Department of Defense Dictionary of Military and Associated Terms
Title | Department of Defense Dictionary of Military and Associated Terms PDF eBook |
Author | United States. Joint Chiefs of Staff |
Publisher | |
Pages | 392 |
Release | 1979 |
Genre | Military art and science |
ISBN |
Dictionary of Acronyms and Technical Abbreviations
Title | Dictionary of Acronyms and Technical Abbreviations PDF eBook |
Author | Jakob Vlietstra |
Publisher | Springer Science & Business Media |
Pages | 703 |
Release | 2012-12-06 |
Genre | Computers |
ISBN | 1447102630 |
This Dictionary covers information and communication technology (ICT), including hardware and software; information networks, including the Internet and the World Wide Web; automatic control; and ICT-related computer-aided fields. The Dictionary also lists abbreviated names of relevant organizations, conferences, symposia and workshops. This reference is important for all practitioners and users in the areas mentioned above, and those who consult or write technical material. This Second Edition contains 10,000 new entries, for a total of 33,000.
A Dictionary of Information Security Terms, Abbreviations and Acronyms
Title | A Dictionary of Information Security Terms, Abbreviations and Acronyms PDF eBook |
Author | |
Publisher | It Governance Limited |
Pages | 104 |
Release | 2007-03 |
Genre | Business & Economics |
ISBN | 9781905356164 |
This Dictionary is an invaluable resource for people grappling with security terminology for the first time. Rather than a dry technical dictionary, the book is written in an accessible style that enables managers and novices to quickly grasp the meaning of information security terms. Example definitions: 'Bluesnarfing an attack on a Bluetooth enabled device that allows download of all contact details along with other information without leaving any trace of the attack.' 'Digital certificate (sometimes called a Server ID) is an encrypted file that attests to the authenticity of the owner of a public key, used in public key encryption; the certificate is created by a trusted third party known as a certificate authority (CA). The digital certificate is proven to be authentic because it decrypts correctly using the public key of the CA.' 'Pharming Criminal activity resulting in users being redirected from entered, correct website address t
The Information Security Dictionary
Title | The Information Security Dictionary PDF eBook |
Author | Urs E. Gattiker |
Publisher | Springer Science & Business Media |
Pages | 436 |
Release | 2006-04-18 |
Genre | Business & Economics |
ISBN | 1402079273 |
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection terms, without causing much damage to the usually slim student pocketbook. This dictionary can help non-specialistreaders better understand the infor- tion security issues encountered in their work or studying for their certification examination or whilst doing a practical assignment as part of a workshop. This book is also essential to a reference collection for an organization’s system personnel. Special attention is paid to terms which most often prevent educated readers from understanding journal articles and books in cryptology, computing science, and information systems, in addition to applied fields that build on those disciplines, such as system design, security auditing, vulnera- lity testing, and role-based access management. The dictionary provides defi- tions that enable readers to get through a difficult article or passage. We do not, for the most part, directly explain how to conduct research or how to implement the terms briefly described.
Glossary of Key Information Security Terms
Title | Glossary of Key Information Security Terms PDF eBook |
Author | Richard Kissel |
Publisher | DIANE Publishing |
Pages | 211 |
Release | 2011-05 |
Genre | Computers |
ISBN | 1437980090 |
This glossary provides a central resource of definitions most commonly used in Nat. Institute of Standards and Technology (NIST) information security publications and in the Committee for National Security Systems (CNSS) information assurance publications. Each entry in the glossary points to one or more source NIST publications, and/or CNSSI-4009, and/or supplemental sources where appropriate. This is a print on demand edition of an important, hard-to-find publication.
Information Technology Encyclopedia and Acronyms
Title | Information Technology Encyclopedia and Acronyms PDF eBook |
Author | Ejub Kajan |
Publisher | Springer Science & Business Media |
Pages | 708 |
Release | 2002-06-14 |
Genre | Computers |
ISBN | 9783540417934 |
Since the early days of information technology, professionals have developed an extraordinary huge amount of jargon, full of acronyms. This dictionary resolves more than 4,000 broadly used acronyms. It provides concise information, illustrated explanations, and numerous cross-references for the majority of technical terms. Most entries for acronyms that are associated with organizations, corporations, and conferences include Web links. All in all, the book constitutes an encyclopaedic documentation of information and communication technology organized by acronyms. An invaluable reference work for anybody who wants to stay on top of today's fast growing language of information technology.
Information Security Law
Title | Information Security Law PDF eBook |
Author | Thomas J. Smedinghoff |
Publisher | IT Governance Ltd |
Pages | 189 |
Release | 2008 |
Genre | Business & Economics |
ISBN | 1905356668 |
In today's business environment, virtually all of a company's daily transactions and all of its key records are created, used, communicated, and stored in electronic form using networked computer technology. Most business entities are, quite literally, fully dependent upon information technology and an interconnected information infrastructure. "Information Security Law: The Emerging Standard for Corporate Compliance" is designed to provide an overview to the law of information security and the standard for corporate compliance that appears to be developing worldwide.This book takes a high level view of security laws and regulations, and summarizes the global legal framework for information security that emerges from those laws. It is written from the perspective of a company that needs to comply with many laws in many jurisdictions, and needs to understand the overall framework of legal security requirements, so it can evaluate how local law fits in, and what it might do to become generally legally compliant in many jurisdictions and under many laws.