Computer Security category: 2451 books

Cover of Introduction to Computer Networks and Cybersecurity
by Chwan-Hwa (John) Wu, J. David Irwin
Language: English
Release Date: April 19, 2016

If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effective
Cover of Forensic Computing

Forensic Computing

A Practitioner’s Guide

by Brian Jenkinson, Anthony Sammes
Language: English
Release Date: April 17, 2013

In this book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes. "Forensic Computing: A Practitioner's Guide" is illustrated by plenty of case studies and worked examples,...
Cover of How To Get Rid of Keyloggers
by Lily Thoms
Language: English
Release Date: April 20, 2013

How To Get Rid of Keyloggers A keylogger is a device that is installed on your computer and is used to record passwords, keystrokes and other important information. These are the most common tools used by hackers and can be very dangerous if you have important information on your computer...
Cover of Some Tutorials In Computer Hacking
by Dr. Hidaia Alassouli
Language: English
Release Date: August 20, 2018

The objective of this work is to provide some quick tutorials in certified ethical hacking. The work includes the following tutorials: •Tutorial 1: Setting Up Penetrating Tutorial in Linux. •Tutorial 2: Setting Up Penetrating Tutorial in Windows. •Tutorial 3: OS Command Injection: •Tutorial...
Cover of Database Anonymization

Database Anonymization

Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

by David Sánchez, Josep Domingo-Ferrer, Jordi Soria-Comas
Language: English
Release Date: January 1, 2016

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental...
Cover of Multiple-Base Number System

Multiple-Base Number System

Theory and Applications

by Vassil Dimitrov, Graham Jullien, Roberto Muscedere
Language: English
Release Date: December 19, 2017

Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the area. As a result, they are losing out on emerging opportunities to optimize its use in targeted applications and technologies. In many cases, easily available...
Cover of Integrating Python with Leading Computer Forensics Platforms
by Chet Hosmer
Language: English
Release Date: September 26, 2016

Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be immediately put to use. Noted author Chet Hosmer demonstrates...
Cover of Smart Trends in Information Technology and Computer Communications

Smart Trends in Information Technology and Computer Communications

Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papers

by
Language: English
Release Date: August 20, 2018

This book constitutes the refereed proceedings of the Second International Conference on Smart Trends in Information Technology and Computer Communications, SmartCom 2017, held in Pune, India, in August 2017. The 38 revised papers presented were carefully reviewed and selected from 310 submissions....
Cover of Heimnetzwerke XL-Edition

Heimnetzwerke XL-Edition

DSL/WLAN/PC/Handy/Drucker & Co.

by Rudolf G. Glos, Michael Seemann
Language: German
Release Date: April 11, 2013

Der Aufbau eines gut funktionierenden Heimnetzwerks ist keine Hexerei. Lernen Sie die Schnittstellen kennen, auf die es ankommt, um die unterschiedlichsten Geräte problemlos ans Heimnetz andocken zu können: WLAN-Router, Netzwerkfestplatte, Webradio, Fernseher, Blu-ray-Player, Hi-Fi-Anlage, Drucker,...
Cover of Advanced Persistent Threat

Advanced Persistent Threat

Understanding the Danger and How to Protect Your Organization

by Eric Cole
Language: English
Release Date: December 31, 2012

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent...
Cover of The IT Regulatory and Standards Compliance Handbook

The IT Regulatory and Standards Compliance Handbook

How to Survive Information Systems Audit and Assessments

by Craig S. Wright
Language: English
Release Date: July 25, 2008

The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap"...
Cover of Digital Identity

Digital Identity

Unmasking Identity Management Architecture (IMA)

by Phillip J. Windley
Language: English
Release Date: August 1, 2005

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks....
Cover of Social Media Security

Social Media Security

Leveraging Social Networking While Mitigating Risk

by Michael Cross
Language: English
Release Date: November 1, 2013

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people’s lives and is now becoming a significant driving...
Cover of The Five Anchors of Cyber Resilience

The Five Anchors of Cyber Resilience

Why some enterprises are hacked into bankruptcy, while others easily bounce back

by Phillimon Zongo
Language: English
Release Date: June 15, 2018

Cybersecurity is a key priority for company directors, business executives, chief information security officers, and risk-management professionals across all sectors. In The Five Anchors of CYBER Resilience, Phil Zongo, an award-winning cybersecurity expert, strips away the ambiguity and complexity...
First 69 70 71 72 73 74 7576 77 78 79 80 81 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy