Computer Security category: 2451 books

Cover of PBX Security and Forensics

PBX Security and Forensics

A Practical Approach

by I.I. Androulidakis
Language: English
Release Date: July 26, 2012

PBX Security and Forensics presents readers with theoretical and practical background for Private Branch Exchanges (PBXs). PBX is privately owned equipment that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users...
Cover of VMware View Security Essentials
by Daniel Langenhan
Language: English
Release Date: July 26, 2013

A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a “how-to” for the novice, a “reference guide” for the advanced user, and a “go to" for the experienced user in all the aspects of VMware View desktop virtualization security.
Cover of Ethical Issues and Security Monitoring Trends in Global Healthcare
by
Language: English
Release Date: December 31, 2010

A significant benefit of the move towards electronic creation and storage of personally identifiable health information is the opportunity for secondary use of this data. Ethical Issues and Security Monitoring Trends in Global Healthcare: Technological Advancements identifies practices and strategies...
Cover of Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents
by Martin C. Libicki, David C. Gompert, David R. Frelinger
Language: English
Release Date: September 28, 2007

U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government...
Cover of Vehicular Cyber Physical Systems

Vehicular Cyber Physical Systems

Adaptive Connectivity and Security

by Danda B. Rawat, Chandra Bajracharya
Language: English
Release Date: September 3, 2016

This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations,...
Cover of CompTIA Network+ Certification Study Guide: Exam N10-004
by Robert Shimonski, Naomi Alpern, Michael Cross
Language: English
Release Date: August 6, 2009

CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the CompTIA Network+ exam. The...
Cover of Advanced Infrastructure Penetration Testing

Advanced Infrastructure Penetration Testing

Defend your systems from methodized and proficient attackers

by Chiheb Chebbi
Language: English
Release Date: February 26, 2018

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure Key Features Advanced exploitation techniques to breach modern operating systems and complex network devices Learn about Docker breakouts,...
Cover of Privileged Attack Vectors

Privileged Attack Vectors

Building Effective Cyber-Defense Strategies to Protect Organizations

by Brad Hibbert, Morey J. Haber
Language: English
Release Date: December 8, 2017

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network,...
Cover of Malware Data Science

Malware Data Science

Attack Detection and Attribution

by Joshua Saxe, Hillary Sanders
Language: English
Release Date: September 25, 2018

Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks...
Cover of CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-001)
by Jeff T. Parker
Language: English
Release Date: October 5, 2018

Prepare for the CompTIA CySA+ certification exam with this effective self-study resource Don’t Let the Real Test Be Your First Test! Pass the new Cybersecurity Analyst+ certification exam and obtain the latest security credential from CompTIA using the accurate practice questions contained...
Cover of Instant Citrix Security How-to
by Carmel Jacob
Language: English
Release Date: February 20, 2013

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich screenshots for easy comprehension.This easy-to-follow, hands-on guide shows you how to bolster...
Cover of SELinux System Administration - Second Edition
by Sven Vermeulen
Language: English
Release Date: December 16, 2016

Ward off traditional security permissions and effectively secure your Linux systems with SELinux About This Book Leverage SELinux to improve the secure state of your Linux system A clear approach to adopting SELinux within your organization Essential skills and techniques to help further your...
Cover of Secure IP Mobility Management for VANET
by Xuemin Shen, Sanaa Taha
Language: English
Release Date: August 28, 2013

This brief presents the challenges and solutions for VANETs’ security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations...
Cover of Information Security and Cryptology – ICISC 2016

Information Security and Cryptology – ICISC 2016

19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers

by
Language: English
Release Date: February 8, 2017

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There...
First 77 78 79 80 81 82 8384 85 86 87 88 89 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy