Computer Security category: 2451 books

Cover of Building an Information Security Awareness Program

Building an Information Security Awareness Program

Defending Against Social Engineering and Technical Threats

by Bill Gardner, Valerie Thomas
Language: English
Release Date: August 12, 2014

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program...
Cover of Stealing the Network

Stealing the Network

How to Own a Shadow

by Johnny Long, Timothy Mullen, Ryan Russell
Language: English
Release Date: April 18, 2011

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How...
Cover of CCNP CISCO CERTIFIED NETWORK PROFESSIONAL SECURITY (SIMOS) TECHNOLOGY WORKBOOK
by IP Specialist
Language: English
Release Date: November 21, 2017

Cisco Certified Network Professional Security (CCNP Security) certification program is aligned specifically to the job role of the Cisco Network Security Engineer responsible for Security in Routers, Switches, Networking devices and appliances, as well as choosing, deploying, supporting and troubleshooting...
Cover of Penetration Testing: A Survival Guide
by Wolf Halton, Bo Weaver, Juned Ahmed Ansari
Language: English
Release Date: January 18, 2017

A complete pentesting guide facilitating smooth backtracking for working hackers About This Book Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Pentest...
Cover of Hacking
by Jeremy Li
Language: English
Release Date: October 31, 2016

Hacking The Ultimate Beginners to Experts Guide to Computer Hacking, Penetration Testing and Basic Security Coding In this book, entitled “Hacking” we discuss how hacking affects us. Hacking is mostly know for its disadvantages but it does have advantages too.  Hacker and malicious...
Cover of Healthcare Information Security and Privacy
by Sean P. Murphy
Language: English
Release Date: January 9, 2015

Secure and protect sensitive personal patient healthcare information Written by a healthcare information security and privacy expert, this definitive resource fully addresses security and privacy controls for patient healthcare information. Healthcare Information Security and Privacy introduces you...
Cover of Internet Forensics

Internet Forensics

Using Digital Evidence to Solve Computer Crime

by Robert Jones
Language: English
Release Date: October 7, 2005

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics...
Cover of The Death of the Internet
by
Language: English
Release Date: July 11, 2012

Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition,...
Cover of Foundations of Information Security
by Jason Andress
Language: English
Release Date: November 12, 2019

High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. Foundations of Information...
Cover of Dynamic SQL

Dynamic SQL

Applications, Performance, and Security

by Ed Pollack
Language: English
Release Date: April 29, 2016

This book is an introduction and deep-dive into the many uses of dynamic SQL in Microsoft SQL Server. Dynamic SQL is key to large-scale searching based upon user-entered criteria. It’s also useful in generating value-lists, in dynamic pivoting of data for business intelligence reporting, and for...
Cover of Information Warfare
by William Hutchinson, Matthew Warren
Language: English
Release Date: May 4, 2012

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information...
Cover of Seven Deadliest Web Application Attacks
by Mike Shema
Language: English
Release Date: February 20, 2010

Seven Deadliest Wireless Technologies Attacks draws attention to the vagaries of Web security by discussing the seven deadliest vulnerabilities exploited by attackers. Each chapter presents examples of different attacks conducted against Web sites. The methodology behind the attack is explored, showing...
Cover of Proceedings of the 2nd Workshop on Communication Security

Proceedings of the 2nd Workshop on Communication Security

Cryptography and Physical Layer Security

by
Language: English
Release Date: July 11, 2017

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge...
Cover of Reconfigurable Cryptographic Processor
by Leibo Liu, Bo Wang, Shaojun Wei
Language: English
Release Date: May 16, 2018

This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also presents...
First 29 30 31 32 33 34 3536 37 38 39 40 41 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy