Skip to main content

Books in Information systems general

21-30 of 45 results in All results

Decision Support Systems: Issues and Challenges

  • 1st Edition
  • October 22, 2013
  • Göran Fick + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 1 - 4 5 1 6 - 7
Decision Support Systems: Issues and Challenges covers the proceedings of the International Institute for Applied Systems Analysis (IIASA) International Task Force Meeting. The book reviews papers that tackle issues about decision support systems (DSS). Comprised of 17 chapters, the book organizes the chapters according to the topic of discussion, including framework, resource discipline, application experience, and issues for the future in DSS. The opening chapter is an introduction to the main topic of the book. Chapter 2 discusses frameworks for research on decision support systems, and Chapter 3 covers the decision support systems. The fourth chapter deals with organizational science contributions to the design of decision support systems, while the fifth chapter discusses using data bases for decision support. Chapter 6 tackles the overview of database technology in decision support systems, and Chapter 7 talks about doing and speaking in the office. The eighth chapter discusses a look back at an office of the future, while the ninth chapter covers the implications for research of installing a decision support system. Chapter 10 tackles the problems of design and implementation of computer-based decision support systems. Chapter 11 discusses an interactive modeling system for analysis of alternative decisions; Chapter 12 covers the structure of decision support systems. Chapters 13 to 15 review the group discussion during the conference about the issues for the future in DSS. This book will be of great interest to leaders, since it discusses the integration of technology in the interaction within an organization.

Job Reconnaissance

  • 1st Edition
  • September 20, 2013
  • Josh More
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 6 6 0 1 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 6 6 0 - 8
There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job. This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context. The emphasis in Job Reconnaissance is for infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success. These skills include targeting, reconnaissance and profiling combined with a technical look at skills other career search books commonly miss.

Managing Information Security

  • 2nd Edition
  • August 21, 2013
  • John Vacca
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 6 6 8 8 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 6 9 4 - 3
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.

System Parameter Identification

  • 1st Edition
  • July 17, 2013
  • Badong Chen + 3 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 4 5 9 5 - 8
Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing, investigating system identification from an information theory point of view. The book is divided into six chapters, which cover the information needed to understand the theory and application of system parameter identification. The authors’ research provides a base for the book, but it incorporates the results from the latest international research publications.

Risk Management Framework

  • 1st Edition
  • July 3, 2013
  • James Broad
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 9 5 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 4 7 2 3 - 5
The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization.

Windows 2012 Server Network Security

  • 1st Edition
  • March 19, 2013
  • Derrick Rountree
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 5 8 - 3
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 9 6 5 - 1
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. Windows 2012 Server Network Security provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8.

Applied Cyber Security and the Smart Grid

  • 1st Edition
  • February 26, 2013
  • Eric D. Knapp + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 9 8 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 4 6 3 8 - 2
Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.

Logging and Log Management

  • 1st Edition
  • November 29, 2012
  • Kevin Schmidt + 2 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 6 3 5 - 3
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 3 6 - 0
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity. The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical analysis; log data mining; visualizing log data; logging laws and logging mistakes; open source and commercial toolsets for log data collection and analysis; log management procedures; and attacks against logging systems. In addition, the book addresses logging for programmers; logging and compliance with regulations and policies; planning for log analysis system deployment; cloud logging; and the future of log standards, logging, and log analysis. This book was written for anyone interested in learning more about logging and log management. These include systems administrators, junior security engineers, application developers, and managers.

FISMA and the Risk Management Framework

  • 1st Edition
  • November 27, 2012
  • Daniel R. Philpott + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 6 4 1 - 4
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 4 2 - 1
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems.

Client-Side Attacks and Defense

  • 1st Edition
  • September 28, 2012
  • Sean-Philip Oriyano + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 5 9 0 - 5
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 5 9 1 - 2
Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich internet applications, and file format vulnerabilities. It also covers defenses, such as antivirus and anti-spyware, intrusion detection systems, and end-user education. The book explains how to secure Web browsers, such as Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. It discusses advanced Web attacks and advanced defenses against them. Moreover, it explores attacks on messaging, Web applications, and mobiles. The book concludes with a discussion on security measures against client-side attacks, starting from the planning of security. This book will be of great value to penetration testers, security consultants, system and network administrators, and IT auditors.