Logo

Information Security and Privacy in Network Environments

Small book cover: Information Security and Privacy in Network Environments

Information Security and Privacy in Network Environments

Publisher: U.S. Government Printing Office
Number of pages: 248

Description:
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards and export controls; 2) guidance on safeguarding unclassified information in federal agencies; and 3) legal issues and information security, including electronic commerce, privacy, and intellectual property.

Home page url

Download or read it online for free here:
Download link
(5.4MB, PDF)

Similar books

Book cover: Network Security ToolsNetwork Security Tools
by - O'Reilly Media, Inc.
The book shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools.
(11687 views)
Book cover: Network Security and ManagementNetwork Security and Management
- Wikipedia
From the table of contents: Introduction (Code, Cipher, Cryptography); Stream Ciphers (Stream cipher, Rotor machine, Stream cipher attack, ...); Public Key Systems; System Identification and Clustering; Security; Telecommunication Networks.
(4502 views)
Book cover: Internet Safety: Keeping your Computer Safe on the InternetInternet Safety: Keeping your Computer Safe on the Internet
by - Puget Sound Software
In this free 113 page ebook I summarize popular articles from covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the internet.
(10906 views)
Book cover: Nmap Network ScanningNmap Network Scanning
by - Nmap Project
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.
(11919 views)