Computer Security category: 2451 books

Cover of Risk Assessment and Risk-Driven Quality Assurance

Risk Assessment and Risk-Driven Quality Assurance

4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers

by
Language: English
Release Date: April 21, 2017

This book constitutes the thoroughly refereed conference proceedings of the Fourth International Workshop on Risk Assessment and Risk-Driven Quality Assurance, RISK 2016, held in conjunction with ICTSS 2016, in Graz, Austria, in October 2016. The revised 9 full papers were carefully reviewed...
Cover of The New Codebreakers

The New Codebreakers

Essays Dedicated to David Kahn on the Occasion of His 85th Birthday

by
Language: English
Release Date: March 17, 2016

This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David Kahn and...
Cover of Advances in Cryptology – EUROCRYPT 2017

Advances in Cryptology – EUROCRYPT 2017

36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I

by
Language: English
Release Date: April 10, 2017

The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these...
Cover of Federal Cloud Computing

Federal Cloud Computing

The Definitive Guide for Cloud Service Providers

by Matthew Metheny
Language: English
Release Date: December 31, 2012

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You...
Cover of Insider Threat

Insider Threat

Prevention, Detection, Mitigation, and Deterrence

by Michael G. Gelles
Language: English
Release Date: May 28, 2016

Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft from current or former employees....
Cover of Python for Offensive PenTest

Python for Offensive PenTest

A practical guide to ethical hacking and penetration testing using Python

by Hussam Khrais
Language: English
Release Date: April 26, 2018

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language Key Features Comprehensive information on building a web application penetration testing framework using Python Master web application penetration...
Cover of The Psychology of Information Security
by Leron Zinatullin
Language: English
Release Date: January 26, 2016

This book cuts to the heart of many of the challenges in risk management, providing advice and tips from interviews as well as models that can be employed easily. Leron manages to do this without being patronizing or prescriptive, making it an easy read with some very real practical takeaways.
Cover of Theory and Practice of Cryptography Solutions for Secure Information Systems
by
Language: English
Release Date: May 31, 2013

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns....
Cover of Trustworthy Computing and Services

Trustworthy Computing and Services

International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers

by
Language: English
Release Date: June 19, 2015

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are...
Cover of Threat 2.0

Threat 2.0

Security and Compliance for Web 2.0 Sites

by Alan Calder
Language: English
Release Date: January 15, 2009

This pocket guide will provide you with an invaluable introduction to the security and compliance issues surrounding Web 2.0 technologies. It includes a programme of best-practice steps you can take to manage the risks involved with Web 2.0, together with advice on how to ensure your organisation stays on the right side of the relevant privacy and data protection requirements.
Cover of Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications

16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers

by
Language: English
Release Date: January 24, 2018

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, held in Lugano, Switzerland, in November 2017. The 14 revised full papers presented together with 2 abstracts of invited...
Cover of E-Democracy: Citizen Rights in the World of the New Computing Paradigms

E-Democracy: Citizen Rights in the World of the New Computing Paradigms

6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings

by
Language: English
Release Date: November 30, 2015

This book constitutes the refereed proceedings of the 6th International Conference on E-Democracy, E-Democracy 2015, held in Athens, Greece, in December 2015. The 13 revised full papers presented together with 8 extended abstracts were carefully selected from 33 submissions. The papers are...
Cover of Advances in Cryptology – EUROCRYPT 2017

Advances in Cryptology – EUROCRYPT 2017

36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II

by
Language: English
Release Date: April 10, 2017

The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these...
Cover of Electronic Access Control
by Thomas L. Norman
Language: English
Release Date: September 26, 2011

Electronic Access Control introduces the fundamentals of electronic access control through clear, well-illustrated explanations. Access Control Systems are difficult to learn and even harder to master due to the different ways in which manufacturers approach the subject and the myriad complications...
First 84 85 86 87 88 89 9091 92 93 94 95 96 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy