Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in OS and Networks

Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord May 2014

Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Are you ready to respond to an unauthorized intrusion to your computer network or server? Principles of Incident Response and Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. Not only does book present a foundation in disaster recovery principles and planning, but it also emphasizes the importance of incident response minimizing prolonged downtime that can potentially lead to irreparable loss. This book is the first of its kind to address the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery.


Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security is designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security. This text takes a "view from the top" and presents important information for future managers regarding information security. The material covered in this text is often part of a capstone course in an information security.


Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition …


Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden May 2014

Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden

Herbert J. Mattord

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file …


Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the …


Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger …


Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.


Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green May 2014

Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green

Herbert J. Mattord

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The book …


Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important …


Building Dependable Distributed Systems, Wenbing Zhao Feb 2014

Building Dependable Distributed Systems, Wenbing Zhao

Wenbing Zhao

This book covers the most essential techniques for designing and building dependable distributed systems. Instead of covering a broad range of research works for each dependability strategy, the book focuses only a selected few (usually the most seminal works, the most practical approaches, or the first publication of each approach) are included and explained in depth, usually with a comprehensive set of examples. The goal is to dissect each technique thoroughly so that readers who are not familiar with dependable distributed computing can actually grasp the technique after studying the book.

The book contains eight chapters. The first chapter introduces …


Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn Apr 2013

Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn

Bruce Vanstone

No abstract provided.


Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn Apr 2013

Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn

Tobias Hahn

No abstract provided.


At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci Oct 2012

At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci

Robert A Iannucci

No abstract provided.


Identifying Linux Bug Fixing Patches, Tian Yuan, Julia Lawall, David Lo Aug 2012

Identifying Linux Bug Fixing Patches, Tian Yuan, Julia Lawall, David Lo

David LO

In the evolution of an operating system there is a continuing tension between the need to develop and test new features, and the need to provide a stable and secure execution environment to users. A compromise, adopted by the developers of the Linux kernel, is to release new versions, including bug fixes and new features, frequently, while maintaining some older “longterm” versions. This strategy raises the problem of how to identify bug fixing patches that are submitted to the current version but should be applied to the longterm versions as well. The current approach is to rely on the individual …


Lachesis: A Job Scheduler For The Cray T3e, Allen B. Downey Jul 2012

Lachesis: A Job Scheduler For The Cray T3e, Allen B. Downey

Allen B. Downey

This paper presents the design and implementation of Lachesis, a job scheduler for the Cray T3E. Lachesis was developed at the San Diego Supercomputer Center (SDSC) in an attempt to correct some problems with the scheduling system Cray provides with the T3E.


Evaluation Of Hpc Architectures For Brams Numerical Weather Model, Eugenio Almeida, Michael Bauer, Alvaro Fazenda Jul 2011

Evaluation Of Hpc Architectures For Brams Numerical Weather Model, Eugenio Almeida, Michael Bauer, Alvaro Fazenda

Eugenio Almeida

No abstract provided.


Embedded Systems As Datacenters, Robert Iannucci Dec 2009

Embedded Systems As Datacenters, Robert Iannucci

Robert A Iannucci

No abstract provided.


Platform Thinking In Embedded Systems, Robert Iannucci Dec 2004

Platform Thinking In Embedded Systems, Robert Iannucci

Robert A Iannucci

No abstract provided.


Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart Dec 2000

Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart

Robert A Iannucci

No abstract provided.


Computer System For Simulating Physical Processes Using Multiple Integer State Vectors Us:5594671, Hudong Chen, Peter Churchill, Robert Iannucci, Kim Molvig, Gregory Papadopoulos, Stephen Remondi, Christopher Teixeira, Kenneth Traub Dec 1996

Computer System For Simulating Physical Processes Using Multiple Integer State Vectors Us:5594671, Hudong Chen, Peter Churchill, Robert Iannucci, Kim Molvig, Gregory Papadopoulos, Stephen Remondi, Christopher Teixeira, Kenneth Traub

Robert A Iannucci

No abstract provided.


System For Synchronizing Execution By A Processing Element Of Threads Within A Process Using A State Indicator Us:5553305, Robert Iannucci, Steven Gregor Dec 1995

System For Synchronizing Execution By A Processing Element Of Threads Within A Process Using A State Indicator Us:5553305, Robert Iannucci, Steven Gregor

Robert A Iannucci

No abstract provided.


Multithreaded Computer Architecture: A Summary Of The State Of The Art, Robert Iannucci, Guang Gao, Robert Halstead, Burton Smith Dec 1993

Multithreaded Computer Architecture: A Summary Of The State Of The Art, Robert Iannucci, Guang Gao, Robert Halstead, Burton Smith

Robert A Iannucci

No abstract provided.


High Performance Memory System Pct:Ep0199134, Robert Iannucci Dec 1991

High Performance Memory System Pct:Ep0199134, Robert Iannucci

Robert A Iannucci

No abstract provided.


Parallel Machines: Parallel Machine Languages, Robert Iannucci Dec 1989

Parallel Machines: Parallel Machine Languages, Robert Iannucci

Robert A Iannucci

No abstract provided.


Method And Apparatus For Division Pct:Ep0075745, Robert Iannucci, James Kleinsteiber Dec 1986

Method And Apparatus For Division Pct:Ep0075745, Robert Iannucci, James Kleinsteiber

Robert A Iannucci

No abstract provided.


High Performance Memory System Utilizing Pipelining Techniques Us:4685088, Robert Iannucci Dec 1986

High Performance Memory System Utilizing Pipelining Techniques Us:4685088, Robert Iannucci

Robert A Iannucci

No abstract provided.


Method And Apparatus For Division Employing Associative Memory Us:4466077, Robert Iannucci, James Kleinsteiber Dec 1983

Method And Apparatus For Division Employing Associative Memory Us:4466077, Robert Iannucci, James Kleinsteiber

Robert A Iannucci

No abstract provided.