Computer Security category: 2451 books

Cover of Security Protocols XXV

Security Protocols XXV

25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers

by
Language: English
Release Date: November 28, 2017

This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017. The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions. ...
Cover of Physical-Layer Security for Cooperative Relay Networks
by Yulong Zou, Jia Zhu
Language: English
Release Date: April 20, 2016

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic...
Cover of Security Intelligence

Security Intelligence

A Practitioner's Guide to Solving Enterprise Security Challenges

by Qing Li, Gregory Clark
Language: English
Release Date: April 16, 2015

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology...
Cover of Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings

by
Language: English
Release Date: April 24, 2018

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber...
Cover of Cyber Security Standards, Practices and Industrial Applications
by
Language: English
Release Date: August 31, 2011

Cyber security, encompassing both information and network security, is of utmost importance in today’s information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces...
Cover of Practical Hadoop Security
by Bhushan Lakhe
Language: English
Release Date: December 12, 2014

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of...
Cover of Data-Driven Security

Data-Driven Security

Analysis, Visualization and Dashboards

by Jay Jacobs, Bob Rudis
Language: English
Release Date: January 24, 2014

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data analysis and visualization....
Cover of The Network Security Test Lab

The Network Security Test Lab

A Step-by-Step Guide

by Michael Gregg
Language: English
Release Date: August 10, 2015

The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the...
Cover of Oracle Database 12c Security
by Scott Gaetjen, David Knox, William Maroulis
Language: English
Release Date: January 9, 2015

Best Practices for Comprehensive Oracle Database Security Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant architecture. The strategies...
Cover of Industrial Cybersecurity
by Pascal Ackerman
Language: English
Release Date: October 18, 2017

Your one-step guide to understanding industrial cyber security, its control systems, and its operations. About This Book Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices Filled with practical examples...
Cover of Measuring and Communicating Security's Value

Measuring and Communicating Security's Value

A Compendium of Metrics for Enterprise Protection

by George Campbell
Language: English
Release Date: March 28, 2015

In corporate security today, while the topic of information technology (IT) security metrics has been extensively covered, there are too few knowledgeable contributions to the significantly larger field of global enterprise protection. Measuring and Communicating Security’s Value addresses this...
Cover of Becoming a Global Chief Security Executive Officer

Becoming a Global Chief Security Executive Officer

A How to Guide for Next Generation Security Leaders

by Roland Cloutier
Language: English
Release Date: October 13, 2015

Becoming a Global Chief Security Executive Officer provides tangible, proven, and practical approaches to optimizing the security leader’s ability to lead both today’s, and tomorrow’s, multidisciplined security, risk, and privacy function. The need for well-trained and effective executives...
Cover of Building an Intelligence-Led Security Program
by Allan Liska
Language: English
Release Date: December 10, 2014

As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's...
Cover of Network Vulnerability Assessment

Network Vulnerability Assessment

Identify security loopholes in your network’s infrastructure

by Sagar Rahalkar
Language: English
Release Date: August 31, 2018

Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastructure Book Description The...
First 19 20 21 22 23 24 2526 27 28 29 30 31 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy