Computer Security category: 2451 books

Cover of Security, Privacy, and Applied Cryptography Engineering

Security, Privacy, and Applied Cryptography Engineering

7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings

by
Language: English
Release Date: November 27, 2017

This book constitutes the refereed proceedings of the 7th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2017, held in Goa, India, in December 2017. The 13 revised full papers presented together with 1 short paper, 7 invited talks, and 4 tutorials...
Cover of Computational Intelligence, Cyber Security and Computational Models
by
Language: English
Release Date: November 26, 2013

This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore,...
Cover of Computational Intelligence, Cyber Security and Computational Models
by
Language: English
Release Date: December 18, 2015

This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December...
Cover of Secure Your Network for Free
by Eric Seagren
Language: English
Release Date: April 18, 2011

This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants...
Cover of Intelligence and Security Informatics

Intelligence and Security Informatics

12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings

by
Language: English
Release Date: May 11, 2017

This book constitutes the refereed proceedings of the 12th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2017, held in Jeju Island, South Korea, in May 2017 in conjunction with PAKDD 2017, the 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8...
Cover of Information Security and Cryptology

Information Security and Cryptology

12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers

by
Language: English
Release Date: March 2, 2017

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions....
Cover of Cryptography and Information Security in the Balkans

Cryptography and Information Security in the Balkans

Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers

by
Language: English
Release Date: January 8, 2016

This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions....
Cover of Managing Information Security Breaches
by Michael Krausz
Language: English
Release Date: November 25, 2010

Managing Information Security Breaches sets out a strategic framework for handling this kind of emergency. It focuses on the treatment of severe breaches and on how to re-establish safety and security once the breach has occurred. These recommendations support the controls for the treatment of breaches specified under ISO27001:2005.   
Cover of The Security Consultant's Handbook
by Richard Bingley
Language: English
Release Date: September 29, 2015

Featuring case studies, checklists,  and helpful chapter summaries, The Security Consultant's Handbook aims to be a practical and enabling guide for security officers and contractors
Cover of Kali Linux – Assuring Security by Penetration Testing
by Lee Allen, Tedi Heriyanto, Ali Shakeel
Language: English
Release Date: April 7, 2014

Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing...
Cover of Cryptography
by William J. Buchanan
Language: English
Release Date: September 27, 2017

Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography and provide...
Cover of Vehicular Ad Hoc Network Security and Privacy
by Xiaodong Lin, Rongxing Lu
Language: English
Release Date: June 5, 2015

This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social...
Cover of Information Science and Applications 2017
by
Language: English
Release Date: March 16, 2017

This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to...
Cover of VoIP and PBX Security and Forensics
by Iosif I. Androulidakis
Language: English
Release Date: April 25, 2016

This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving...
First 61 62 63 64 65 66 6768 69 70 71 72 73 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy