Computer Security category: 2451 books

Cover of A Bug Hunter's Diary

A Bug Hunter's Diary

A Guided Tour Through the Wilds of Software Security

by Tobias Klein
Language: English
Release Date: October 11, 2011

Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system. A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular...
Cover of Cisco ASA Configuration
by Richard Deal
Language: English
Release Date: June 5, 2009

"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with...
Cover of Low Tech Hacking

Low Tech Hacking

Street Smarts for Security Professionals

by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch
Language: English
Release Date: December 13, 2011

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking...
Cover of Configuring Juniper Networks NetScreen and SSG Firewalls
by Rob Cameron, Chris Cantrell, Anne Hemni
Language: English
Release Date: December 8, 2006

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to...
Cover of Privacy Online: The Practical Privacy Guide For Anyone
by Roger Fassinou
Language: English
Release Date: February 14, 2015

Nowadays, everyone takes security as a serious matter: individuals, companies, institutions, organizations, and government. Everyone cares about privacy; well, I hope you too. At some point, people usually do not want information to be released for various reasons; for instance, what will happen if...
Cover of Official (ISC)2 Guide to the CSSLP
by Mano Paul
Language: English
Release Date: April 19, 2016

As the global leader in information security education and certification, (ISC)2 has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP) is a testament to the organization's ongoing commitment to information and software security
Cover of Instant Java Password and Authentication Security
by Fernando Mayoral
Language: English
Release Date: November 25, 2013

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication...
Cover of Cryptocurrency and State Sovereignty: Comprehensive Review of Bitcoin, Blockchain, and Virtual Currency Technology, Hash Functions, Merkle Trees, and Security, Government Bans and Regulations
by Progressive Management
Language: English
Release Date: September 5, 2018

This mid-2018 report has been professionally converted for accurate flowing-text e-book format reproduction. Since Bitcoin's release in late 2008, the cryptocurrency has grown and proven itself as a disruptive technology, resistant to sovereign law and international financial regulations, and an alternative...
Cover of Application Security in the ISO27001 Environment
by Vinod Vasudevan
Language: English
Release Date: April 10, 2010

This book shows you how to use ISO/IEC 27001 to secure applications and how to tackle this issue as part of the development and roll out of an Information Security Management System (‘ISMS’) that conforms with ISO/IEC 27001.
Cover of Secure & Simple – A Small-Business Guide to Implementing ISO 27001 On Your Own

Secure & Simple – A Small-Business Guide to Implementing ISO 27001 On Your Own

The Plain English, Step-by-Step Handbook for Information Security Practitioners

by Dejan Kosutic
Language: English
Release Date: December 18, 2017

In Secure & Simple Dejan Kosutic, an author and experienced information security consultant, is giving away all his practical know-how on successful ISO 27001 implementation. Whether you’re new or experienced in the field, this book gives you everything you will ever need to implement ISO 27001...
Cover of The True Cost of Information Security Breaches and Cyber Crime
by Michael Krausz, Prof. John Walker
Language: English
Release Date: July 16, 2013

This pocket guide uses case studies to illustrate the possible security breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
Cover of Social Engineering in IT Security: Tools, Tactics, and Techniques
by Sharon Conheady
Language: English
Release Date: August 5, 2014

Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global...
Cover of Business Continuity and Disaster Recovery Planning for IT Professionals
by Susan Snedaker
Language: English
Release Date: September 10, 2013

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant...
Cover of Information Security Risk Management for ISO27001/ISO27002
by Alan Calder, Steve Watkins
Language: English
Release Date: April 27, 2010

Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software.
First 70 71 72 73 74 75 7677 78 79 80 81 82 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy