Computer Security category: 2451 books

Cover of Markets for Cybercrime Tools and Stolen Data
by Lillian Ablon, Martin C. Libicki, Andrea A. Golay
Language: English
Release Date: March 25, 2014

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
Cover of Zero Day

Zero Day

The Threat In Cyberspace

by Robert O'Harrow Jr., The Washington Post
Language: English
Release Date: January 15, 2013

Will the world’s next war be fought in cyberspace?"It's going to happen," said former National Defense University Professor Dan Kuehl. So much of the world’s activity takes place on the internet now – including commerce, banking and communications -- the Pentagon has declared war in cyberspace...
Cover of CISA Certified Information Systems Auditor Study Guide
by David L. Cannon
Language: English
Release Date: February 23, 2016

The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and...
Cover of CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition
by Matt Walker
Language: English
Release Date: September 16, 2016

Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of...
Cover of ISO27001/ISO27002:2013

ISO27001/ISO27002:2013

A Pocket Guide

by Alan Calder
Language: English
Release Date: October 3, 2013

Information is one of your organisation’s most important resources. Keeping that information secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information...
Cover of Tackling Fraud
by alasdair gilchrist
Language: English
Release Date: December 6, 2017

The threat landscape is developing at such a rate that traditional IT security controls can no longer protect us. Legacy IT security mechanisms deal with rules and signatures for known threats coming from the outside. But today the threats are coming from inside. The risks are from malicious employees,...
Cover of Mastering Windows Network Forensics and Investigation
by Steve Bunting, Ryan Johnson, Scott Pearson
Language: English
Release Date: July 30, 2012

An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate...
Cover of Crash Course Data Security
by IntroBooks
Language: English
Release Date: May 3, 2018

Everything comes with its advantages and disadvantages just like the digital world. The invention of the digital world took us all by surprise and now has become an integral part of our lives. It is almost impossible to think of a world without the internet, social media and or electronic gadgets....
Cover of Military Cyber Attacks and America's Vulnerable Nuclear Weapons and Defenses: DoD Task Force Report on Resilient Military Systems and the Advanced Cyber Threat
by Progressive Management
Language: English
Release Date: May 28, 2013

This is a vital 2013 report from the U.S. Defense Department warning of serious cyber threats to the military, including the critical nuclear weapons infrastructure. The report addresses the risk of catastrophic cyber attacks and discusses the need for offensive operations. This Task Force...
Cover of Information Technology Risk Management and Compliance in Modern Organizations
by
Language: English
Release Date: June 19, 2017

Attacks on information systems and applications have become more prevalent with new advances in technology. Management of security and quick threat identification have become imperative aspects of technological applications. Information Technology Risk Management and Compliance in Modern Organizations...
Cover of Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
by Dale Liu
Language: English
Release Date: June 30, 2009

Three exams, two certifications, one complete Cisco training solution for networking professionals! The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining route and switched networks. The current exam material covers networking concepts...
Cover of Blockchain Basics

Blockchain Basics

A Non-Technical Introduction in 25 Steps

by Daniel Drescher
Language: English
Release Date: March 14, 2017

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies,...
Cover of Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
by Daniel Regalado, Shon Harris, Allen Harper
Language: English
Release Date: January 9, 2015

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains...
Cover of Keys to the Kingdom

Keys to the Kingdom

Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

by Deviant Ollam
Language: English
Release Date: December 6, 2012

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master...
First 82 83 84 85 86 87 8889 90 91 92 93 94 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy