Computer Security category: 2451 books

Cover of Cybersecurity for Beginners
by Raef Meeuwisse
Language: English
Release Date: March 14, 2017

This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge.‘The world has changed more...
Cover of Juniper(r) Networks Secure Access SSL VPN Configuration Guide
by Rob Cameron, Neil R. Wyler
Language: English
Release Date: April 18, 2011

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances...
Cover of Designing an IAM Framework with Oracle Identity and Access Management Suite
by Jeff Scheidel
Language: English
Release Date: August 1, 2010

From Oracle Press--a trusted advisor's guide to the lifecycle of an identity and access management (IAM) project with Oracle Identity and Access Management Suite Designing an IAM Framework with Oracle Identity and Access Management Suite is a comprehensive approach to an IAM project with Oracle Identity...
Cover of Netcat Power Tools
by
Language: English
Release Date: June 13, 2008

Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife"...
Cover of How to Measure Anything in Cybersecurity Risk
by Douglas W. Hubbard, Richard Seiersen
Language: English
Release Date: July 25, 2016

A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security....
Cover of Behold a Pale Farce

Behold a Pale Farce

Cyberwar, Threat Inflation, & the Malware Industrial Complex

by Bill Blunden, Violet Cheung
Language: English
Release Date: April 17, 2014

This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat that has been blown out of proportion—much like the run-up to the Gulf War or the global...
Cover of Metasploit

Metasploit

The Penetration Tester's Guide

by David Kennedy, Devon Kearns, Mati Aharoni
Language: English
Release Date: July 15, 2011

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching...
Cover of Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
by Daniel Regalado, Shon Harris, Allen Harper
Language: English
Release Date: April 5, 2018

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition...
Cover of Advances in Cryptology – EUROCRYPT 2017

Advances in Cryptology – EUROCRYPT 2017

36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III

by
Language: English
Release Date: April 10, 2017

The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these...
Cover of Advanced Malware Analysis
by Christopher C. Elisan
Language: English
Release Date: September 5, 2015

A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to...
Cover of Integrating ISA Server 2006 with Microsoft Exchange 2007
by Fergus Strachan
Language: English
Release Date: August 31, 2011

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange for raw beginners....
Cover of Security without Obscurity

Security without Obscurity

A Guide to PKI Operations

by Jeff Stapleton, W. Clay Epstein
Language: English
Release Date: February 22, 2016

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or
Cover of Secrets Stolen, Fortunes Lost

Secrets Stolen, Fortunes Lost

Preventing Intellectual Property Theft and Economic Espionage in the 21st Century

by Christopher Burgess, SYNGRESS, Richard Power
Language: English
Release Date: August 31, 2011

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International...
Cover of A Guide to Kernel Exploitation

A Guide to Kernel Exploitation

Attacking the Core

by Massimiliano Oldani, Enrico Perla, B.Sc.
Language: English
Release Date: October 28, 2010

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented...
First 83 84 85 86 87 88 8990 91 92 93 94 95 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy