Angebote zu "Security" (18 Treffer)

Kategorien

Shops

Infrastructural Security for Virtualized Grid C...
89,90 € *
ggf. zzgl. Versand

The goal of the grid computing paradigm is to make computer power as easy to access as an electrical power grid. Unlike the power grid, the computer grid uses remote resources located at a service provider. Malicious users can abuse the provided resources, which not only affects their own systems but also those of the provider and others. As a consequence, most commercial customers are not convinced that their intellectual property in the form of software and data is protected in the grid. This book proposes a novel infrastructural security solution that advances the concept of virtualized grid computing. This includes the description of a software that transforms a traditional grid into a virtualized grid including security measures like a grid demilitarized zone, dynamic firewalls and several solutions to protect the grid node itself.

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Authentication in Insecure Environments
79,99 € *
ggf. zzgl. Versand

Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Intel Trusted Execution Technology for Server P...
37,44 € *
ggf. zzgl. Versand

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”   John McAuley,EMC Corporation "This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud.”   Alex Rodriguez,  Expedient Data Centers "This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk.”   Pete Nicoletti. Virtustream Inc. Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. With a foreword from Albert Caballero, the CTO at Trapezoid.

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Infrastructural Security for Virtualized Grid C...
146,00 CHF *
ggf. zzgl. Versand

The goal of the grid computing paradigm is to make computer power as easy to access as an electrical power grid. Unlike the power grid, the computer grid uses remote resources located at a service provider. Malicious users can abuse the provided resources, which not only affects their own systems but also those of the provider and others. As a consequence, most commercial customers are not convinced that their intellectual property in the form of software and data is protected in the grid. This book proposes a novel infrastructural security solution that advances the concept of virtualized grid computing. This includes the description of a software that transforms a traditional grid into a virtualized grid including security measures like a grid demilitarized zone, dynamic firewalls and several solutions to protect the grid node itself.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
Fine-Grained Authorization Services in Virtual ...
96,90 CHF *
ggf. zzgl. Versand

Revision with unchanged content. The last few years have experienced a steady growth in research institutions' interest in developing research projects that involve more than one insti tution's computing resources - forming virtual organizations. The goal of any virtual organization is to provide member institutions with an interoperable, easy to use and secure research environment. Shibboleth was one of the pre mier choices of infrastructure to be used to create collaborative inter-institu tional research environments as it provides a coherent architecture to securely share computing resources across multiple institutions without the need for individualized user credentials for each shared resource. Some of the prob lems that Shibboleth encountered in practice deal with its distributed authentication and authorization mechanisms and its user data accessability design. This work addresses these issues and provides a solution that allows for fine-grained authorization services in any virtual organization. We pro pose an extension to the Shibboleth design by separating the definition, management, and usage of the user's virtual organization entitlements from the identity provider. This book is addressed to professionals in Informa tionTechnology, researchers and students in Distributed Systems, Networking and Security.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
Authentication in Insecure Environments
106,90 CHF *
ggf. zzgl. Versand

Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
SIP Security
95,00 CHF *
ggf. zzgl. Versand

This book gives a detailed overview of SIP specific securityissues and how to solve them While the standards and products for VoIP and SIP services havereached market maturity, security and regulatory aspects of suchservices are still being discussed. SIP itself specifies only abasic set of security mechanisms that cover a subset of possiblesecurity issues. In this book, the authors survey important aspectsof securing SIP-based services. This encompasses a description ofthe problems themselves and the standards-based solutions for suchproblems. Where a standards-based solution has not been defined,the alternatives are discussed and the benefits and constraints ofthe different solutions are highlighted. Key Features: * Will help the readers to understand the actual problems ofusing and developing VoIP services, and to distinguish between realproblems and the general hype of VoIP security * Discusses key aspects of SIP security includingauthentication, integrity, confidentiality, non-repudiation andsignalling * Assesses the real security issues facing users of SIP, anddetails the latest theoretical and practical solutions to SIPSecurity issues * Covers secure SIP access, inter-provider secure communication,media security, security of the IMS infrastructures as well as VoIPservices vulnerabilities and countermeasures againstDenial-of-Service attacks and VoIP spam This book will be of interest to IT staff involved in deployingand developing VoIP, service users of SIP, network engineers,designers and managers. Advanced undergraduate and graduatestudents studying data/voice/multimedia communications as well asresearchers in academia and industry will also find this bookvaluable.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
Inside Microsoft SharePoint 2010
32,90 CHF *
ggf. zzgl. Versand

Build custom SharePoint 2010 solutions with deep architectural insights from the experts. Get a detailed look inside SharePoint 2010-and master the intricacies of developing intranets, extranets, and Web-based applications. Guided by an author team with in-depth knowledge of SharePoint architecture, you'll gain task-oriented guidance and extensive code samples to help you build robust business solutions. Discover how to: Master fundamental development techniques for SharePoint Foundation Deploy your SharePoint application as a sandboxed solution for more stable and security-enhanced code Create page templates, master pages, Web Parts, custom controls, and event handlers Develop custom field types, site columns, content types, and list definitions Query SharePoint lists with the LINQ-to-SharePoint provider Use the Client Object Model in JavaScript and Microsoft Silverlight applications Customize the Enterprise Content Management (ECM) capabilities in SharePoint 2010 Configure and extend Business Connectivity Services (BCS) and Enterprise Search

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
Deploying Cisco Wide Area Application Services
43,90 CHF *
ggf. zzgl. Versand

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets with far more robust security. And they must do it all while gaining far greater control over cost. Distributing IT resources increases management, hardware, and software overhead, but centralizing IT can worsen application performance. There is a solution to this quandary: Cisco application acceleration and WAN optimization technologies that permit IT to safely centralize distributed IT resources, meeting user performance expectations without replacing existing network infrastructure. Deploying Cisco Wide Area Application Services is the first comprehensive guide to designing and deploying solutions with these Cisco technologies. Zach Seils and Joel Christner show how to deploy Cisco WAAS in a scalable, transparent, and seamless fashion that responds to both your business and technical challenges. Writing for network design and implementation engineers and other networking professionals, they cover the entire planning and configuration process. Drawing on their extensive experience implementing WAAS in the enterprise, they also offer real-world implementation examples and case studies-including full chapters on network, branch office, and data center integration. Zach Seils, CCIE No. 7861, is a technical leader in the Cisco Advanced Services Data Center Networking Practice, where he specializes in designing, deploying, and troubleshooting application acceleration solutions for the largest Cisco enterprise and service provider customers. Joel Christner, CCIE No. 15311, is director of product management for Reconnex Corporation, the industry leader in data loss prevention (DLP) solutions. Prior to Reconnex, Joel was senior manager of technical marketing for the Application Delivery Business Unit (ADBU) at Cisco, where he helped drive the product and technical strategy for Cisco Wide Area Application Services. Christner is coauthor of Application Acceleration and WAN Optimization Fundamentals. Centrally provision applications to employees in any location without compromising performance Reduce costs by centralizing servers, storage, and applications by leveraging optimization capabilities that integrate cleanly with your existing infrastructure Thoroughly understand Cisco Wide Area Application Services (WAAS) and Wide Area Application Engine (WAE) and the business benefits provided by them - - Perform effective WAAS planning, discovery, and analysis - - Use WAAS and interception mechanisms such as WCCP or inline to transparently optimize flows traversing your network for end users accessing centrally deployed and centrally managed applications, files, and other information - - Integrate application acceleration and optimization into data centers, branch offices, and other environments - - Learn how to use the Cisco WAAS Central Manager, WAE device GUI, and command-line interface to configure, manage, and troubleshoot This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot