Computer Security category: 2451 books

Cover of Fault Tolerant Architectures for Cryptography and Hardware Security
by
Language: English
Release Date: March 29, 2018

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of...
Cover of Provable Security

Provable Security

12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings

by
Language: English
Release Date: October 10, 2018

This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018.  The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical...
Cover of Script Injection
by L Mohan Arun
Language: English
Release Date: November 1, 2015

In this book you'll learn how to:Be able to tell whether your website is infected by script injection attack.Fix your own website when a script injection attack is detected.Save hundreds of dollars that would otherwise be spent upon hiring security fixers or one-time website hacking experts who...
Cover of Mastering Identity and Access Management with Microsoft Azure

Mastering Identity and Access Management with Microsoft Azure

Empower users by managing and protecting identities and data, 2nd Edition

by Jochen Nickel
Language: English
Release Date: February 26, 2019

Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments Key Features Understand how to identify and manage business drivers during transitions Explore Microsoft Identity and Access Management as a Service (IDaaS)...
Cover of JavaScript Security

JavaScript Security

Sicherheit im Webbrowser

by Carsten Eilers
Language: German
Release Date: January 28, 2015

Prinzipiell kann jedes Computerprogramm Schwachstellen enthalten. Auch JavaScript- und HTML5-Code stellen hier keine Ausnahme dar. Im ersten Kapitel dieses shortcuts werden XSS und browserbasierte Botnets genauer betrachtet. Kapitel 2 geht auf die Sicherheitssituation von HTML5 ein. Dabei beleuchtet...
Cover of IT-Security und Botnetze. Aktuelle Angriffs- und Abwehrmethoden
by Dominik Wagner
Language: German
Release Date: June 10, 2011

Diplomarbeit aus dem Jahr 2010 im Fachbereich Informatik - IT-Security, Note: 1,00, Fachhochschule St. Pölten (Netzwerktechnik/Netzwerksicherheit), Sprache: Deutsch, Abstract: Das kontinuierliche Angebotswachstum im Internet wird von der steigenden Anzahl an Hackerattacken, sowie Einbrüchen in fremde...
Cover of CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition
by Peter H. Gregory
Language: English
Release Date: October 28, 2016

This up-to-date self-study system offers 100% coverage of every topic on the 2016 version of the CISA exam The fully revised new edition delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. Written by an IT security and auditing...
Cover of CISSP Study Guide
by Eric Conrad, Seth Misenar, Joshua Feldman
Language: English
Release Date: December 8, 2015

CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more joining their ranks, this...
Cover of Eleventh Hour CISSP®

Eleventh Hour CISSP®

Study Guide

by Eric Conrad, Seth Misenar, Joshua Feldman
Language: English
Release Date: September 3, 2016

Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying....
Cover of CEH v10 Certified Ethical Hacker Study Guide
by Ric Messier
Language: English
Release Date: May 31, 2019

As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified...
Cover of Summary and Analysis of Dark Territory: The Secret History of Cyber War
by Worth Books
Language: English
Release Date: April 18, 2017

So much to read, so little time? This brief overview of Dark Territory: The Secret History of Cyber War tells you what you need to know—before or after you read Fred Kaplan’s book. Crafted and edited with care, Worth Books set the standard for quality and give you the tools you need to...
Cover of How to Hack Like a Pornstar

How to Hack Like a Pornstar

A step by step process for breaking into a BANK

by Sparc FLOW
Language: English
Release Date: January 26, 2017

This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company’s network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on. Whether...
Cover of Hacking: The Art of Exploitation, 2nd Edition
by Jon Erickson
Language: English
Release Date: February 1, 2008

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather...
Cover of Attacking Network Protocols

Attacking Network Protocols

A Hacker's Guide to Capture, Analysis, and Exploitation

by James Forshaw
Language: English
Release Date: January 2, 2018

Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately protect vulnerabilities. You’ll...
First 81 82 83 84 85 86 8788 89 90 91 92 93 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy