Computer Security category: 2451 books

Cover of CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources
by Ronald White
Language: English
Release Date: October 24, 2012

The Certified Ethical Hacker (CEH) is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.) An Ethical Hacker is one name given to a Penetration Tester. An ethical hacker is usually employed by an organization who trusts him to attempt to penetrate...
Cover of Windows Server 2003 Security Cookbook

Windows Server 2003 Security Cookbook

Security Solutions and Scripts for System Administrators

by Mike Danseglio, Robbie Allen
Language: English
Release Date: December 16, 2005

In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft...
Cover of Perl Scripting for Windows Security

Perl Scripting for Windows Security

Live Response, Forensic Analysis, and Monitoring

by Harlan Carvey
Language: English
Release Date: April 18, 2011

I decided to write this book for a couple of reasons. One was that I’ve now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay…I’ll come clean…I used nothing but Perl in both books! What I’ve...
Cover of Social Media: The Fastest Growing Vulnerability to the Air Force Mission - Cyberspace Issues, Facebook, LinkedIn, Twitter, Cybersecurity, Bring Your Own Device (BYOD), Safeguarding Personal Data
by Progressive Management
Language: English
Release Date: April 2, 2017

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military...
Cover of Application of Big Data for National Security

Application of Big Data for National Security

A Practitioner’s Guide to Emerging Technologies

by Babak Akhgar, Gregory B. Saathoff, Richard Hill
Language: English
Release Date: February 19, 2015

Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international...
Cover of Practical Embedded Security

Practical Embedded Security

Building Secure Resource-Constrained Systems

by Timothy Stapko
Language: English
Release Date: April 1, 2011

The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented...
Cover of What Is Computer Science?

What Is Computer Science?

An Information Security Perspective

by Daniel Page, Nigel Smart
Language: English
Release Date: December 31, 2013

This engaging and accessible text addresses the fundamental question: What Is Computer Science? The book showcases a set of representative concepts broadly connected by the theme of information security, for which the presentation of each topic can be treated as a "mini" lecture course,...
Cover of Managing Information Risk and the Economics of Security
by
Language: English
Release Date: April 5, 2009

Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given...
Cover of Practical Information Security

Practical Information Security

A Competency-Based Education Course

by Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud
Language: English
Release Date: January 30, 2018

This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a...
Cover of Research Developments in Biometrics and Video Processing Techniques
by
Language: English
Release Date: December 31, 2013

The advancement of security technologies has allowed information systems to store more crucial and sensitive data. With these advancements, organizations turn to physiological and behavioral methods of identification in order to guard against unwanted intrusion. Research Developments in Biometrics...
Cover of Computer Communication, Networking and Internet Security
by
Language: English
Release Date: May 2, 2017

The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication....
Cover of Security and Safety Interplay of Intelligent Software Systems

Security and Safety Interplay of Intelligent Software Systems

ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers

by
Language: English
Release Date: March 27, 2019

This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International Workshop on Cyber Security for Intelligent Transportation Systems, ISSA 2018, held in Barcelona,...
Cover of Security Technology Convergence Insights
by Ray Bernard
Language: English
Release Date: April 2, 2015

Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology...
Cover of Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance

Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance

9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

by
Language: English
Release Date: March 27, 2015

This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw,...
First 3 4 5 6 7 8 910 11 12 13 14 15 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy