Computer Security category: 2451 books

Cover of Cryptography Engineering

Cryptography Engineering

Design Principles and Practical Applications

by Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
Language: English
Release Date: February 2, 2011

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential...
Cover of Black Hat Python

Black Hat Python

Python Programming for Hackers and Pentesters

by Justin Seitz
Language: English
Release Date: December 21, 2014

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of...
Cover of Securing Social Media in the Enterprise
by Henry Dalziel
Language: English
Release Date: August 11, 2015

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range...
Cover of Gray Hat Python

Gray Hat Python

Python Programming for Hackers and Reverse Engineers

by Justin Seitz
Language: English
Release Date: April 15, 2009

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety...
Cover of Take Control of Your Passwords
by Joe Kissell
Language: English
Release Date: April 11, 2019

Overcome password frustration! Updated April 11, 2019 Passwords have become a truly maddening aspect of modern life, but with this book, you can discover how the experts handle all manner of password situations, including multi-factor authentication that can protect you even if your...
Cover of Practical Reverse Engineering

Practical Reverse Engineering

x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

by Bruce Dang, Alexandre Gazet, Elias Bachaalany
Language: English
Release Date: February 3, 2014

Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with...
Cover of Mobile Malware Attacks and Defense
by Ken Dunham
Language: English
Release Date: November 12, 2008

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code...
Cover of Hands-on Incident Response and Digital Forensics
by Mike Sheward
Language: English
Release Date: July 12, 2018

Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what follows - a scientific investigation into the causes of an incident with the aim of bringing...
Cover of Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!
by Karina Astudillo B.
Language: English
Release Date: November 2, 2015

"The ethical hacker and IT security expert, Karina Astudillo B., has trained thousands of university students and IT professionals since 1996, and has helped hacking enthusiasts worldwide by sharing practical advice in her popular blog: Seguridad Informática Fácil (Easy Information Security)." Are...
Cover of Encryption in a Windows Environment

Encryption in a Windows Environment

EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange (Digital Short Cut)

by Rand Morimoto
Language: English
Release Date: June 15, 2006

This is the eBook version of the printed book. With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption is nothing new to Windows, recent advances in Microsoft® Windows 2003 and Microsoft®...
Cover of Securing SQL Server

Securing SQL Server

Protecting Your Database from Attackers

by Denny Cherry
Language: English
Release Date: April 27, 2015

SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be...
Cover of CEH Certified Ethical Hacker Practice Exams, Third Edition
by Matt Walker
Language: English
Release Date: December 2, 2016

Don’t Let the Real Test Be Your First Test! Fully updated for the CEH v9 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council’s Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth...
Cover of Kali Linux Hacking Tools Introduction
by Rassoul Ghaznavi-Zadeh
Language: English
Release Date: October 1, 2016

In this book, you will be learning the basic techniques about how to hack and penetrate computer networks, systems and applications. This book covers a lot of top penetration tools which are available on Kali Linux and their operations. It is expected the readers have minimum knowledge of computer...
Cover of Mastering OpenVPN
by Eric F Crist, Jan Just Keijser
Language: English
Release Date: August 28, 2015

Master building and integrating secure private networks using OpenVPNAbout This BookDiscover how to configure and set up a secure OpenVPNEnhance user experience by using multiple authentication methodsDelve into better reporting, monitoring, logging, and control with OpenVPNWho This Book Is ForIf...
First 86 87 88 89 90 91 9293 94 95 96 97 98 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy