Security category: 5602 books

Cover of Migration, Terrorism, and the Future of a Divided Europe: A Continent Transformed
by Christopher Deliso
Language: English
Release Date: May 18, 2017

The November 13, 2015 Paris terrorist attacks marked the definitive moment when the migration crisis became associated with terrorism, stoking an increasingly heated debate over the perceived dangers of migration, Islam, and extremist politics in Europe. The sudden emergence of migration as the mobilizing...
Cover of Cybercrime and Espionage

Cybercrime and Espionage

An Analysis of Subversive Multi-Vector Threats

by Will Gragido, John Pirc
Language: English
Release Date: January 7, 2011

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from...
Cover of The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden
by Progressive Management
Language: English
Release Date: October 3, 2016

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray...
Cover of The Political Economy of Global Security

The Political Economy of Global Security

War, Future Crises and Changes in Global Governance

by Heikki Patomäki
Language: English
Release Date: November 28, 2007

What are the possibilities for and conditions of global security in the 21st century? This book provides an innovative study of future wars, crises and transformations of the global political economy. It brings together economic theory, political economy, peace and conflict research, philosophy...
Cover of Conquer the Web

Conquer the Web

The Ultimate Cybersecurity Guide

by Nick Wilding, Tim Mitchell, Maureen Kendal
Language: English
Release Date: June 30, 2018

This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it? 'A must read for anyone looking to upskill their cyber awareness,' Steve Durbin, Managing Director, Information Security Forum Tons of malicious...
Cover of Kali Linux 2: Windows Penetration Testing
by Wolf Halton, Bo Weaver
Language: English
Release Date: June 28, 2016

Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers About This Book Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Footprint, monitor, and audit your network and investigate any ongoing infestations Customize...
Cover of Sunshine on Secure Software

Sunshine on Secure Software

Baking Security into your SDLC Process

by Natalie "Sunny" Wear
Language: English
Release Date: April 29, 2013

Provides a step-by-step guide on how to bake security techniques into the software life cycle. This book poses a challenge to move security, privacy and compliance into functional business requirements. Security, privacy and compliance are generally not addressed or only nodded to in the SDLC instead...
Cover of Availability, Reliability, and Security in Information Systems

Availability, Reliability, and Security in Information Systems

IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings

by
Language: English
Release Date: August 22, 2016

This volume constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security in Information Systems, CD-ARES 2016, and the Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, co-located...
Cover of Malware, Rootkits & Botnets A Beginners Guide
by Christopher Elisan
Language: English
Release Date: August 25, 2012

Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginners Guide explains the nature, sophistication, and danger of these risks and offers...
Cover of Information Security Breaches

Information Security Breaches

Avoidance and Treatment based on ISO27001

by Michael Krausz
Language: English
Release Date: December 15, 2009

If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat...
Cover of Next Generation SSH2 Implementation

Next Generation SSH2 Implementation

Securing Data in Motion

by Dale Liu
Language: English
Release Date: April 18, 2011

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into...
Cover of Information Security Risk Assessment Toolkit

Information Security Risk Assessment Toolkit

Practical Assessments through Data Collection and Data Analysis

by Mark Talabis, Jason Martin
Language: English
Release Date: October 17, 2012

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention...
Cover of Hacking Point of Sale

Hacking Point of Sale

Payment Application Secrets, Threats, and Solutions

by Slava Gomzin
Language: English
Release Date: February 3, 2014

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not...
Cover of Principles of Security and Trust

Principles of Security and Trust

6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings

by
Language: English
Release Date: March 27, 2017

This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017. The 14 papers presented in this...
First 58 59 60 61 62 63 6465 66 67 68 69 70 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy