Computer Security category: 2451 books

Cover of Analyzing Online Voting Systems for Flaw Detection
by Md. Shamsur Rahim, Ehtesham Chowdhury
Language: English
Release Date: September 30, 2015

Research Paper (postgraduate) from the year 2015 in the subject Computer Science - IT-Security, grade: A, , language: English, abstract: This research paper contains several case studies concerning online voting manipulation. Case studies data are analyzed to discover how computer technology is used...
Cover of How to Cheat at VoIP Security
by Thomas Porter, CISSP, CCNP
Language: English
Release Date: April 18, 2011

The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies...
Cover of IT Infrastructure Risk & Vulnerability Library: A Consolidated Register of Operational and Technology Infrastructure Vulnerabilities for IT Assurance Professionals
by Nwabueze Ohia
Language: English
Release Date: May 9, 2018

(Information & Technology Risk Assurance, Internal Audit and IT Audit Series) IT Infrastructure Risk and Vulnerability Library is a do-it-yourself risk assessment handbook/manual that provides the reader with updated database of known risk/vulnerabilities inherent in IT systems and infrastructure...
Cover of Physical Security: 150 Things You Should Know
by Marianna Perry, Lawrence J. Fennelly
Language: English
Release Date: October 27, 2016

Physical Security: 150 Things You Should Know, Second Edition is a useful reference for those at any stage of their security career. This practical guide covers the latest technological trends for managing the physical security needs of buildings and campuses of all sizes. Through anecdotes, case...
Cover of Becoming the Hacker

Becoming the Hacker

The Playbook for Getting Inside the Mind of the Attacker

by Adrian Pruteanu
Language: English
Release Date: January 31, 2019

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy...
Cover of Kali Linux Web Penetration Testing Cookbook

Kali Linux Web Penetration Testing Cookbook

Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

by Gilberto Najera-Gutierrez
Language: English
Release Date: August 31, 2018

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security Key Features Familiarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab Explore new tools in the Kali...
Cover of Managing Cisco Network Security
by Syngress
Language: English
Release Date: May 29, 2002

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security Consulting Managing...
Cover of Security and Resiliency Analytics for Smart Grids
by Ehab Al-Shaer, Mohammad Ashiqur Rahman
Language: English
Release Date: June 9, 2016

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner.  This book...
Cover of Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I

by
Language: English
Release Date: December 28, 2018

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions....
Cover of Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II

by
Language: English
Release Date: December 28, 2018

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions....
Cover of Wireless Security and Cryptography

Wireless Security and Cryptography

Specifications and Implementations

by
Language: English
Release Date: December 19, 2017

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless...
Cover of Cyber Operations

Cyber Operations

Building, Defending, and Attacking Modern Computer Networks

by Mike O'Leary
Language: English
Release Date: October 23, 2015

Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn...
Cover of Decision and Game Theory for Security

Decision and Game Theory for Security

9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings

by
Language: English
Release Date: October 22, 2018

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions. Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security...
Cover of Nmap: Network Exploration and Security Auditing Cookbook - Second Edition
by Paulino Calderon
Language: English
Release Date: May 29, 2017

Over 100 practical recipes related to network and application security auditing using the powerful Nmap About This Book Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers. Learn the latest and most useful features of Nmap...
First 24 25 26 27 28 29 3031 32 33 34 35 36 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy