Computer Security category: 2451 books

Cover of Information Security and Cryptology

Information Security and Cryptology

10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers

by
Language: English
Release Date: March 27, 2015

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions....
Cover of 10 Don'ts on Your Digital Devices

10 Don'ts on Your Digital Devices

The Non-Techie's Survival Guide to Cyber Security and Privacy

by Eric Rzeszut, Daniel Bachrach
Language: English
Release Date: October 28, 2014

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats...
Cover of Learning Android Forensics
by Rohit Tamma, Donnie Tindall
Language: English
Release Date: April 30, 2015

If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.
Cover of Practical Mobile Forensics - Second Edition
by Heather Mahalik, Rohit Tamma, Satish Bommisetty
Language: English
Release Date: May 17, 2016

A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms About This Book Get to grips with the basics of mobile forensics and the various forensic approaches Retrieve and analyze the data stored on mobile devices and on the cloud A practical guide to...
Cover of Network Security Assessment

Network Security Assessment

Know Your Network

by Chris McNab
Language: English
Release Date: December 6, 2016

How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you’ll learn how to perform network-based penetration testing in a structured manner. Security expert Chris...
Cover of iPhone and iOS Forensics

iPhone and iOS Forensics

Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

by Andrew Hoog, Katie Strzempka
Language: English
Release Date: July 25, 2011

iPhone and iOS Forensics is a guide to the forensic acquisition and analysis of iPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner, so that...
Cover of Quantum Computational Number Theory
by Song Y. Yan
Language: English
Release Date: December 26, 2015

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic...
Cover of Smart TV Security

Smart TV Security

Media Playback and Digital Video Broadcast

by Benjamin Michéle
Language: English
Release Date: November 27, 2015

This book discusses the emerging topic of Smart TV security, including its implications on consumer privacy. The author presents chapters on the architecture and functionality of Smart TVs, various attacks and defenses, and associated risks for consumers. This includes the latest attacks on broadcast-related...
Cover of Mobile Security

Mobile Security

A Pocket Guide

by Steve Furnell
Language: English
Release Date: July 16, 2009

This pocket guide gives you clear and reliable guidance on how to protect the information contained in your mobile phone. Written by one of the country’s top academic experts on information security, the guide covers such topics as safeguarding data through encryption, establishing a virtual private...
Cover of 2018 Energy Department Report on Assessment of Electricity Disruption Incident Response Capabilities, Cybersecurity of Federal Networks and Critical Infrastructure, Cyber Attack Threats and Impacts
by Progressive Management
Language: English
Release Date: June 2, 2018

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. Electricity is critical to every aspect of modern life. The United States' national security, economy, and public health and safety rely on the North American electric grid every second...
Cover of Structured Peer-to-Peer Systems

Structured Peer-to-Peer Systems

Fundamentals of Hierarchical Organization, Routing, Scaling, and Security

by Dmitry Korzun, Andrei Gurtov
Language: English
Release Date: November 12, 2012

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and...
Cover of Quantum Attacks on Public-Key Cryptosystems
by Song Y. Yan
Language: English
Release Date: July 8, 2014

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on...
Cover of Codes, Cryptology and Information Security

Codes, Cryptology and Information Security

Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet

by
Language: English
Release Date: March 7, 2017

This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017. The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions....
Cover of Financial Cryptography and Data Security

Financial Cryptography and Data Security

20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers

by
Language: English
Release Date: May 17, 2017

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016. The 27 revised full papers and 9 short papers were carefully selected and reviewed...
First 60 61 62 63 64 65 6667 68 69 70 71 72 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy