Computer Security category: 2451 books

Cover of Managing Security with Snort & IDS Tools

Managing Security with Snort & IDS Tools

Intrusion Detection with Open Source Tools

by Kerry J. Cox, Christopher Gerg
Language: English
Release Date: August 2, 2004

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts,...
Cover of CISSP Boxed Set, Second Edition
by Shon Harris
Language: English
Release Date: September 16, 2013

Save 12% on This CISSP Boxed Set—Plus Bonus DVD! This money-saving CISSP boxed set from the #1 name in IT security certification and training includes: CISSP All-in-One Exam Guide, Sixth Edition Up-to-date coverage of all 10 CISSP exam domains Electronic content—1400+ practice exam...
Cover of Security for Web Developers

Security for Web Developers

Using JavaScript, HTML, and CSS

by John Paul Mueller
Language: English
Release Date: November 10, 2015

As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. You’ll learn how...
Cover of How to Define and Build an Effective Cyber Threat Intelligence Capability
by Henry Dalziel
Language: English
Release Date: December 5, 2014

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become...
Cover of Cyber Security

Cyber Security

Deterrence and IT Protection for Critical Infrastructures

by
Language: English
Release Date: October 4, 2013

The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber...
Cover of IoT Penetration Testing Cookbook
by Aaron Guzman, Aditya Gupta
Language: English
Release Date: November 29, 2017

Over 80 recipes to master IoT security techniques. About This Book Identify vulnerabilities in IoT device architectures and firmware using software and hardware pentesting techniques Understand radio communication analysis with concepts such as sniffing the air and capturing radio signals A recipe...
Cover of Android Security Cookbook
by Keith Makan, Scott Alexander-Bown
Language: English
Release Date: December 23, 2013

Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs."Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be...
Cover of Kali Linux Cookbook - Second Edition
by Corey P. Schultz, Bob Perciaccante
Language: English
Release Date: September 12, 2017

Over 80 recipes to effectively test your network and boost your career in security About This Book Learn how to scan networks to find vulnerable computers and servers Hack into devices to control them, steal their data, and make them yours Target wireless networks, databases, and web servers,...
Cover of Cyber Security and Privacy

Cyber Security and Privacy

4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers

by
Language: English
Release Date: October 7, 2015

This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are...
Cover of Wireless Mobile Internet Security
by Man Young Rhee
Language: English
Release Date: March 26, 2013

The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will...
Cover of CSA Guide to Cloud Computing

CSA Guide to Cloud Computing

Implementing Cloud Privacy and Security

by Raj Samani, Jim Reavis, Brian Honan
Language: English
Release Date: September 22, 2014

CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the...
Cover of DNS Security

DNS Security

Defending the Domain Name System

by Allan Liska, Geoffrey Stowe
Language: English
Release Date: June 10, 2016

DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as...
Cover of Information Systems Security

Information Systems Security

13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings

by
Language: English
Release Date: December 8, 2017

This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017. The 17 revised full papers and 7 short papers presented together with 2 invited papers were carefully reviewed and selected...
Cover of Security and Privacy for Mobile Healthcare Networks
by Kuan Zhang, Xuemin (Sherman) Shen
Language: English
Release Date: November 9, 2015

This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future...
First 35 36 37 38 39 40 4142 43 44 45 46 47 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy