WorldCat Identities

Bace, Rebecca Gurley

Overview
Works: 6 works in 33 publications in 2 languages and 1,137 library holdings
Genres: Conference papers and proceedings 
Roles: Author, Contributor
Classifications: TK5105.59, 347.7347
Publication Timeline
.
Most widely held works by Rebecca Gurley Bace
A guide to forensic testimony : the art and practice of presenting testimony as an expert technical witness by Fred Chris Smith( Book )

10 editions published between 2002 and 2003 in English and held by 456 WorldCat member libraries worldwide

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical expert is essential. But in order to be effective, an expert technical witness needs much more than an understanding of the technology in question. A Guide to Forensic Testimony is the first book to address the specific needs of the IT expert witness. It will arm you with the tools you need to testify effectively. Inside you'll find everything from an overview of basic witness responsibilities and challenges to a deeper exploration of what produces successful technical testimony. Written by a computer security authority who has served as a technical witness, and a trial attorney who focuses on how digital evidence and computer forensics are altering litigation, this book is your guide to the complicated forensic landscape that awaits the expert technical witness. This book contains a wealth of wisdom and experience from the front lines, including firsthand accounts of the challenges faced by expert technical witnesses, practical in-court examples, and helpful advice. Among the topics covered are: The evolution of the expert IT witness and the growing legal dependence on technical expertise Legal criteria established to determine the qualifications and abilities of a technical expert to stand as a witness The kinds of cases and problems that are apt to be encountered in digital forensic assignments Damage caused when the rules of professionalism and ethics are ignored or misapplied The construction and maintenance of a solid professional relationship between expert and attorney The creation and use of visual tools in courtroom testimony Ways to improve the demeanor and non-verbal communication skills of the technical witness Whether you are an information technologist asked to serve as an expert witness, a legal professional who works with information technology experts, a corporate risk manager, or a client whose interests are affected by the performance of IT experts, you will benefit greatly from A Guide to Forensic Testimony . 0201752794B09092002
Intrusion detection systems by Rebecca Gurley Bace( )

7 editions published in 2001 in English and held by 270 WorldCat member libraries worldwide

Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations. This guidance document is intended as a primer in intrusion detection, developed for those who need to understand what security goals intrusion detection mechanisms serve, how to select and configure intrusion detection systems for their specific system and network environments, how to manage the output of intrusion detection systems, and how integrate intrusion detection functions with the rest of the organizational security infrastructure
Intrusion detection by Rebecca Gurley Bace( Book )

12 editions published between 1999 and 2001 in English and Chinese and held by 234 WorldCat member libraries worldwide

"With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever. Offering both a developmental and technical perspective on this crucial element of network security, Intrusion Detection covers practical considerations for selecting and implementing intrusion detection systems, methods for handling the results of analysis, and the options for responses to detected problems, data sources commonly used in intrusion detection and how they influence the capabilities of all intrusion detection systems, and legal issues surrounding detection and monitoring that affect the design, development, and operation of intrusion detection systems." "More than just an overview of the technology, Intrusion Detection presents real analysis schemes and responses, as well as a detailed discussion of the vulnerabilities inherent to many systems, and approaches to testing systems for these problems."--BOOK JACKET
The O'Reilly Security Conference, New York, NY, 2016 by Inc O'Reilly Media( Visual )

1 edition published in 2016 in English and held by 162 WorldCat member libraries worldwide

Includes keynote addresses from the conference
O'Reilly Security Conference, New York, NY, 2016( )

1 edition published in 2016 in English and held by 13 WorldCat member libraries worldwide

NIST Special Publication on Intrusion Detection Systems( Book )

2 editions published in 2001 in English and held by 2 WorldCat member libraries worldwide

Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations. This guidance document is intended as a primer in intrusion detection, developed for those who need to understand what security goals intrusion detection mechanisms serve, how to select and configure intrusion detection systems for their specific system and network environments, how to manage the output of intrusion detection systems, and how to integrate intrusion detection functions with the rest of the organizational security infrastructure. References to other information sources are also provided for the reader who requires specialized or more detailed advice on specific intrusion detection issues
 
Audience Level
0
Audience Level
1
  General Special  
Audience level: 0.00 (from 0.00 for A guide to ... to 0.00 for A guide to ...)

A guide to forensic testimony : the art and practice of presenting testimony as an expert technical witness
Covers
Intrusion detection
Alternative Names
Rebecca Bace informaticus

Rebecca Gurley Bace experta estadounidense en seguridad informática

Languages