A more secure login
Title | A more secure login PDF eBook |
Author | |
Publisher | |
Pages | 15 |
Release | |
Genre | |
ISBN |
Practical UNIX and Internet Security
Title | Practical UNIX and Internet Security PDF eBook |
Author | Simson Garfinkel |
Publisher | "O'Reilly Media, Inc." |
Pages | 989 |
Release | 2003-02-21 |
Genre | Computers |
ISBN | 1449310125 |
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
Access to Online Resources
Title | Access to Online Resources PDF eBook |
Author | Kristina Botyriute |
Publisher | Springer |
Pages | 45 |
Release | 2018-03-13 |
Genre | Language Arts & Disciplines |
ISBN | 3319739905 |
This book is published open access under a CC BY 4.0 licence.The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved in managing access to online resources. After an introduction the book presents cases of general authentication and authorisation. It helps readers understand web based authentication and provides the fundamentals of IP address recognition in an easy to understand manner. A special chapter is dedicated to Security Assertion Markup Language (SAML), followed by an overview of the key concepts of OpenID Connect. The book concludes with basic troubleshooting guidelines and recommendations for further assistance. Librarians will benefit from this quick and easy read, which demystifies the technologies used, features real-life scenarios, and explains how to competently employ authentication and access management.
ASP.NET 2.0
Title | ASP.NET 2.0 PDF eBook |
Author | Wei-Meng Lee |
Publisher | "O'Reilly Media, Inc." |
Pages | 348 |
Release | 2005 |
Genre | Computers |
ISBN | 0596008120 |
To bring you up to speed with ASP.NET 2.0, this text offers nearly 50 hands-on projects. Each one explores a new feature of the language, with emphasis on changes that can increase productivity, simplify programming tasks and help you add new functionality to your applications in an informal, code-intensive style.
Lean CX
Title | Lean CX PDF eBook |
Author | Robert Dew |
Publisher | Walter de Gruyter GmbH & Co KG |
Pages | 238 |
Release | 2021-04-06 |
Genre | Business & Economics |
ISBN | 311068392X |
In recent years, many companies have realised customer experience (CX) is the new marketing battle ground. Substantial investments have been made to map customer journeys, identify pain points and improve CX to try and create cut-through. Using real world applications to introduce next generation design tools based on proven concepts from strategy, marketing, psychology and creative problem solving, Lean CX: How to Differentiate at Low Cost and Least Risk discusses how to use Lean Management approaches to innovate your customer experience. This practical book describes how the tools from Lean Management can be applied to the CX innovation problem. The authors draw on hundreds of CX design and strategic innovation projects across a range of industries, both B2B and B2C, from primary research through client work and secondary case studies available in the public domain. The examples include many different vertical industry sectors, including those involving hybrid business models. The cases included share what worked really well and where CX failed. The content goes beyond what actually happened to present an idea of what might be possible with the right design approach and committed resources.
Financial Cryptography and Data Security
Title | Financial Cryptography and Data Security PDF eBook |
Author | Jim Blythe |
Publisher | Springer |
Pages | 151 |
Release | 2012-10-17 |
Genre | Computers |
ISBN | 3642346383 |
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions.
Fundamentals of Information Systems Security
Title | Fundamentals of Information Systems Security PDF eBook |
Author | David Kim |
Publisher | Jones & Bartlett Publishers |
Pages | 571 |
Release | 2016-10-15 |
Genre | Computers |
ISBN | 128411645X |
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification.