tailieunhanh - Ebook Information security management handbook (Volume 6): Part 2

Ebook Information security management handbook: Part 2 includes the following content: Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 18: Twenty-Five (or Forty) Years of Malware History; Chapter 19: Format Preserving Encryption; Chapter 20: Elliptic Curve Cryptosystems; Chapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; |