Computer Security category: 2451 books

Cover of Security and Privacy Trends in the Industrial Internet of Things
by
Language: English
Release Date: May 13, 2019

This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today’s industry, also known as the Industry...
Cover of Digital Privacy and Security Using Windows
by Rami Hijazi, Nihad Hassan
Language: English
Release Date: July 2, 2017

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure...
Cover of Bring Your Own Device (BYOD) to Work
by Bob Hayes, Kathleen Kotwica, PhD
Language: English
Release Date: March 25, 2013

Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources...
Cover of Cyber Security
by
Language: English
Release Date: January 16, 2014

Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.
Cover of Eleventh Hour Security+

Eleventh Hour Security+

Exam SY0-201 Study Guide

by Ido Dubrawsky
Language: English
Release Date: October 3, 2009

Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; application security; virtualization technologies;...
Cover of Selling Information Security to the Board
by Alan Calder
Language: English
Release Date: March 31, 2016

Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day....
Cover of Information Security

Information Security

20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings

by
Language: English
Release Date: November 13, 2017

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.  The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized...
Cover of Mastering Kali Linux Wireless Pentesting
by Jilumudi Raghu Ram, Brian Sak
Language: English
Release Date: February 25, 2016

Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux About This Book Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks Perform...
Cover of Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server
by Slava Gomzin
Language: English
Release Date: April 18, 2012

Booklet for developers and security professionals on how to implement SSL in order to protect data transmission between .NET client and server. The guide contains examples of the client application code and certificate validations in C#. Topics include: what is SSL certificate and how to use...
Cover of Security in Computing and Communications

Security in Computing and Communications

Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

by
Language: English
Release Date: August 7, 2015

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions....
Cover of InduSoft Application Design and SCADA Deployment Recommendations for Industrial Control System Security
by Richard Clark
Language: English
Release Date: January 12, 2015

InduSoft conducts ongoing product and informational SCADA security webinars, publish Technical Notes and White Papers on application construction and security related topics, and publishes corporate blogs on security and a number of other useful topics by a variety of different authors. Topics from...
Cover of Hands-On Cybersecurity with Blockchain

Hands-On Cybersecurity with Blockchain

Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

by Rajneesh Gupta
Language: English
Release Date: June 28, 2018

Develop blockchain application with step-by-step instructions, working example and helpful recommendations Key Features Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deployment...
Cover of Nokia Firewall, VPN, and IPSO Configuration Guide
by Andrew Hay, Keli Hay, Peter Giannoulis
Language: English
Release Date: February 7, 2009

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements." --Chris Christiansen, Vice President, Internet Infrastructure and Security...
Cover of Mastering OAuth 2.0
by Charles Bihis
Language: English
Release Date: December 15, 2015

Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework About This Book Learn how to use the OAuth 2.0 protocol to interact with the world's most popular service providers, such as...
First 38 39 40 41 42 43 4445 46 47 48 49 50 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy