Computer Security category: 2451 books

Cover of Applied Network Security Monitoring

Applied Network Security Monitoring

Collection, Detection, and Analysis

by Chris Sanders, Jason Smith
Language: English
Release Date: November 26, 2013

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle...
Cover of Securing Ajax Applications

Securing Ajax Applications

Ensuring the Safety of the Dynamic Web

by Christopher Wells
Language: English
Release Date: July 11, 2007

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become...
Cover of Cloud Computing Security

Cloud Computing Security

Foundations and Challenges

by
Language: English
Release Date: September 19, 2016

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in...
Cover of Kali Linux Intrusion and Exploitation Cookbook
by Dhruv Shah, Ishan Girdhar
Language: English
Release Date: April 21, 2017

Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments About This Book Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits Improve your testing efficiency with the use of automated...
Cover of Essential PHP Security

Essential PHP Security

A Guide to Building Secure Web Applications

by Chris Shiflett
Language: English
Release Date: October 13, 2005

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more...
Cover of Hands-On Oracle Application Express Security

Hands-On Oracle Application Express Security

Building Secure Apex Applications

by Recx
Language: English
Release Date: April 9, 2013

An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications...
Cover of Identity and Data Security for Web Development
by Jonathan LeBlanc, Tim Messerschmidt
Language: English
Release Date: June 6, 2016

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical...
Cover of Information Theoretic Security

Information Theoretic Security

10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings

by
Language: English
Release Date: November 25, 2017

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the...
Cover of Information Theoretic Security

Information Theoretic Security

7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings

by
Language: English
Release Date: January 22, 2014

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security,...
Cover of Secure Coding in C and C++

Secure Coding in C and C++

Secure Coding in C and C+_2

by Robert C. Seacord
Language: English
Release Date: March 23, 2013

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them   Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small...
Cover of Kali Linux Network Scanning Cookbook - Second Edition
by Michael Hixon, Justin Hutchens
Language: English
Release Date: May 26, 2017

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning About This Book Learn the fundamentals behind commonly used scanning techniques Deploy powerful scanning tools that are integrated into the Kali Linux testing...
Cover of Linux Server Security

Linux Server Security

Hack and Defend

by Chris Binnie
Language: English
Release Date: May 3, 2016

Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran...
Cover of Mobile Phone Security and Forensics
by I.I. Androulidakis
Language: English
Release Date: March 29, 2012

Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of...
Cover of Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition

by Vijay Kumar Velu, Robert Beggs
Language: English
Release Date: January 30, 2019

A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key Features Employ advanced pentesting techniques with Kali Linux to build highly secured systems Discover various stealth techniques to remain undetected and defeat modern...
First 40 41 42 43 44 45 4647 48 49 50 51 52 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy