This accessible book examines the physical security of computer hardware, networks, and digital data, introduces different forms of rogue software, discusses methods for prevention and defense, and describes a selection of viruses, worms and Trojans in detail.
The rise of various demands in healthcare is driving innovation in healthcare information management. This book is the first comprehensive exploration into the challenges of e-healthcare information and security policy technologies.
When it comes to cyber security accidents, cyber situational awareness is knowing what happened and why it happened. This multidisciplinary volume offers the state-of-the-art in this field, covering fundamental challenges and identifying promising solutions.
Critical Information Infrastructures starts with some basic definitions and assumptions on the topic. It goes on to explore various aspects of Critical Infrastructures throughout the world – including the technological, political, economic, strategic and defensive.
Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.
This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. It details different countermeasures and their implementation.