water security

    Michael A. Davis and Jonathan Drake: Competition and cooperation in energy policies : dilemmas for national security and influence

    Marissa Quie: The body politics of security : sexual and reproductive health rights

    Nicole Gerring: Gender-based violence : a threat to human security in the global north and global south

    Erika Resende and Adriana Erthal Abnedur: Food security governance : lessons from the global south

    Adrienne Formentos and Gigi Gokcek: Invisible foes and micro-enemies : pathogens, diseases, and global health security

    Joel R. Campbell: Push, pull, and politics : the international migration issues after the Syrian Civil War, Brexit, and Trump

    Sharad Joshi: Sub-state actors' threats to international security : religious extremists and terrorist groups

    Colin P. Clarke: Organized crime and trafficking : mapping out the threats and actors to find solutions

    Serena Simoni: Transnational organized crime and globalization : godmothers of the Mafia and the undermining of the Italian state and society

    Christian-Marc Lifländer: Emerging threats in cyber space : the next domain of warfare

    Daniel Addington and Mike Manrod: Cyber threats and solutions for the private sector

    Jason Sebastiani, Joe Sanchez and Mike Manrod: Threats from STEM

    Khalid Bachkar and Lui Hebron: Risk and uncertainty in the global container supply chain

    Crister S. Garrett: Steeped in insecurity? : democracy, conflict, and the threat of populist security

  25. J2EE security for servlets, EJBs and web services
    applying theory and standards to practice
    Published: 2004
    Publisher:  Prentice Hall PTR, Upper Saddle River, NJ

    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 03 B 7793
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0131402641
    Subjects: Computer security; Web services; Servlets; Java (Computer program language)
    Scope: xxvi, 426 S