Security category: 5602 books

Cover of Weapons of Mass Destruction

Weapons of Mass Destruction

The Search for Global Security

by Joseph M. Siracusa, Deputy Dean of Global Studies, The Royal Melbourne Institute of Technology University
Language: English
Release Date: March 29, 2017

Whether possessed by a state or non-state actor, the specter of Weapons of Mass Destruction (WMDs), and more specifically, nuclear weapons and their associated material, present a significant threat to global security. Notwithstanding the fact that there are fewer nuclear weapons today than the massive...
Cover of US Defense Politics

US Defense Politics

The Origins of Security Policy

by Harvey M. Sapolsky, Eugene Gholz, Caitlin Talmadge
Language: English
Release Date: September 19, 2017

This book provides an accessible overview of US defense politics for upper-level students. This new edition has been fully updated and revised, with a new chapter on veterans and new material on topics such as cyberwarfare and lobbying. Analyzing the ways in which the United States prepares...
Cover of What’s wrong with social security benefits?
by Spicker, Paul
Language: English
Release Date: February 22, 2017

In this thought-provoking book, Paul Spicker challenges readers to rethink social security benefits in Britain. Putting a case for reform of the system, Spicker argues that most of the criticisms made of social security benefits – that spending is out of control, that it has led to mushrooming dependency,...
Cover of Web Application Obfuscation

Web Application Obfuscation

'-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes
Language: English
Release Date: January 13, 2011

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation...
Cover of Beyond Security, Ethics and Violence

Beyond Security, Ethics and Violence

War Against the Other

by Anthony Burke
Language: English
Release Date: February 12, 2007

In a world plagued by war and terror, Beyond Security, Ethics and Violence sounds a warning: not only are global patterns of insecurity, violence and conflict getting ever more destructive and out of hand, but the ways we understand and respond to them will only prolong the crisis. When security is...
Cover of Insurance and governance in public-private security cooperation

Insurance and governance in public-private security cooperation

Notes prepared for Panel Session 16.30-18.00: Public-Private Cooperation: Challenges and Opportunities in Security Governance, International Security Forum, 30 May 2011, Zurich

by Rolf Tanner
Language: English
Release Date: July 14, 2011

Seminar paper from the year 2011 in the subject Politics - International Politics - Topic: Peace and Conflict Studies, Security, Swiss Federal Institute of Technology Zurich, course: International Security Forum 2011, language: English, abstract: Beitrag zu Podiumsdiskussion zu öffentlich-privater...
Cover of String Analysis for Software Verification and Security
by Tevfik Bultan, Fang Yu, Muath Alkhalaf
Language: English
Release Date: January 4, 2018

This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata,...
Cover of Applied Network Security Monitoring

Applied Network Security Monitoring

Collection, Detection, and Analysis

by Chris Sanders, Jason Smith
Language: English
Release Date: November 26, 2013

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle...
Cover of Securing Ajax Applications

Securing Ajax Applications

Ensuring the Safety of the Dynamic Web

by Christopher Wells
Language: English
Release Date: July 11, 2007

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become...
Cover of Cloud Computing Security

Cloud Computing Security

Foundations and Challenges

by
Language: English
Release Date: September 19, 2016

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in...
Cover of Kali Linux Intrusion and Exploitation Cookbook
by Dhruv Shah, Ishan Girdhar
Language: English
Release Date: April 21, 2017

Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments About This Book Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits Improve your testing efficiency with the use of automated...
Cover of Essential PHP Security

Essential PHP Security

A Guide to Building Secure Web Applications

by Chris Shiflett
Language: English
Release Date: October 13, 2005

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more...
Cover of Hands-On Oracle Application Express Security

Hands-On Oracle Application Express Security

Building Secure Apex Applications

by Recx
Language: English
Release Date: April 9, 2013

An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications...
Cover of Identity and Data Security for Web Development
by Jonathan LeBlanc, Tim Messerschmidt
Language: English
Release Date: June 6, 2016

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical...
First 46 47 48 49 50 51 5253 54 55 56 57 58 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy