New Generation Internet Tools
English | Áúëãàðñêè

University:

Resources:

- SANS






E-mails:

 • Information: office@g-92.com
 • Support: support@g-92.com
 • Careers: career@g-92.com

Registered Office:

BULGARIA

5400 Sevlievo
19 General Stoletow Str.
G-92 Development Center
Black Screen Project

G-92 Developers Group

Section: Informatiotn Security Resources (ISR)

 • A Beginner’s Guide to Network Security
    An Introduction to the Key Security Issues for the E-Business Economy
    Cisco Systems

 • Fundamentals of Network Security
    John E. Canavan
    Artech House

 • Concepts and Terminology for Computer Security
    Donald L. Brinkley and Roger R. Schell

 • Computer Security Handbook
   Seymour Bosworth; M.E. Kabay; Eric Whyte



A Comprehensive Computer Safety & Security Guide:

Computers and the Internet have impacted almost every aspect of daily life, from the way we communicate to how we shop. As the Internet evolves, cyber security remains essential to keep confidential information safe. Internet users should be aware of the risks that going online can have. Among the many computer security dangers, there is always a risk of predators stealing credit card information, viruses deleting or altering important files, or various other fraudulent activities. Recognizing the signs of Internet fraud, and maintaining safety regulations while online, can help to prevent these occurrences. Many people become quickly overwhelmed at how difficult it can be to keep a computer safe, but rest assured, it’s not as hard as one may think.

Founded in 2008, Certified Staffing Solutions specializes in providing computer training and staffing of Computer Instructors nationwide.

With a determined focus on delivering specialized and top notch computer training and instructors to clients, Certified Staffing Solutions can meet the IT training & instruction needs of organizations of all sizes.

A Comprehensive Computer Safety & Security Guide


Recomended Web-Resources
:


 













COMPUTER SECURITY PUBLICATIONS

Ethan Preston; John Lofton

Society increasingly depends upon technological means of controlling access to digital files and systems, whether they are military computers, bank records, academic records, copyrighted works or something else entirely. There are far too many who, given any opportunity, will bypass those security measures, some for the sheer joy of doing it, some for innocuous reasons, and others for more malevolent purposes. Given the virtually instantaneous and worldwide dissemination widely available via the Internet, the only rational assumption is that once a computer program capable of bypassing such an access control system is
disseminated, it will be used ...


GUIDE TO COMPUTER SECURITY LOG MANAGEMENT

A log is a record of the events occurring within an organization’s systems and networks. Logs are composed of log entries; each entry contains information related to a specific event that has occurred within a system or network. Many logs within an organization contain records related to computer security. These computer security logs are generated by many sources, including security software, such as antivirus software, firewalls, and intrusion detection and prevention systems; operating systems on servers, workstations, and networking equipment; and applications ...



New Generation Internet Tools
Copyright © 2010-2011 G-92 Developers Group. All rights reserved
Black Screen Project