Computer Security category: 2451 books

Cover of IT Security Governance Innovations
by
Language: English
Release Date: September 30, 2012

Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding...
Cover of Unauthorised Access

Unauthorised Access

Physical Penetration Testing For IT Security Teams

by Wil Allsopp
Language: English
Release Date: March 25, 2010

The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of...
Cover of The Art of Intrusion

The Art of Intrusion

The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

by Kevin D. Mitnick, William L. Simon
Language: English
Release Date: March 17, 2009

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his...
Cover of Securing the Cloud

Securing the Cloud

Cloud Computer Security Techniques and Tactics

by Vic (J.R.) Winkler
Language: English
Release Date: April 21, 2011

Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The cloud offers flexibility, adaptability,...
Cover of CISSP Study Guide
by Eric Conrad, Seth Misenar, Joshua Feldman
Language: English
Release Date: September 16, 2010

CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtain CISSP certification. The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The...
Cover of Economics of Information Security and Privacy III
by
Language: English
Release Date: September 25, 2012

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives...
Cover of Easy Guide To Computers

Easy Guide To Computers

This Handbook Will Teach You Lots Of Excellent Information On Computers Which Include Tips On Buying A Computer, Getting The Best Computer Security, Introduction To Computer Programming, Software Piracy, Home Computer Networking And More!

by Dion M. Bauman
Language: English
Release Date: October 1, 2012

Well, we've been warned that this time would come - probably from the earlier eighties on. Yes, computers have finally taken over and if you doubt it, we're here to convince you - but not because we want to or because we can. We want to convince you that if you don't take the necessary steps to control...
Cover of Checkpoint Next Generation Security Administration
by Syngress
Language: English
Release Date: April 11, 2002

Unparalleled security management that IT professionals have been waiting for. Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications....
Cover of The Practice of Network Security Monitoring

The Practice of Network Security Monitoring

Understanding Incident Detection and Response

by Richard Bejtlich
Language: English
Release Date: July 15, 2013

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to...
Cover of Dynamic Secrets in Communication Security
by Sheng Xiao, Weibo Gong, Don Towsley
Language: English
Release Date: August 13, 2013

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting...
Cover of Smart Cards, Tokens, Security and Applications
by
Language: English
Release Date: May 18, 2017

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems...
Cover of Cyber Security

Cyber Security

Proceedings of CSI 2015

by
Language: English
Release Date: April 27, 2018

This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography...
Cover of Security in the Digital World
by Graham Day
Language: English
Release Date: November 28, 2018

Cyberspace, the Internet, computer networks, the digital world call it what you will is always developing. And so are the threats and risks of being online.Security in the Digital World explains the common digital threats to home users, home offices, mobile users, consumers and parents alike, as well...
Cover of Information Security in Diverse Computing Environments
by
Language: English
Release Date: June 30, 2014

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing...
First 4 5 6 7 8 9 1011 12 13 14 15 16 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy