The Melissa Virus

The Melissa Virus

Author: United States. Congress. House. Committee on Science. Subcommittee on Technology

Publisher:

Published: 1999

Total Pages: 120

ISBN-13:

DOWNLOAD EBOOK


Malicious Mobile Code

Malicious Mobile Code

Author: Roger Grimes

Publisher: "O'Reilly Media, Inc."

Published: 2001-06

Total Pages: 548

ISBN-13: 9781565926820

DOWNLOAD EBOOK

Viruses today are more prevalent than ever and the need to protect the network or company against attacks is imperative. Grimes gives strategies, tips and tricks needed to secure any system. He explains what viruses can and can't do, and how to recognize, remove and prevent them.


Safe and Secure

Safe and Secure

Author: Arman Danesh

Publisher: Sams Publishing

Published: 2002

Total Pages: 386

ISBN-13: 0672322439

DOWNLOAD EBOOK

Timely, expert advice is given for keeping a broadband safe as bestselling author Arman Danesh helps non-technical persons in their efforts to ensure that their SOHO broadband connections are secure. He explains personal Internet security in layman's terms, with careful consideration given to the reality of the SOHO environment.


West Nile Virus

West Nile Virus

Author: Melissa Abramovitz

Publisher: Greenhaven Publishing LLC

Published: 2013-01-14

Total Pages: 114

ISBN-13: 1420510975

DOWNLOAD EBOOK

As new cases of West Nile Virus begin to appear across the United States, this book offers a timely discussion of this potentially devastating disease. Author Melissa Abramovitz outlines the mechanics of virus transmission and how mosquitoes and disease-carrying birds have played a key role in the West Nile Virus epidemic. This book covers basic information about the virus and its possible effects, as well as a discussion of personal and governmental prevention plans. The last chapter focuses on treatments currently in development.


Foundations of Computer Security

Foundations of Computer Security

Author: David Salomon

Publisher: Springer Science & Business Media

Published: 2006-03-20

Total Pages: 390

ISBN-13: 1846283418

DOWNLOAD EBOOK

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader’s knowledge - answers are also provided. Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.


Cyber Forensics

Cyber Forensics

Author: Jr., Albert Marcella

Publisher: CRC Press

Published: 2002-01-23

Total Pages: 466

ISBN-13: 142000011X

DOWNLOAD EBOOK

Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence o


Auditing Information Systems

Auditing Information Systems

Author: Jack J. Champlain

Publisher: John Wiley & Sons

Published: 2003-04-01

Total Pages: 450

ISBN-13: 0471466298

DOWNLOAD EBOOK

Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing computer systems--the tools necessary to implement an effective IS audit. In nontechnical language and following the format of an IS audit program, you'll gain insight into new types of security certifications (e.g., TruSecure, CAP SysTrust, CPA WebTrust) as well as the importance of physical security controls, adequate insurance, and digital surveillance systems. Order your copy today!


The Privacy Papers

The Privacy Papers

Author: Rebecca Herold

Publisher: CRC Press

Published: 2001-12-20

Total Pages: 709

ISBN-13: 1420000179

DOWNLOAD EBOOK

Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears about how information collected by Web sites will be used or misused. They also involve broader issues, including data collected for direct response marketing, privacy of financial and health records,


Cybercrime

Cybercrime

Author: Susan W. Brenner

Publisher: Bloomsbury Publishing USA

Published: 2010-02-26

Total Pages: 294

ISBN-13: 0313365474

DOWNLOAD EBOOK

This fascinating and timely book traces the emergence and evolution of cybercrime as an increasingly intransigent threat to society. Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it. Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement's ability to pursue cybercriminals and protecting the privacy of U.S. citizens.


The SAGE Encyclopedia of Business Ethics and Society

The SAGE Encyclopedia of Business Ethics and Society

Author: Robert W. Kolb

Publisher: SAGE Publications

Published: 2018-03-27

Total Pages: 4074

ISBN-13: 148338151X

DOWNLOAD EBOOK

Spans the relationships among business, ethics, and society by including numerous entries that feature broad coverage of corporate social responsibility, the obligation of companies to various stakeholder groups, the contribution of business to society and culture, and the relationship between organizations and the quality of the environment.