Computer Security category: 2451 books

Cover of Web Security Testing Cookbook

Web Security Testing Cookbook

Systematic Techniques to Find Problems Fast

by Paco Hope, Ben Walther
Language: English
Release Date: October 14, 2008

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests,...
Cover of Abusing the Internet of Things

Abusing the Internet of Things

Blackouts, Freakouts, and Stakeouts

by Nitesh Dhanjani
Language: English
Release Date: August 13, 2015

This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation. — Cory Doctorow author, co-editor of Boing Boing A future with billions of connected "things"...
Cover of GFI Network Security and PCI Compliance Power Tools
by Brien Posey
Language: English
Release Date: April 18, 2011

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning...
Cover of Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
by Joel Scambray
Language: English
Release Date: December 25, 2007

The latest Windows security attack and defense strategies "Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure"...
Cover of OAuth 2.0 Cookbook
by Adolfo Eloy Nascimento
Language: English
Release Date: October 18, 2017

Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies. About This Book Interact with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google. Use Spring Security and Spring Security OAuth2 to implement your...
Cover of Neural Information Processing

Neural Information Processing

24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part III

by
Language: English
Release Date: November 7, 2017

The six volume set LNCS 10634, LNCS 10635, LNCS 10636, LNCS 10637, LNCS 10638, and LNCS 10639 constitues the proceedings of the 24rd International Conference on Neural Information Processing, ICONIP 2017, held in Guangzhou, China, in November 2017. The 563  full papers presented were carefully reviewed...
Cover of Cybersecurity ??? Attack and Defense Strategies

Cybersecurity ??? Attack and Defense Strategies

Infrastructure security with Red Team and Blue Team tactics

by Yuri Diogenes, Dr. Erdal Ozkaya
Language: English
Release Date: January 30, 2018

Enhance your organization’s secure posture by improving your attack and defense strategies Key Features Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics. Learn to unique techniques to gather exploitation...
Cover of Cryptography InfoSec Pro Guide
by Sean-Philip Oriyano
Language: English
Release Date: August 22, 2013

Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you...
Cover of Effective Python Penetration Testing
by Rejah Rehim
Language: English
Release Date: June 29, 2016

Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools About This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting...
Cover of Wireshark for Security Professionals

Wireshark for Security Professionals

Using Wireshark and the Metasploit Framework

by Jessey Bullock, Jeff T. Parker
Language: English
Release Date: February 28, 2017

Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power...
Cover of Mobile Application Security

Mobile Application Security

Protecting Mobile Devices and their Applications

by Himanshu Dwivedi, Chris Clark, David Thiel
Language: English
Release Date: February 18, 2010

Secure today's mobile devices and applications Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities...
Cover of Integrated Security Systems Design

Integrated Security Systems Design

Concepts, Specifications, and Implementation

by Thomas L. Norman
Language: English
Release Date: April 1, 2011

Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing the best possible security while saving millions in improved operations efficiency. An integrated security system is a system that has...
Cover of Cyber Security Engineering

Cyber Security Engineering

A Practical Approach for Systems and Software Assurance

by Nancy R. Mead, Carol Woody
Language: English
Release Date: November 7, 2016

Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensive best practices for building software...
Cover of Information Security Breaches

Information Security Breaches

Avoidance and Treatment based on ISO27001

by Michael Krausz
Language: English
Release Date: May 27, 2014

How would your business respond to an information security breach? If you are running a business, you learn to expect the unexpected. Even if you have taken all the right precautions, your company might still find itself confronted with an information security breach. How would your business cope...
First 22 23 24 25 26 27 2829 30 31 32 33 34 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy