Computer Security category: 2451 books

Cover of Threats, Countermeasures, and Advances in Applied Information Security
by
Language: English
Release Date: April 30, 2012

Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow exponentially. Threats, Countermeasures, and Advances in Applied Information Security addresses the fact that managing information security program while effectively...
Cover of Oracle Quick Guides Part 4 - Oracle Administration: Security and Privilege
by Malcolm Coxall
Language: English
Release Date: April 8, 2016

This is Part 4 of a series of quick learning guides for Oracle designers, developers and managers including database administrators. Part 4 introduces early entrants with basic Oracle skills to the main concepts of Oracle data security and user privilege management and administration. The guide includes...
Cover of Free Antivirus And Antimalware Software For Ubuntu & Linux Mint
by Cyber Jannah Studio
Language: English
Release Date: October 21, 2018

Complete list free antivirus and free antimalware software availabe for ubuntu and linux mint. Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.Antivirus software was originally developed...
Cover of Automated Security Analysis of Android and iOS Applications with Mobile Security Framework
by Henry Dalziel, Ajin Abraham
Language: English
Release Date: December 10, 2015

Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security...
Cover of Primer on Client-Side Web Security
by Philippe De Ryck, Lieven Desmet, Frank Piessens
Language: English
Release Date: November 25, 2014

This volume illustrates the continuous arms race between attackers and defenders of the Web ecosystem by discussing a wide variety of attacks. In the first part of the book, the foundation of the Web ecosystem is briefly recapped and discussed. Based on this model, the assets of the Web ecosystem...
Cover of Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings

by
Language: English
Release Date: June 13, 2017

This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected...
Cover of Combat Ready IT and PIE

Combat Ready IT and PIE

Cyber Security for Small Medium Business and Perpetual Improvement Everywhe

by P.B. Dove
Language: English
Release Date: August 20, 2015

Like the Industrial Revolution and the Information Technology Age, this year we started a new Wave headlined as the Golden Wave of the SMB - (the age of the Artisan). Enterprises have already commenced reducing their workforces. Craftflows will be handed off out to artisans, specialists, and in particular...
Cover of Information Security and Cryptology - ICISC 2014

Information Security and Cryptology - ICISC 2014

17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers

by
Language: English
Release Date: March 16, 2015

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two...
Cover of Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
by
Language: English
Release Date: October 31, 2013

While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications,...
Cover of Mastering Kali Linux for Advanced Penetration Testing - Second Edition

Mastering Kali Linux for Advanced Penetration Testing - Second Edition

Secure your network with Kali Linux – the ultimate white hat hackers' toolkit

by Vijay Kumar Velu
Language: English
Release Date: June 30, 2017

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book Employ advanced pentesting techniques with Kali Linux to build highly-secured systems Get to grips with various stealth techniques to remain undetected...
Cover of Network Security Technologies

Network Security Technologies

Design and Applications

by
Language: English
Release Date: November 30, 2013

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network...
Cover of Elements of Cloud Computing Security

Elements of Cloud Computing Security

A Survey of Key Practicalities

by Mohammed M. Alani
Language: English
Release Date: July 14, 2016

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information...
Cover of Information Security and Cryptology -- ICISC 2013

Information Security and Cryptology -- ICISC 2013

16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers

by
Language: English
Release Date: October 18, 2014

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from...
Cover of Learn Kali Linux 2018

Learn Kali Linux 2018

A hands-on guide for learning web application and network penetration testing using Kali Linux 2018.2

by Glen D. Singh, Joshua Crumbaugh
Language: English
Release Date: October 9, 2019

Leverage Kali Linux to learn the latest ethical hacking tools and techniques About This Book Learn to use Linux commands like ethical hackers to gain control of your environment. Get to grips with security concepts like social engineering, wireless network exploitation, web application attacks...
First 36 37 38 39 40 41 4243 44 45 46 47 48 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy