Computer Security category: 2451 books

Cover of Application Security in the ISO 27001:2013 Environment
by Vinod Vasudevan
Language: English
Release Date: October 15, 2015

A comprehensive guide to web application security, from development to deployment, as part of a wider ISO 27001 information security management system.
Cover of Learning Malware Analysis

Learning Malware Analysis

Explore the concepts, tools, and techniques to analyze and investigate Windows malware

by Monnappa K A
Language: English
Release Date: June 29, 2018

Understand malware analysis and its practical implementation Key Features Explore the key concepts of malware analysis and memory forensics using real-world examples Learn the art of detecting, analyzing, and investigating malware threats Understand adversary tactics and techniques Book Description Malware...
Cover of Cyber Blackout

Cyber Blackout

When the Lights Go Out -- Nation at Risk

by John A. Adams Jr.
Language: English
Release Date: March 13, 2015

With over 140 countries fielding nation-state and rouge malious cyber hacking capabilities, it is critical that we are aware of threats and vulnerabilities. Adm. Michael Rogers, director of the National Security Agency warned Congress regarding cyber attacks, “It’s only a matter of the ‘when,’...
Cover of Android Application Security Essentials
by Pragati Ogal Rai
Language: English
Release Date: August 21, 2013

Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way. If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and...
Cover of Private Investigation and Homeland Security
by Daniel J. Benny
Language: English
Release Date: November 25, 2016

The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private...
Cover of Mobile Security: How to secure, privatize and recover your devices
by Timothy Speed, Darla Nykamp, Joseph Anderson
Language: English
Release Date: September 10, 2013

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being...
Cover of The Basics of Digital Privacy

The Basics of Digital Privacy

Simple Tools to Protect Your Personal Information and Your Identity Online

by Denny Cherry
Language: English
Release Date: November 21, 2013

Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your...
Cover of Learning Penetration Testing with Python
by Christopher Duffy
Language: English
Release Date: September 30, 2015

Utilize Python scripting to execute effective and efficient penetration testsAbout This BookUnderstand how and where Python scripts meet the need for penetration testingFamiliarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch critical dataDevelop...
Cover of IT Induction and Information Security Awareness
by Valerie Maddock
Language: English
Release Date: February 9, 2010

If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological, failings. However, the human factor usually receives far less attention.
Cover of Node Security
by Dominic Barnes
Language: English
Release Date: October 25, 2013

A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this...
Cover of Critical Information Infrastructures Security

Critical Information Infrastructures Security

11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers

by
Language: English
Release Date: November 21, 2017

This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016. The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions....
Cover of Financial Cryptography and Data Security

Financial Cryptography and Data Security

21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers

by
Language: English
Release Date: December 22, 2017

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017. The 30 revised full papers and 5 short papers were carefully selected and reviewed from...
Cover of INSTANT Kali Linux
by Abhinav Singh
Language: English
Release Date: October 25, 2013

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing...
Cover of Anonymous Security Systems and Applications

Anonymous Security Systems and Applications

Requirements and Solutions

by Shinsuke Tamura
Language: English
Release Date: May 31, 2012

As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual’s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers’ lives...
First 59 60 61 62 63 64 6566 67 68 69 70 71 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy