Computer Security category: 2451 books

Cover of Quantum Computing for Computer Scientists
by Noson S. Yanofsky, Mirco A. Mannucci
Language: English
Release Date: August 11, 2008

The multidisciplinary field of quantum computing strives to exploit some of the uncanny aspects of quantum mechanics to expand our computational horizons. Quantum Computing for Computer Scientists takes readers on a tour of this fascinating area of cutting-edge research. Written in an accessible yet...
Cover of BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
by Tom St Denis
Language: English
Release Date: August 18, 2006

Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader regarding how to implement efficient...
Cover of Programmatic Integration of Cyber into the Institutional Domain of Leader Development: Cyberspace and Computer Curriculum in Army Learning Institutions, Comparing Cyber to Armor or Aviation
by Progressive Management
Language: English
Release Date: May 12, 2018

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This study assesses the institutional domain of leader development in relation to cyberspace education and the implications of poorly integrating cyberspace into leader development....
Cover of Dynamic Games for Network Security
by Xiaofan He, Huaiyu Dai
Language: English
Release Date: February 28, 2018

The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with...
Cover of Conducting Network Penetration and Espionage in a Global Environment
by Bruce Middleton
Language: English
Release Date: April 28, 2014

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially avai
Cover of Cyberterrorism After Stuxnet - Terrorist Cyberattacks, Distributed Denial of Service (DDoS), Motives, Critical U.S. Infrastructure Vulnerabilities, al-Qaeda Computer Capability, PC Attacks
by Progressive Management
Language: English
Release Date: January 11, 2015

Public government statements have cited cyber-attacks by terrorists as a major concern for national security. To date, no large-scale cyber-terrorist attack has been observed, but terrorists are known to be using the Internet for various routine purposes. The discovery of Stuxnet in 2010 was a milestone...
Cover of Building a Practical Information Security Program
by Jason Andress, Mark Leary
Language: English
Release Date: November 1, 2016

Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but...
Cover of Advanced Persistent Training

Advanced Persistent Training

Take Your Security Awareness Program to the Next Level

by Jordan Schroeder
Language: English
Release Date: June 14, 2017

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that...
Cover of Cyber Security Cryptography and Machine Learning

Cyber Security Cryptography and Machine Learning

First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings

by
Language: English
Release Date: June 14, 2017

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods...
Cover of Auditing your Payment Cards Processes, Systems and Applications: A Step By Step PCIDSS Compliant Audit Program (A Practical Guide for Payment Card Brand, Issuers, Acquirers, Processors and Switches)
by Nwabueze Ohia
Language: English
Release Date: May 7, 2018

Despite investment made by businesses that process, store, transmit and access cardholder information in the area of security, data breaches have continued to occur in a disturbing scale leading to loss of funds by cardholders, financial institutions and insurance companies. Players in the payment...
Cover of Research Methods for Cyber Security
by Thomas W. Edgar, David O. Manz
Language: English
Release Date: April 19, 2017

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction...
Cover of The Basics of Information Security

The Basics of Information Security

Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress
Language: English
Release Date: May 20, 2014

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity,...
Cover of How to Cheat at Managing Information Security
by Mark Osborne
Language: English
Release Date: August 22, 2006

This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but...
Cover of Emerging Trends in ICT Security
by
Language: English
Release Date: November 6, 2013

Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment...
First 23 24 25 26 27 28 2930 31 32 33 34 35 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy