Security category: 5602 books

Cover of Game Theoretic Analysis of Congestion, Safety and Security

Game Theoretic Analysis of Congestion, Safety and Security

Networks, Air Traffic and Emergency Departments

by
Language: English
Release Date: December 31, 2014

Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments, this volume focuses on congestion in systems where safety and security are at stake, devoting special attention to applying game theoretic analysis of congestion to: protocols in wired...
Cover of Designing and Building Security Operations Center
by David Nathans
Language: English
Release Date: November 6, 2014

Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day,...
Cover of Handbook of Research on Security Considerations in Cloud Computing
by
Language: English
Release Date: July 28, 2015

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing...
Cover of Android Forensics

Android Forensics

Investigation, Analysis and Mobile Security for Google Android

by Andrew Hoog
Language: English
Release Date: July 21, 2011

Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components,...
Cover of Applications and Techniques in Information Security

Applications and Techniques in Information Security

6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings

by
Language: English
Release Date: September 26, 2016

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016.  The 10 revised full papers and three short papers presented together with two invited talks were carefully...
Cover of Secure Programming with Static Analysis
by Brian Chess, Jacob West
Language: English
Release Date: June 29, 2007

The First Expert Guide to Static Analysis for Software Security!   Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users...
Cover of The Routledge Companion to Risk, Crisis and Security in Business
by
Language: English
Release Date: June 14, 2018

Aware that a single crisis event can devastate their business, managers must be prepared for the worst from an expansive array of threats. The Routledge Companion to Risk, Crisis and Security in Business comprises a professional and scholarly collection of work in this critical field. Risks come in...
Cover of Homeland Security and Intelligence, 2nd Edition
by
Language: English
Release Date: November 16, 2017

Now updated and expanded for its second edition, this book investigates the role intelligence plays in maintaining homeland security and emphasizes that effective intelligence collection and analysis are central to reliable homeland security. • Addresses the most recent changes in homeland...
Cover of Psychological and Behavioral Examinations in Cyber Security
by
Language: English
Release Date: March 9, 2018

Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a...
Cover of Privacy Solutions and Security Frameworks in Information Protection
by
Language: English
Release Date: September 30, 2012

While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security...
Cover of Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
by
Language: English
Release Date: June 26, 2014

This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring...
Cover of Global Security Watch—India
by Amit Gupta
Language: English
Release Date: September 20, 2012

India is poised to join the major nations of the world as one of the next superpowers in the multi-polar, 21st-century world. At the same time, it still faces significant domestic problems such as widespread poverty and public health issues, and faces considerable security threats posed by China and...
Cover of Preventing Ransomware

Preventing Ransomware

Understand, prevent, and remediate ransomware attacks

by Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan
Language: English
Release Date: March 23, 2018

Your one-stop guide to know digital extortion and it's prevention. Key Features A complete guide to how ransomware works Build a security mechanism to prevent digital extortion. A practical approach to knowing about, and responding to, ransomware. Book Description Ransomware has turned out...
Cover of Kali Linux Wireless Penetration Testing Cookbook
by Sean-Philip Oriyano
Language: English
Release Date: December 13, 2017

Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes About This Book Expose wireless security threats through the eyes of an attacker, Recipes to help you proactively identify vulnerabilities and apply intelligent remediation, Acquire and apply key...
First 52 53 54 55 56 57 5859 60 61 62 63 64 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy