Computer Security category: 2451 books

Cover of Managing Cyber Risk in the Financial Sector

Managing Cyber Risk in the Financial Sector

Lessons from Asia, Europe and the USA

by
Language: English
Release Date: January 22, 2016

Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of...
Cover of Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
by Wenye Wang, Cliff Wang, Zhou Lu
Language: English
Release Date: November 5, 2015

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical...
Cover of CEH Certified Ethical Hacker Practice Exams, Fourth Edition
by Matt Walker
Language: English
Release Date: June 21, 2019

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Don’t Let the Real Test Be Your First Test! Fully updated for the CEH v10 exam objectives, this...
Cover of Hackercool Oct 2016
by kalyan chinta
Language: English
Release Date: October 10, 2016

Hackercool October 2016 Issue comes with many improvements. Real Time Hacking Scenario : Yes, we are going to show you a real time hacking scenario of hacking a web server. Sending the package : Learn some of the effective ways to send the package (for example virus) to our target. FORENSICS:...
Cover of Social Engineering Penetration Testing

Social Engineering Penetration Testing

Executing Social Engineering Pen Tests, Assessments and Defense

by Gavin Watson, Andrew Mason, Richard Ackroyd
Language: English
Release Date: April 11, 2014

Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute...
Cover of The Best Damn Exchange, SQL and IIS Book Period
by Henrik Walther, Mark Horninger, Chris Adams
Language: English
Release Date: August 31, 2011

Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools...
Cover of Security and Auditing of Smart Devices

Security and Auditing of Smart Devices

Managing Proliferation of Confidential Data on Corporate and BYOD Devices

by Sajay Rai, Philip Chukwuma, Richard Cozart
Language: English
Release Date: November 17, 2016

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the...
Cover of Practical Deployment of Cisco Identity Services Engine (ISE)

Practical Deployment of Cisco Identity Services Engine (ISE)

Real-World Examples of AAA Deployments

by Andy Richter, Jeremy Wood
Language: English
Release Date: November 12, 2015

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control...
Cover of Once more unto the Breach

Once more unto the Breach

Managing information security in an uncertain world

by Andrea Simmons
Language: English
Release Date: August 2, 2012

In Once more unto the Breach, Andrea C Simmons provides an insider's view of the role of an information security manager. Based on a typical year, the book examines how the general principles can be applied to all situations and discusses the lessons learnt from a real project. 
Cover of Hacking with Kali

Hacking with Kali

Practical Penetration Testing Techniques

by James Broad, Andrew Bindner
Language: English
Release Date: December 5, 2013

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version...
Cover of Mobile Forensics Cookbook
by Igor Mikhaylov
Language: English
Release Date: December 15, 2017

Discover the tools and techniques of mobile forensic investigations and make sure your mobile autopsy doesn't miss a thing, all through powerful practical recipes About This Book Acquire in-depth knowledge of mobile device acquisition using modern forensic tools Understand the importance of clouds...
Cover of Introduction to Secure Outsourcing Computation
by Xiaofeng Chen
Language: English
Release Date: February 22, 2016

With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the...
Cover of Comptia Security+ Primer
by John Greene
Language: English
Release Date: September 13, 2014

This is the litmus test for anyone studying for CompTIA Security+ Certification. This e-book contains 600 quick-fire Q & A specifically covering the topics on the exam. The questions are similar to those you will face in the exam. ie, multiple choice, true or false ...etc. Good luck with your exams!Exam...
Cover of Malicious Mobile Code

Malicious Mobile Code

Virus Protection for Windows

by Roger A. Grimes
Language: English
Release Date: August 14, 2001

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange....
First 90 91 92 93 94 95 9697 98 99 100
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy