Notice: Undefined property: stdClass::$formattedPrice in /home/ebooks-gratuits/public_html/sources/getbingweb.php on line 166

Notice: Undefined property: stdClass::$formattedPrice in /home/ebooks-gratuits/public_html/sources/getbingweb.php on line 166

Notice: Undefined property: stdClass::$formattedPrice in /home/ebooks-gratuits/public_html/sources/getbingweb.php on line 166
Security - ebooks-gratuits.me



Lancer votre recherche de document sur le web et trouver tous les livres correspondants
Menu



Top 20


20 Nouveautés


Liste

Résultats pour

Security

(Temps écoulé : 1.1201)
Liens Sponsorislés


Farming
Climate
1 Food Security, Farming, and Climate Change to 2050 - Gerald C. Nelson, Mark W. Rosegrant, Amanda Palazzo, Ian Gray, Christina Ingersoll, Richard Robertson, Simla Tokgoz, Tingju Zhu, Timothy B. Sulser, Claudia Ringler, Siwa Msangi & Liangzhi You
Auteur : Gerald C. Nelson, Mark W. Rosegrant, Amanda Palazzo, Ian Gray, Christina Ingersoll, Richard Robertson, Simla Tokgoz, Tingju Zhu, Timothy B. Sulser, Claudia Ringler, Siwa Msangi & Liangzhi You
Genre : Sciences de la Terre
As the global population grows and incomes in poor countries rise, so too, will the demand for food, placing additional pressure on sustainable food production. Climate change adds a further challenge, as changes in temperature and precipitation threaten agricultural productivity and the capacity to feed the world’s population. This study assesses how serious the danger to food security might be and suggests some steps policymakers can take to remedy the situation.

Using various modeling techniques, the authors project 15 different future scenarios for food security through 2050. Each scenario involves an alternative combination of potential population and income growth and climate change. The authors also examine the specific test case of a hypothetical extended drought in South Asia, to demonstrate the possible effects of increased climate variability on a particular worl

Gratuit

Rencontre
Explosive
2 Rencontre explosive - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
Victime d’un kidnapping en Colombie, Elektra Winthrop est une jeune femme pleine de caractère. Arrachée aux mains de ses ravisseurs par un commando d’anciens militaires, elle s’éprend du chef de l’équipe.Leur relation va s’avérer pour le moins tendue. Elle le trouve très arrogant. Il la considère comme une enfant gâtée.Après une nuit torride, elle croit l’avoir conquis. Mais au petit matin, il a disparu.

Sa réapparition six mois plus tard ne sera pas sans surprise.

7,99 €
3 Liens Sponsorislés

4 Escort girl - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
Crystal Sherman, jeune étudiante en journalisme, arrondit sa bourse d'études en accompagnant de riches messieurs à des soirées. Lors de l'un de ces dîners, elle est témoin d'un meurtre perpétré par Randall Scott, Sénateur des Etats-Unis et candidat à la Maison Blanche ! En cavale pour échapper aux hommes de main du Sénateur, elle va bénéficier de l'aide de l'équipe de Greyson Security et tomber amoureuse du frère de sa colocataire qui travaille pour l'agence. Poursuites, enlèvements... sa petite vie tranquille tourne vite au cauchemar.

Jusqu’où est prêt à aller Scott pour s’assurer du silence de la jeune femme ?


5 Security for Linux on System z - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful. This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve. The base for a secure system is tightly related to the way the architecture and virtualization has been

Gratuit

Compliance
Management
Information
Manager
6 IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting. In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information an

Gratuit

7 L'envers du décor - Sean Black
Auteur : Sean Black
Genre : Roman noir
À PROPOS

Tout juste de retour de leur mission d’infiltration dans la prison de Pelican Bay Supermax, au nord de la Californie, l’agent de protection rapprochée Ryan Lock et son associé Ty Johnson se retrouvent à Los Angeles pour assurer la sécurité d’une actrice d’Hollywood. La jeune femme craint en effet les représailles d’un petit ami violent, lui aussi star du grand écran, qui refuse d’accepter la fin de leur relation. Or comme Lock ne le sait que trop bien, et comme Ty va le découvrir, protéger quelqu’un envers et contre tout peut se révéler plus difficile qu’il n’y parait, et le danger peut surgir sous des formes auxquelles on ne s’attendait pas. 

Cette nouvelle, d’environ 15 000 mots, peut tout à fait être lue indépendamment des autres livres de la série Ryan Lock, de même que chacun des romans. Pour les lecteurs s

2,99 €

Verizon
Investigations
8 Verizon 2012 Data Breach Investigations Report - Members of the Verizon RISK Team, the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-Crime Unit of the London Metropolitan Police & the United States Secret Service
Auteur : Members of the Verizon RISK Team, the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-Crime Unit of the London Metropolitan Police & the United States Secret Service
Genre : Ouvrages de référence
An in-depth examination of stolen data records using information collected from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-Crime Unit of the London Metropolitan Police, and the United States Secret Service.  In all, we analyze more than 850 breaches using a significantly expanded data set, providing an improved global perspective.

Gratuit

Enterprise
9 Making the Cloud Secure for Your Enterprise - Ellen Rubin
Auteur : Ellen Rubin
Genre : Informatique et Internet
Many companies would like to take advantage of cloud computing, but concerns about possible security breaches and loss of data hold them back. For cloud computing to gain traction in the enterprise, IT and security executives need to be certain that their company’s applications and data are safe. But when security is partly out of enterprise control, it becomes impossible to know if sensitive information has been accessed or compromised. 

This microbook provides insights into how to approach security in the cloud.

Gratuit

Management
10 The State of Risk-Based Security Management - Tripwire Inc
Auteur : Tripwire Inc
Genre : Réseau
Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of RBSM in the US. Discover the study’s key findings:

- Although organizations profess a strong commitment to RBSM, they’re taking little action

- Those organizations with a formal approach to RBSM tend to walk the talk

- Most organizations implement the appropriate preventive controls, but neglect to implement sufficient detective controls

- Position level of the respondent in the organization affects how threats rank on their "Security Fright Index"

- How perceptions of RBSM differ in the US, the UK, Germany and the Netherlands

Gratuit

11 Blogue-Out - Jean-Hugues Roy
Auteur : Jean-Hugues Roy
Genre : Politique et actualité
Il y a 10 ans, les artisans de l'information de Radio-Canada au Québec et à Moncton (Nouveau-Brunswick) étaient mis en lock-out pendant deux mois. Au jour le jour, un site web d'un genre encore nouveau pour 2002, a fait la chronique du conflit. Relire Blogue-out en 2012, c'est redécouvrir la précarité érigée en système, c'est se souvenir du sens de la solidarité, c'est replonger dans la complexité d'un conflit de travail, où tout n'est ni blanc, ni noir.

Gratuit

Maximum
12 Maximum Security - Robert Muchamore
Auteur : Robert Muchamore
Genre : Policier et mystère
Over the years, CHERUB has put plenty of criminals behind bars. Now, for the first time ever, they've got to break one out ...

Under American law, kids convicted of serious crimes can be sentenced as adults. Two hundred and eighty of these child criminals live in the sunbaked desert prison of Arizona Max. In one of the most dangerous CHERUB missions ever, James Adams has to go undercover inside Arizona Max, befriend an inmate and then bust him out.

CHERUB kids are trained professionals, working in everyday situations. Their essential advantage: adults never suspect that children are spying on them.

For official purposes, these children do not exist.

5,49 €

Introduction
Artificial
Intelligence
Professionals
13 Introduction to Artificial Intelligence for Security Professionals - Cylance Data Science Team
Auteur : Cylance Data Science Team
Genre : Ordinateurs
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve you ability to thrive in a data driven world. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” And make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today.

Gratuit

Network
Intrusion
Prevention
Network
14 Network Intrusion Prevention Design Guide: Using IBM Security Network IPS - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. Therefore, the first line of defense is to establish proper network security. This security is a prerequisite for a logical set of technical countermeasures to protect from many different attack vectors that use the network to infiltrate the backbone of an organization. The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats before they can impact the business operations of an organization. Preemptive protection, which is protection that works ahead of a threat, is available by means of a combination of line-speed performance, security intelligence, and a modular protection engine that enables security convergence. By c

Gratuit

Nouveau
15 Un nouveau départ - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
Katherine Greyson, la petite sœur de Charles, patron de Greyson Security, a toujours eu le chic pour se fourrer dans les ennuis.
Lorsque son petit ami Brandon conclut un marché avec le caïd de la pègre new yorkaise, Franco Di Baptista, afin de régler sa dette auprès de lui, elle s’enfuit et tente d’aller retrouver son frère.
Rattrapée en chemin par les sbires de Di Baptista, elle est vendue aux enchères à un richissime Prince arabe comme esclave sexuelle.
Enfermée dans son palais comme ses autres possessions féminines, elle tombe amoureuse de son geôlier.

Enfin délivrée par les hommes de son frère, elle se retrouve confrontée à un dilemme : oublier le Prince ou accepter de vivre avec lui.


Attraction
Colombienne
16 Attraction colombienne - Sylvie Roca-Geris
Auteur : Sylvie Roca-Geris
Genre : Thriller
À la minute où il apprend que Daniel Gray ex-employé et traitre a quitté son paradis pour la Colombie, Charles Greyson lance une opération destinée à aller le récupérer.

Devenu chef de la sécurité d’un homme richissime et sans scrupules, Gray n’a pas l’intention de se laisser ramener aux Etats-Unis. Cette mission pas sans danger va bouleverser la vie de Greyson. Sa rencontre avec une belle Colombienne va mettre à mal ses convictions de célibataire endurci.

Exposée à la vengeance de son patron, la jeune femme va devoir faire un choix. Mourir ou quitter son pays.
L’attirance qu’elle éprouve pour cet Américain sûr de lui sera-t-elle une raison suffisante pour tout abandonner ?


Mainframe
Management
Zsecure
17 IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security serv

Gratuit

Administration
Configuration
18 Administration: Configuration and Security - MicroStrategy University
Auteur : MicroStrategy University
Genre : Ordinateurs
The MicroStrategy Administration: Configuration and Security course provides an overview of the administrative tasks involved in configuring and securing a MicroStrategy environment and all the administration tasks a MicroStrategy administrator usually performs. The students will learn about topics such as connectivity, security, authentication, in-memory storage, clustering, and MicroStrategy Health Center. Students will also learn about the tuning and the basics of managing Intelligence Server memory usage.

Gratuit

Management
Patterns
Manager
19 IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-oriented infrastructure; expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation. First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security implementation. Second, common re-usable security services are foundational building blocks for SOA environments, providing the ability to secure data and applications. Consistent IT Security Services that can be used by different components of an SOA run time are required. Point solutions are not scalabl

Gratuit

Computing
20 The Quick Guide to Cloud Computing and Cyber Security - Marcia R.T. Pistorious
Auteur : Marcia R.T. Pistorious
Genre : Ordinateurs
This is a Quick Guide to Cloud Computing and Cyber Security - For Beginners.


Cloud computing has appeared in many small forms and now it is emerging as a huge solution to the problem of the fast changing and increasingly cyber world in which we live and work.

Table of Contents

What is Cloud Computing?
Types of Cloud Computing
Cloud Computing Examples
Cyber Security
Cyber Security Dangers
Physical Security
Layers of Security
Network Security
Cloud Computing and Security Threats
The Need for Policies
The Future?
Summary

In this book, cloud computing and cyber security is described in a way that covers all sizes and implementations of businesses involved in using this method of computing.

Gratuit

Seducing
21 Seducing Ethan (Knight Security 6) - Carole Mortimer
Auteur : Carole Mortimer
Genre : Romans et littérature
Seducing Ethan (Knight Security 6) is the 7th and LAST book in USA Today Bestselling author, Carole Mortimer’s, Amazon #1 Knight Security series. This is a spin-off series to the #1 Bestselling Alpha Series, so come and say hi to old friends and meet a lot of new ones.

Includes BONUS novella – Resisting Alexandre (Knight Security 0.5)

Be sure to look for Carole Mortimer’s NEW contemporary series, Hearts of Steele, coming soon!

Author’s Note: The stories in the Knight Security, Alpha, Regency Unlaced, and Regency Sinners series have stronger sexual content and language than my other books. These books have the UNICORN LOGO.

Returning from a late night swim and discovering someone waiting for him in the darkness of his finca is the last thing Ethan was expecting. Discovering that someone to be Talia Krechenko, is even more unwelcome.

2,99 €

Understanding
Implementation
22 Understanding SOA Security Design and Implementation - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Securing access to information is important to any business. Security becomes even more critical for implementations structured according to Service-Oriented Architecture (SOA) principles, due to loose coupling of services and applications, and their possible operations across trust boundaries. To enable a business so that its processes and applications are flexible, you must start by expecting changes – both to process and application logic, as well as to the policies associated with them. Merely securing the perimeter is not sufficient for a flexible on demand business. In this IBM Redbooks publication, security is factored into the SOA life cycle reflecting the fact that security is a business requirement, and not just a technology attribute. We discuss an SOA security model that captures the essence of security services and securing services. These approaches to SOA security are

Gratuit

Affaire
23 À fleur de peau L'affaire Raven Lane - Sean Black
Auteur : Sean Black
Genre : Policier et suspense
L'actrice Raven Lane est l'une des femmes les plus convoitées d'Amérique, comme en témoignent ses millions de fans. Mais lorsqu'un cadavre sans tête est retrouvé dans le coffre de sa voiture, elle prend conscience du prix amer de la célébrité.

Craignant pour sa vie, et devant l'impuissance de la police à la protéger, Raven fait appel au garde du corps d'élite Ryan Lock. Lock a toujours défendu les faibles contre les forts, mais pourra-t-il cette fois mettre un terme à la vague de violence qui menace désormais de s'abattre sur la ville de Los Angeles, alors que le prédateur de Raven décide d'éliminer tous ceux qui s'approchent d'elle  ? 

Les événements deviennent vite incontrôlables, et Lock est entraîné dans un monde dangereux où l'argent est roi, où le sexe se monnaie et où il ne doit faire confiance à personne – et encore mo

5,99 €

Macroeconomics
Agriculture
24 Macroeconomics, Agriculture, and Food Security - Eugenio Díaz-Bonilla
Auteur : Eugenio Díaz-Bonilla
Genre : Économie
Why write a book on macroeconomic policies and their links to agriculture and food security in developing countries? The food price spikes of the years just prior to 2010 and the economic, political, and social dislocations they generated refocused the attention of policymakers and development practitioners on the agricultural sector and food security concerns. But even without those traumatic events, the importance of agriculture for developing countries—and for an adequate functioning of the world economy— cannot be denied. First, although declining over time, primary agriculture still represents important percentages of developing countries’ overall domestic production, exports, and employment. If agroindustrial, transportation, commercial, and other related activities are also counted, then the economic and social importance of agriculture-based sectors increases significantly.

Gratuit

Framework
Blueprint
Realize
Business
25 Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever.

This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security.

To help organizations with their security challenges, IBM cr

Gratuit

Convenience
26 Security Vs. Convenience - Michael Reeves
Auteur : Michael Reeves
Genre : Ordinateurs
The inter workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these book help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical manager, computer security novices, and systems administrators looking to broaden their knowledge.

Security vs. Convenience tackles the ever prominent balance between securing a network and its information and the business needs for which the network exists.

Gratuit

Journalist
27 CPJ Journalist Security Guide - Frank Smyth & Danny O'Brien
Auteur : Frank Smyth & Danny O'Brien
Genre : Ouvrages de référence
The world is an increasingly dangerous place for journalists. Each year, dozens are killed and thousands are imprisoned, attacked, or threatened. Digital technology enables governments and criminals to monitor journalists and intercept their communications. And today more freelancers than ever are reporting on the front lines of major stories—with most responsible for their own preparation, equipment, and care. 

The CPJ Journalist Security Guide provides detailed advice to local and international journalists of all experience levels. Written by experts with the Committee to Protect Journalists, a nonprofit organization that defends journalists worldwide, the guide outlines basic preparedness for new reporters taking on their first assignments. It offers refresher information for seasoned journalists returning to the field. And it provides advice on complex issues such

Gratuit

Beginner
Information
28 Beginner's Guide to Information Security - Limor Elbaz
Auteur : Limor Elbaz
Genre : Ordinateurs
The Beginner’s Guide to Information Security offers insight and resources to help readers embark on a career in one of the 21st century’s most important—and potentially lucrative—fields. Maybe you want to move into information security from IT, say, from a developer or system administrator role. Or maybe you just graduated with your bachelor’s or master’s degree. Whatever your education or prior experience, this book can offer you a great start, with advice from real people who are working in the InfoSec field. 
It starts off with some chapters that cover ways to learn about information security, maybe pick up a certification or two, find out about job opportunities, and then, hopefully, snag a job. The Beginner’s Guide also delves deeper into InfoSec topics, helping readers master key skills like knowing how to protect a network, respond to a security i

Gratuit

Managing
Compliance
Virtualized
Centers
Powersc
29 Managing Security and Compliance in Cloud or Virtualized Data Centers Using IBM PowerSC - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
IBM® PowerSC provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems™ servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security used in conjunction with solutions such as PowerSC makes IBM the premier security vendor in the market today. This IBM Redbooks® deliverable helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM.

Gratuit

Endpoint
Compliance
Management
Endpoint
Manager
30 Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging. The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage their global IT infrastructures faster and more accurately, resulting in improved governance, control, visibility, and business agility. Plus, it gives organizations the ability to handle tomorrow's unforeseen challenges. In this IBM Redbooks® publication, we provide IT security professionals wi

Gratuit

Managing
Information
31 Managing Risk and Information Security - Malcolm Harkins
Auteur : Malcolm Harkins
Genre : Ordinateurs
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk.
With ApressOpen, content is freely available through multiple online distribu

Gratuit

Enterprise
Architecture
Solutions
32 Enterprise Security Architecture Using IBM Tivoli Security Solutions - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory Integrator, Tivoli offers a complete set of products designed to address these challenges. This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Ti

Gratuit

Practical
33 The Practical Guide To Mac Security - Gary Rosenzweig
Auteur : Gary Rosenzweig
Genre : Ordinateurs
Learn how to protect your Mac and yourself in an online world. The Practical Guide to Mac Security teaches you how to stay safe online. Learn how to create and use strong passwords to prevent your accounts from being hacked. Find out if you need antivirus software and how you can protect your Mac against malware. Read about scams and cons that try to trick you into granting access to your Mac or installing malware. Learn how to back up your Mac and protect your files and data from disasters.
This book is a guide for the practical Mac user. This is for those who want to buy things online, share over social media and travel with their Mac while maintaining a decent level of security. I’ll show you common sense techniques for staying safe online. The idea is not to build a wall around you, but to learn how to look out for problems and avoid common security pitfalls.
Gratuit

Attempt
Impeach
Declassified
Government
Documents
Investigation
Russian
Election
Interference
Legislative
Procedures
Impeachment
34 Attempt to Impeach Donald Trump - Declassified Government Documents, Investigation of Russian Election Interference & Legislative Procedures for the Impeachment - White House, Federal Bureau of Investigation, National Security Agency, U.S. Congress, National Intelligence Council & Elizabeth B. Bazan
Auteur : White House, Federal Bureau of Investigation, National Security Agency, U.S. Congress, National Intelligence Council & Elizabeth B. Bazan
Genre : Droit
Since the beginning of his presidential term president Donald Trump is faced with constant criticism for his business projects in Russia and his connections with the Russian authorities. On June 12th 2017 US Congressman Brad Sherman submitted the Resolution for Impeaching Donald John Trump, President of the United States, for high crimes and misdemeanors. This book presents the latest investigation results, declassified documents, transcripts and reports of various US security agencies and other actors involved in the investigation of the Russian Interference in the 2016 United States Elections and the connection of the American president with the Russian Government. This book will provide all necessary information on the event that can easily turn out to be the biggest political scandal in the modern American history.
Contents:
Impeachment: An Overview of Constitutional Provis

0,49 €

Administration
Configuration
35 Administration: Configuration and Security - MicroStrategy University
Auteur : MicroStrategy University
Genre : Ordinateurs
The MicroStrategy Administration: Configuration and Security course provides an overview of the administrative tasks involved in configuring and securing a MicroStrategy environment and all the administration tasks a MicroStrategy administrator usually performs. The students will learn about topics such as connectivity, security, authentication, in-memory storage, clustering, and MicroStrategy Health Center. Students will also learn about the tuning and the basics of managing Intelligence Server memory usage.

Gratuit

36 The Quest - Daniel Yergin
Auteur : Daniel Yergin
Genre : Affaires internationales
The Quest continues the riveting story Daniel Yergin began twenty years ago with his No.1 International Bestseller The Prize, revealing the on-going quest to meet the world's energy needs - and the power and riches that come with it.

A master story teller as well as our most expert analyst, Yergin proves that energy is truly the engine of global political and economic change. From the jammed streets of Beijing, the shores of the Caspian Sea, and the conflicts in the Middle East, to Capitol Hill and Silicon Valley, Yergin tells the inside stories of the oil market, the rise of the 'petrostate', the race to control the resources of the former Soviet empire, and the massive corporate mergers that have transformed the oil landscape. He shows how the drama of oil - the struggle for access to it, the battle for control, the insecurity of supply, its impact on the globa

10,99 €

Creating
Trusted
Network
Homeland
37 Creating a Trusted Network for Homeland Security - The Markle Foundation
Auteur : The Markle Foundation
Genre : Ouvrages de référence
The Markle Task Force on National Security in the Information Age provides guidelines and recommendations for the creation and implementation of a trusted information sharing network for homeland security. The Markle Task Force wrote, "In this report, we reaffirm the principles of our first report and offer greater detail on how we believe the government should create networks for information collection, sharing, analysis, and use across federal, state, and local agencies and the private sector, while preserving—and even enhancing—privacy and other civil liberties."

Gratuit

Kickstart
38 Kickstart Security: macOS Mojave - Austin Lasota
Auteur : Austin Lasota
Genre : Administration des systèmes
Kickstart Security: macOS Mojave, covers generalized topics regarding the security of Macs in a touch and go fashion. The foundations are set, and relevant bricks laid out to build up your knowledge. The Kickstart Security series values brevity, focusing on the info you need to start securing Macs as fast as possible.

Gratuit

39 Rape of the lock. French - Alexander Pope
Auteur : Alexander Pope
Genre : Poésie
Le viol de l'écluse est le poème narratif maquette héroïque écrite par Alexander Pope, publié anonymement dans divers poèmes et traductions de Lintot mai 1712 dans deux chants (334 lignes), mais ensuite révisé, élargi et réédité en édition «écrit par M. Pope "le 4 Mars 1714.

Gratuit

40 The Rape of the Lock and Other Poems - Alexander Pope
Auteur : Alexander Pope
Genre : Poésie
It has been the aim of the editor in preparing this little book to get together sufficient material to afford a student in one of our high schools or colleges adequate and typical specimens of the vigorous and versatile genius of Alexander Pope. With this purpose he has included in addition to The Rape of the Lock, the Essay on Criticism as furnishing the standard by which Pope himself expected his work to be judged, the First Epistle of the Essay on Man as a characteristic example of his didactic poetry, and the Epistle to Arbuthnot, both for its exhibition of Pope's genius as a satirist and for the picture it gives of the poet himself. To these are added the famous close of the Dunciad, the Ode to Solitude, a specimen of Pope's infrequent lyric note, and the Epitaph on Gay. The first edition of The Rape of the Lock has been given as an appendix in order that the student may have the op

Gratuit

Integrating
Solutions
41 Integrating IBM Security and SAP Solutions - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBM® Redbooks® publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM Tivoli® Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for

Gratuit

Paranormal
Intelligence
42 Act of Mercy: Paranormal Security and Intelligence - Mandy M. Roth
Auteur : Mandy M. Roth
Genre : Paranormal
Paranormal Security and Intelligence Operative Duke Marlow has a new mission: find, interrogate and possibly eliminate the target—Mercy Deluca. He knows looks can be deceiving, but it's hard to believe the beautifully quirky woman running around in a superhero t-shirt is a viable threat. The sexy little biomedical engineer quickly proves she is more than he bargained for and Intel has it all wrong—she's not the enemy. Far from it. Intel also forgot to mention one vital piece of information—she's Duke's mate. This immortal alpha werewolf doesn't take kindly to her being in danger.

When Mercy accepted a position within The Corporation she thought it was to help cure disease and to make a difference for mankind. She had no idea what her new career path truly entailed—monsters masquerading under the guise of scientific research. Unable to stomach the atrocities she's uncov

4,49 €

Terrorism
Violent
Extremism
Awareness
43 Terrorism and Violent Extremism Awareness Guide - National Security Awareness Program
Auteur : National Security Awareness Program
Genre : Éducation
Terrorism is an intricate question that represents the main threat to national security in Canada. It is essential for everyone to better understand and recognize this phenomenon. In this spirit, the Royal Canadian Mounted Police (RCMP) and the Canadian Association of Chiefs of Police (CACP) has developed this electronic book. The emergence of social media and our global communications environment remind us more than ever of the importance of being vigilant and aware of our surroundings. The virtual removal of geographical boundaries has facilitated the spread of radicalization to violence.
This electronic book provides easy access at all times to a host of information on terrorism and extremism in Canada. This national security awareness tool was designed both for front line responders and the general public.
Sections of the Guide:
- Radicalization: Deals with radicali

Gratuit

Implementing
Trusted
Information
Sharing
Environment
44 Implementing a Trusted Information Sharing Environment - The Markle Foundation
Auteur : The Markle Foundation
Genre : Ouvrages de référence
In this report, the Markle Task Force on National Security in the Information Age explores the use of immutable audit logs (IALs) to improve confidence and trust in the shared information environment (ISE) and thereby promote ISE's widespread adoption. The Markle Task Force explains, "The ability to maintain tamper-resistant logs of user activity on the network can increase security, build trust among users, ensure compliance with relevant policies and guidelines, and improve transparency and the ability to perform oversight by appropriate stakeholders outside of the system." In addition to defining IALs and identifying the benefits of this process, this report also offers considerations for the implementation process and recommendations for related policy.

Gratuit

Resistance
Computer
45 The Path of Least Resistance: Computer Security Is Common Sense - Michael Reeves
Auteur : Michael Reeves
Genre : Ordinateurs
The inter-workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these books help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical managers, computer security novices, and systems administrators looking to broaden their knowledge.

The Path of Least Resistance approaches network defense by addressing the methodology of attacking a network.  Attackers plan their attacks to be swift and targeted to minimize the chance of being caught.  By identifying the weakest links and hardening them, the entire chain-mail of security is

Gratuit

Trouble
46 Trouble in a Tight Dress - Lori Sjoberg
Auteur : Lori Sjoberg
Genre : Thriller
Former Marine Austin Flint knows all about trouble. He fought it in Afghanistan, and now he battles it at home as the head of Six Points Tactical & Security. In his line of work, he can’t afford to be distracted by anything…or anyone, and that includes Nina Petrova, his cyber security expert. She’s got a chip on her shoulder, a smart mouth. And a body that just doesn’t quit. She’s also his employee, which makes her off limits, no matter how badly he wants her. But when her life is threatened by the Russian mafia, he’ll do what it takes to protect her, even if that means breaking his own code of honor and claiming her as his own.

Trouble is, he doesn’t know about her past, and what he doesn’t know might get them both killed.

Gratuit

Mediterranean
47 Africa and the Mediterranean - Andrea Dessì, Dario Cristiani, Wolfgang Mühlberger & Giorgio Musso
Auteur : Andrea Dessì, Dario Cristiani, Wolfgang Mühlberger & Giorgio Musso
Genre : Politique et actualité
This study takes stock of the current security dynamics across the Southern Mediterranean and African Sahel since the advent of the Arab uprisings. In so doing, it widens the scope of analysis from a purely North African focus to a more in-depth understanding of the profound links connecting the Mediterranean, Africa, and the wider Arab world. By focusing on three specific components — the African Sahel region, post-Gaddafi Libya, and Egypt’s African policy under the Muslim Brotherhood — the study sheds light on the deeply intertwined nature of the security threats that have arisen across this area and the impossibility of decoupling events occurring in the Maghreb from those taking place further south in the African Sahel region.

Gratuit

Tanzania
48 Cyber Security in Tanzania - Asherry Magalla
Auteur : Asherry Magalla
Genre : Droit
The reason as to why I decided to write this book is the fact that many of us lives with a belief that we have only four common domains in this world, which are land, sea, air and outer space. But currently due to the development of science and technology a fifth common domain has been created, and that is cyberspace. This new common domain creates a new environment for the commission of crimes known as cyber crimes. And because of its nature, it became difficult to deal with these natures of crimes. The widespread digital accessibility creates new opportunities for the unprincipled because the manners in which offenders commit crimes changed from traditional to digital means. A lot of currencies are lost by both businesses and consumers to computer-criminals. Fair enough, computers and networks can be used to harass victims or set them up for violent attacks such as to coordinate and ca

Gratuit

Communications
Implementation
Networking
49 IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe cap

Gratuit

Healthcare
50 Cyber-Security in Healthcare - John Gomez & Colin Konschak
Auteur : John Gomez & Colin Konschak
Genre : Ordinateurs
The February 2015 cyber-attack on Anthem, in which cyber-terrorists accessed 80 million member and employee records, exposed the vulnerability of the US healthcare system in a way no other attack—whether retail or healthcare—has.  In this ground breaking work, John Gomez, CEO of Sensato and Colin Konschak, CEO of Divurgent, explore the challenges that are quickly shaping the world of healthcare cyber-security and privacy.

Gratuit
Pas de Suggestions Relatives pour: Security