Computer Security category: 2451 books

Cover of Network Security Attacks and Countermeasures
by
Language: English
Release Date: January 18, 2016

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset...
Cover of Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
by Eric Cole, Michael Nordfelt, Sandra Ring
Language: English
Release Date: March 15, 2005

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers...
Cover of Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
by
Language: English
Release Date: July 31, 2014

In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The...
Cover of Developing and Evaluating Security-Aware Software Systems
by
Language: English
Release Date: November 30, 2012

As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance...
Cover of Biometrics

Biometrics

Concepts, Methodologies, Tools, and Applications

by
Language: English
Release Date: August 30, 2016

Security and authentication issues are surging to the forefront of the research realm in global society. As technology continues to evolve, individuals are finding it easier to infiltrate various forums and facilities where they can illegally obtain information and access. By implementing biometric authentications...
Cover of A Practical Guide to Trusted Computing
by David Challener, Kent Yoder, Ryan Catherman
Language: English
Release Date: December 27, 2007

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable   Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a...
Cover of IT Convergence and Security 2017
by
Language: English
Release Date: August 28, 2017

This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field. It explores how IT convergence and security issues are core to most current research,...
Cover of IT Convergence and Security 2017
by
Language: English
Release Date: September 3, 2017

This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in the field. It explores how IT convergence and security issues are core to most current research,...
Cover of Ec-Council Certified Ethical Hacker CEH v10 Training Guide
by IP Specialist
Language: English
Release Date: October 9, 2018

Ec-Council Certified Ethical Hacker CEH v10 covers the latest exam blueprint, comprised of 20 Modules which includes the practice of information security and hacking tools which are popularly used by professionals to exploit any computer systems. CEHv10 course blueprint covers all five Phases of Ethical...
Cover of Handbook of Research on Threat Detection and Countermeasures in Network Security
by
Language: English
Release Date: October 31, 2014

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. The Handbook of Research on Threat Detection and Countermeasures in...
Cover of Research in Attacks, Intrusions, and Defenses

Research in Attacks, Intrusions, and Defenses

21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings

by
Language: English
Release Date: September 6, 2018

This book constitutes the refereed proceedings of the 21st  International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They...
Cover of Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
by Bruce Schneier
Language: English
Release Date: March 2, 2015

“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky “Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky Your cell phone provider tracks your location and knows who’s...
Cover of America the Vulnerable

America the Vulnerable

Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

by Joel Brenner
Language: English
Release Date: September 29, 2011

Now available in a new edition entitled GLASS HOUSES: Privacy, Secrecy, and Cyber Insecurity in a Transparent World. A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies...
Cover of Dissecting the Hack: The F0rb1dd3n Network
by Jayson E Street, Kent Nabors, Brian Baskin
Language: English
Release Date: August 6, 2010

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference,...
First 8 9 10 11 12 13 1415 16 17 18 19 20 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy