Computer Security category: 2451 books

Cover of Easy Password Creation Systems For Life (Introduction)
by Josephine Rosenburgh
Language: English
Release Date: May 20, 2014

Let's create our own password system which can be used anywhere for all of the passwords we will ever need. We want to make them easy to formulate yet be secure enough. The grid system that you finally choose can easily be recreated any time you like on a piece of paper. You will need to take...
Cover of Facebook Security and Privacy

Facebook Security and Privacy

With Real Life Safety Tips for Kids, Teachers, and Parents

by Marcel C. Obi (Ph.D.)
Language: English
Release Date: February 10, 2014

Security and Privacy threats on Facebook are real. These threats have gone beyond the Internet and computer systems, and have become real life threats. The looming danger generated by a simple mouse click cannot be underestimated; it goes a long way to impact lives. Anyone can become social media...
Cover of Impact of Alleged Russian Cyber Attacks: Weakness of Cyber Defenses Against Cyber Warfare Demonstrated by High-Profile Attacks Against Estonia and Georgia, Multilateral Initiatives, Countermeasures
by Progressive Management
Language: English
Release Date: March 22, 2017

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. High profile cyber attacks against Estonia and Georgia have brought the subject of cyber security from the realm of internet magazines to main stream media outlets. The cyber attacks advanced...
Cover of InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
by Chris Hurley, Johnny Long, Aaron W Bayles
Language: English
Release Date: June 2, 2005

“InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be...
Cover of Big Data: Seizing Opportunities, Preserving Values - Report of the Presidential Big Data and Privacy Working Group, Internet, Computer, Online Communications Privacy Threats
by Progressive Management
Language: English
Release Date: May 2, 2014

Driven by the declining cost of data collection, storage, and processing; fueled by new online and real-world sources of data, including sensors, cameras, and geospatial technologies; and analyzed using a suite of creative and powerful new methods, big data is fundamentally reshaping how Americans...
Cover of How To Protect Your Personal Computer: Your Step-By-Step Guide To Fight Spyware, Viruses, & Malware
by HowExpert
Language: English
Release Date: April 3, 2011

If you want to know the various ways on how to protect your personal computer then, check out this "How To Protect Your Personal Computer" guide. In this step-by-step guide, you will reap the following benefits: - Learn how to protect your PC. - Get tips on how to password protect your...
Cover of Network Hardening

Network Hardening

An Automated Approach to Improving Network Security

by Massimiliano Albanese, Lingyu Wang, Sushil Jajodia
Language: English
Release Date: July 8, 2014

This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means...
Cover of Computer Networking in a Digital Age
by Simon Schultz
Language: English
Release Date: February 4, 2014

“Computer Networking in the Digital Age” is a unique look at the field of information technology and networking. Whether you are new to the field or an IT professional, the tips and tricks presented throughout the text are sure to help further your career and expand your mind. “Computer...
Cover of Seven Deadliest Network Attacks
by Stacy Prowell, Rob Kraus, Mike Borkin
Language: English
Release Date: June 2, 2010

Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. The book consists of seven chapters that deal with the following attacks: (i) denial...
Cover of Foundations of Security Analysis and Design VIII

Foundations of Security Analysis and Design VIII

FOSAD 2014/2015/2016 Tutorial Lectures

by
Language: English
Release Date: August 15, 2016

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young...
Cover of Stealing the Network: How to Own an Identity
by Ryan Russell, Peter A Riley, Jay Beale
Language: English
Release Date: August 24, 2005

The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment,...
Cover of The Basics of Web Hacking

The Basics of Web Hacking

Tools and Techniques to Attack the Web

by Josh Pauli
Language: English
Release Date: June 18, 2013

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles...
Cover of PC Virus Killer
by Anonymous
Language: English
Release Date: June 10, 2015

It's time to protect your pc before it's too late ... This Book Is One Of The Most Valuable Resources In The World When It Comes To The Damaging Facts About Computer Viruses! A virus will function as an element that will constitute damage to the hard disk contents or interfere with the normal operational...
Cover of Disappearing Cryptography

Disappearing Cryptography

Information Hiding: Steganography and Watermarking

by Peter Wayner
Language: English
Release Date: June 12, 2009

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords,...
First 9 10 11 12 13 14 1516 17 18 19 20 21 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy