Communications category: 4698 books

Cover of Big Data Forensics Learning Hadoop Investigations
by Joe Sremack
Language: English
Release Date: August 24, 2015

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniquesAbout This BookIdentify, collect, and analyze Hadoop evidence forensicallyLearn about Hadoop’s internals and Big Data file storage conceptsA step-by-step guide to help you perform forensic analysis using...
Cover of Bitcoin: The Ultimate A - Z Of Profitable Bitcoin Trading & Mining Guide Exposed!
by Scott Green
Language: English
Release Date: November 19, 2014

How does the bitcoin protocol work? A person cannot mix indefinite bitcoins. The bitcoin protocol states that there will only be twenty-one million bitcoins to be produced by the miners. These bitcoins will then be subdivided into smaller bits. The smallest bit is called ‘satoshi’ named...
Cover of Predictive Computing and Information Security
by P.K. Gupta, Vipin Tyagi, S.K. Singh
Language: English
Release Date: September 27, 2017

This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art techniques and the design, development and innovative...
Cover of Computational Science and Its Applications – ICCSA 2016

Computational Science and Its Applications – ICCSA 2016

16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part V

by
Language: English
Release Date: June 30, 2016

The five-volume set LNCS 9786-9790 constitutes the refereed proceedings of the 16th International Conference on Computational Science and Its Applications, ICCSA 2016, held in Beijing, China, in July 2016. The 239 revised full papers and 14 short papers presented at 33 workshops were carefully...
Cover of Conquer the Web

Conquer the Web

The Ultimate Cybersecurity Guide

by Nick Wilding, Tim Mitchell, Maureen Kendal
Language: English
Release Date: June 30, 2018

This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it? 'A must read for anyone looking to upskill their cyber awareness,' Steve Durbin, Managing Director, Information Security Forum Tons of malicious...
Cover of Managing Cybersecurity Risk

Managing Cybersecurity Risk

Cases Studies and Solutions

by Jonathan Reuvid
Language: English
Release Date: February 28, 2018

The first edition, published November 2016, was targeted at the directors and senior managers of SMEs and larger organisations that have not yet paid sufficient attention to cybersecurity and possibly did not appreciate the scale or severity of permanent risk to their businesses.  The book...
Cover of Wireless Home Networking For Dummies
by Danny Briere, Pat Hurley
Language: English
Release Date: October 26, 2010

The perennial bestseller shows you how share your files and Internet connection across a wireless network Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows...
Cover of Metasploit

Metasploit

The Penetration Tester's Guide

by David Kennedy, Devon Kearns, Mati Aharoni
Language: English
Release Date: July 15, 2011

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching...
Cover of Ubuntu 18.04 LTS Server: Administration and Reference
by Richard Petersen
Language: English
Release Date: June 30, 2018

This book is designed as an Ubuntu 18.04 LTS Server administration and reference source, covering the Ubuntu servers and their support applications. Server tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to...
Cover of Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
by Slava Gomzin
Language: English
Release Date: June 7, 2012

Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology. Topics include: review of security features such as Authentication, Integrity,...
Cover of SSH Mastery

SSH Mastery

OpenSSH, PuTTY, Tunnels, and Keys - 2nd edition

by Michael W. Lucas
Language: English
Release Date: February 7, 2018

The seminal text on SSH, newly revised and updated! Secure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, complicated, and confusing. Lose the confusion. SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys rescues you from sifting through decades of obsolete...
Cover of Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
by Clint Bodungen, Bryan Singer, Aaron Shbeeb
Language: English
Release Date: September 22, 2016

Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical...
Cover of Computer Forensics with FTK
by Fernando Carbone
Language: English
Release Date: March 20, 2014

This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format. This tutorial-based guide is great for you if you want to...
Cover of Meeting People via WiFi and Bluetooth
by Joshua Schroeder, Henry Dalziel
Language: English
Release Date: December 9, 2015

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015...
First 61 62 63 64 65 66 6768 69 70 71 72 73 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy