Computer Security category: 2451 books

Cover of ISO 27001 Risk Management in Plain English

ISO 27001 Risk Management in Plain English

A Step-by-Step Handbook for Information Security Practitioners in Small Businesses

by Dejan Kosutic
Language: English
Release Date: September 15, 2017

“Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment.” This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It...
Cover of Securing the Smart Grid

Securing the Smart Grid

Next Generation Power Grid Security

by Tony Flick, Justin Morehouse
Language: English
Release Date: November 3, 2010

Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications...
Cover of Securing Critical Infrastructures and Critical Control Systems
by
Language: English
Release Date: December 31, 2012

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems:...
Cover of Advances in Cryptology – ASIACRYPT 2015

Advances in Cryptology – ASIACRYPT 2015

21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II

by
Language: English
Release Date: November 26, 2015

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited...
Cover of Personal Encryption
by Kenneth Spicer
Language: English
Release Date: September 4, 2011

Spicer Solutions LLC holds the key to keep your personal information secure in it's Foundations Series. We break it down into manageable modules. Starting with Book One. Personal Encryption. In this Module we start with building a virtual encrypted computer using free Open Source Software. Next we...
Cover of How to Protect Yourself From Spyware/Adware
by Anonymous
Language: English
Release Date: August 9, 2014

How To Protect Yourself From Adware and Spyware The Ultimate Guide To Removing And Protecting Against Adware And Spyware On Your PC What is spyware? What is adware? You’ve probably heard of them because everyone that gets online is either bombarded with information about the products...
Cover of The Sherlock Holmes Handbook for the Digital Age
by Alan Pearce
Language: English
Release Date: November 29, 2016

Sherlock Holmes is the greatest detective of all time. He is driven to right the wrongs of the world. It is only natural that he should turn his attention to the Internet.“The Internet has become a sinister and dangerous place – a grotesque parody of all that it originally promised,”...
Cover of How to Investigate Like a Rockstar
by sparc Flow
Language: English
Release Date: August 14, 2017

"There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware...
Cover of Surviving Cyberwar
by Richard Stiennon
Language: English
Release Date: May 16, 2010

Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim....
Cover of The Certified Ethical Hacker Exam - version 8 (The concise study guide)
by alasdair gilchrist
Language: English
Release Date: February 11, 2015

The concise guide to Certified Ethical Hacker - version 8 is a compact study guide for those pursuing the Certified Ethical Hacker Certification. This book summarizes all you need to know in the twenty exam modules to pass the exam. If you are a practicing security professional there...
Cover of Gray Hat Hacking The Ethical Hackers Handbook 3/E
by Shon Harris, Allen Harper, Jonathan Ness
Language: English
Release Date: January 15, 2011

Fully updated expanded to cover the latest devious hacking methods Featuring in-depth, advanced coverage of vulnerability discovery and reverse engineering, Gray Hat Hacking, Third Edition provides eight brand-new chapters on the latest ethical hacking techniques. In addition to the new chapters, the...
Cover of Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
by Jesse Varsalone
Language: English
Release Date: December 16, 2008

This book provides digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod...
Cover of Comptia Network+ In 21 Days N10-006 Study Guide

Comptia Network+ In 21 Days N10-006 Study Guide

Comptia 21 Day 900 Series, #3

by C.V.Conner, Ph.D.
Language: English
Release Date: August 5, 2016

As a information technology professional, Conner has seen his share of traditional college graduates entering the IT field and he knows from experience that you can’t simply graduate with enough experience and knowledge to pass the certification exams. The key to handling these exams is have the...
Cover of Architecting User-Centric Privacy-as-a-Set-of-Services

Architecting User-Centric Privacy-as-a-Set-of-Services

Digital Identity-Related Privacy Framework

by Ghazi Ben Ayed
Language: English
Release Date: June 28, 2014

How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection...
First 85 86 87 88 89 90 9192 93 94 95 96 97 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy