Computer Security category: 2451 books

Cover of Seven Deadliest Social Network Attacks
by Carl Timm, Richard Perez
Language: English
Release Date: June 2, 2010

Seven Deadliest Social Network Attacks provides a comprehensive view into how social networking attacks have impacted the livelihood and lives of adults and children. The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered through the use of...
Cover of Database Nation

Database Nation

The Death of Privacy in the 21st Century

by Simson Garfinkel
Language: English
Release Date: December 4, 2000

Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day...
Cover of Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
by Slava Gomzin
Language: English
Release Date: June 7, 2012

Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology. Topics include: review of security features such as Authentication, Integrity,...
Cover of IBM Mainframe Security

IBM Mainframe Security

Beyond the Basics-A Practical Guide from a z/OS and RACF Perspective

by Dinesh D. Dattani
Language: English
Release Date: October 15, 2013

Rather than rehashing basic information—such as command syntax—already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance, discussing the important issues in IBM mainframe security. Mainframes are the backbone of most...
Cover of SAP Security Configuration and Deployment

SAP Security Configuration and Deployment

The IT Administrator's Guide to Best Practices

by Joey Hirao
Language: English
Release Date: November 18, 2008

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their...
Cover of CCSP Certified Cloud Security Professional Practice Exams
by Daniel Carter
Language: English
Release Date: March 8, 2018

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Don’t Let the Real Test Be Your First Test! This highly effective self-study guide covers all...
Cover of SSH, The Secure Shell: The Definitive Guide
by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
Language: English
Release Date: November 30, 2011

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most...
Cover of Security Informatics
by
Language: English
Release Date: January 8, 2010

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount...
Cover of Online Security: Password Keys
by O-O Happiness
Language: English
Release Date: May 28, 2014

Each week there seems to be a new online password scare as a major company is hacked and your passwords exposed to the world. Yes, you should have a complex password, yes you should have a different password for each site -but no, you don't have a computer brain. Why not use our password keys?...
Cover of Security, Privacy and Anonymity in Computation, Communication and Storage

Security, Privacy and Anonymity in Computation, Communication and Storage

SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings

by
Language: English
Release Date: November 9, 2016

This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and...
Cover of Building a Digital Forensic Laboratory

Building a Digital Forensic Laboratory

Establishing and Managing a Successful Facility

by Andrew Jones, Craig Valli
Language: English
Release Date: April 19, 2011

The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the investigations themselves. This...
Cover of Hacking Exposed 5th Edition
by
Language: English
Release Date: April 19, 2005

“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine "The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine "For almost any computer...
Cover of Security Information and Event Management (SIEM) Implementation
by David Miller, Zachary Payton, Allen Harper
Language: English
Release Date: October 15, 2010

Implement SIEM to efficiently analyze and report data, respond to inside and outside threats, and follow compliance regulations Security Information and Event Management (SIEM) Implementation shows how to take advantage of SIEM technology for real-time analysis of security alerts generated by network...
Cover of Defensive Security Handbook

Defensive Security Handbook

Best Practices for Securing Infrastructure

by Lee Brotherston, Amanda Berlin
Language: English
Release Date: April 3, 2017

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide...
First 26 27 28 29 30 31 3233 34 35 36 37 38 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy