Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.

Kirjailija

Greg Miles

Kirjat ja teokset yhdessä paikassa: 2 kirjaa, julkaisuja vuosilta 2007-2008, suosituimpien joukossa Techno Security's Guide to Securing SCADA. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

2 kirjaa

Kirjojen julkaisuhaarukka 2007-2008.

Techno Security's Guide to Securing SCADA

Techno Security's Guide to Securing SCADA

Greg Miles; Jack Wiles; Ted Claypoole; Phil Drake; Paul A. Henry; Lester J. Johnson; Sean Lowther; Marc Weber Tobias; James H. Windle

Syngress Media,U.S.
2008
nidottu
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.
IT Security Interviews Exposed

IT Security Interviews Exposed

Chris Butler; Russ Rogers; Mason Ferratt; Greg Miles; Ed Fuller; Chris Hurley; Rob Cameron; Brian Kirouac

John Wiley Sons Inc
2007
nidottu
Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will helpDivided into two parts: how to get the job and a security crash course to prepare for the job interviewSecurity is one of today's fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused positionDiscusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker's toolkit, and documenting workThe number of information security jobs is growing at an estimated rate of 14 percent a year, and is expected to reach 2.1 million jobs by 2008