Kirjojen hintavertailu. Mukana 12 016 292 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Chappy

On the Shoulders of Giants: The Bea Wright Story

On the Shoulders of Giants: The Bea Wright Story

Eleanor Chappell; Basil O'Connor; Helen Hayes

Literary Licensing, LLC
2013
sidottu
On The Shoulders Of Giants: The Bea Wright Story is a biography written by Eleanor Chappell. The book tells the inspiring story of Bea Wright, a woman who overcame numerous obstacles to become an accomplished athlete and coach. Born in the 1930s, Wright faced discrimination and racism as a Black woman growing up in the United States. Despite these challenges, she excelled in sports and became a star athlete in high school and college. After graduating, Wright became a coach and helped countless young athletes achieve success. The book explores Wright's life, her struggles, and her triumphs. It also delves into the history of racism in sports and the ways in which Wright and other Black athletes paved the way for future generations. On The Shoulders Of Giants is a powerful and inspiring story of perseverance, courage, and determination.This scarce antiquarian book is a facsimile reprint of the old original and may contain some imperfections such as library marks and notations. Because we believe this work is culturally important, we have made it available as part of our commitment for protecting, preserving, and promoting the world's literature in affordable, high quality, modern editions, that are true to their original work.
Access Control, Authentication, And Public Key Infrastructure

Access Control, Authentication, And Public Key Infrastructure

Mike Chapple; Bill Ballad; Tricia Ballad; Erin Banks

Jones and Bartlett Publishers, Inc
2013
nidottu
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series meets all standards put forth by CNSS 4011 & 4013A! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides a student and professional resource that details how to put access control systems to work as well as testing and managing them. New to the Second Edition: Updated references to Windows 8 and Outlook 2011 A new discussion of recent Chinese hacking incidence Examples depicting the risks associated with a missing unencrypted laptop containing private data. New sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added. New information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA).
Cyberwarfare

Cyberwarfare

Mike Chapple; David Seidl

Jones and Bartlett Publishers, Inc
2014
nidottu
Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series Cyberwarfare puts students on the real-world battlefield of cyberspace! Students will learn the history of cyberwarfare, techniques used in both offensive and defensive information warfare, and how cyberwarfare is shaping military doctrine. Written by subject matter experts, this book combines accessible explanations with realistic experiences and case studies that make cyberwar evident and understandable. Key Features: - Incorporates hands-on activities, relevant examples, and realistic exercises to prepare readers for their future careers. - Includes detailed case studies drawn from actual cyberwarfare operations and tactics. - Provides fresh capabilities information drawn from the Snowden NSA leaks
Cyberwarfare with Navigate 2 Essentials

Cyberwarfare with Navigate 2 Essentials

Mike Chapple; David Seidl

Jones and Bartlett Publishers, Inc
2017
sidottu
Print Textbook amp Online Course Access: 8 -day subscription. Please confirm the ISBNs used in your course with your instructor before placing your order your institution may use a custom integration or an access portal that requires a different access code. Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations -- operations in which it has become almost impossible to separate cyberwarfare from traditional warfare. Part discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered--from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defense-in-depth is critical to building a well-rounded defense that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare its interaction with military doctrine and the Pandora's box opened by recent events, which have set the stage for future cyber attacks.
Access Control And Identity Management

Access Control And Identity Management

Mike Chapple

Jones and Bartlett Publishers, Inc
2020
nidottu
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series meets all standards put forth by CNSS 4011 & 4013A! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides a student and professional resource that details how to put access control systems to work as well as testing and managing them. New to the Second Edition: Updated references to Windows 8 and Outlook 2011 A new discussion of recent Chinese hacking incidence Examples depicting the risks associated with a missing unencrypted laptop containing private data. New sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added. New information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA).
Access Control and Identity Management with Cloud Labs

Access Control and Identity Management with Cloud Labs

Mike Chapple

JONES AND BARTLETT PUBLISHERS, INC
2020
muu
Print Textbook amp Cloud Lab Access: 8 -day subscription.The cybersecurity Cloud Labs for for Access Control and Identity Management provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk. Available as a standalone lab solution or bundled with Jones amp Bartlett Learning textbooks, these cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training.Lab : Designing an Access Control SystemLab 2: Conducting a Risk Assessment of an Access Control SystemLab 3: Configuring an Active Directory Domain ControllerLab 4: Managing Windows Accounts and Organizational UnitsLab 5: Configuring Windows File System PermissionsLab : Configuring a Remote Access VPNLab 7: Encrypting and Decrypting Files with Public Key InfrastructureLab 8: Scanning an Active Directory Domain Controller for VulnerabilitiesLab 9: Enabling Audit Trails to Enforce AccountabilityLab : Applying the Security Policy Framework to an Access Control EnvironmentSupplemental Lab : Managing Group Policy Objects in Active DirectorySupplemental Lab 2: Managing Linux AccountsSupplemental Lab 3: Configuring Linux File System PermissionsSupplemental Lab 4: Authenticating Encrypted Communications with Digital SignaturesSupplemental Lab 5: Encrypting and Decrypting Web Traffic with HTTPS