Computer Security category: 2451 books

Cover of Digital Archaeology

Digital Archaeology

The Art and Science of Digital Forensics

by Michael Graves
Language: English
Release Date: August 16, 2013

The Definitive, Up-to-Date Guide to Digital Forensics   The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital Archaeology, expert practitioner Michael Graves has written the most thorough, realistic,...
Cover of How to Cheat at Configuring Exchange Server 2007

How to Cheat at Configuring Exchange Server 2007

Including Outlook Web, Mobile, and Voice Access

by Henrik Walther
Language: English
Release Date: April 18, 2011

The Perfect Reference for the Multitasked System Administrators The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier...
Cover of Touchless Palmprint Recognition Systems
by Vincenzo Piuri, Angelo Genovese, Fabio Scotti
Language: English
Release Date: September 15, 2014

This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems. It covers new technologies in this rapidly evolving field and is one of the first comprehensive books on palmprint recognition...
Cover of Towards an Extra Layer of Security: Two-Factor Authentication-Part 1 of 3
by Hari Om Prakash
Language: English
Release Date: June 18, 2015

The buzz in the web market is two-factor authentication (also known as TFA, 2FA, two-step verification, multi-factor authentication). Many users hold multiple accounts on multiple websites, and most of them use the same password for multiple accounts. If their password is hacked on one website, their...
Cover of E-Business and Telecommunications

E-Business and Telecommunications

11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers

by
Language: English
Release Date: December 29, 2015

This book constitutes the refereed proceedings of the 11th International Joint Conference on E-Business and Telecommunications, ICETE 2014, held in Vienna, Austria, in August 2014. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding...
Cover of Threat Level Red

Threat Level Red

Cybersecurity Research Programs of the U.S. Government

by Michael Erbschloe
Language: English
Release Date: July 6, 2017

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized....
Cover of Cryptographic Solutions for Secure Online Banking and Commerce
by
Language: English
Release Date: May 20, 2016

Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in...
Cover of Metasploit Penetration Testing Cookbook

Metasploit Penetration Testing Cookbook

Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, 3rd Edition

by Daniel Teixeira, Nipun Jaswal, Monika Agarwal
Language: English
Release Date: February 26, 2018

Over 100 recipes for penetration testing using Metasploit and virtual machines Key Features Special focus on the latest operating systems, exploits, and penetration testing techniques Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures Automate post exploitation...
Cover of Learning Pentesting for Android Devices
by Aditya Gupta
Language: English
Release Date: March 26, 2014

This is an easy-to-follow guide, full of hands-on and real-world examples of applications. Each of the vulnerabilities discussed in the book is accompanied with the practical approach to the vulnerability, and the underlying security issue. This book is intended for all those who are looking to get started...
Cover of Mastering NetScaler VPX™
by Rick Roetenberg, Marius Sandbu
Language: English
Release Date: June 21, 2016

Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know About This Book Implement and configure all the available NetScaler Application Delivery features and monitor NetScaler VPX performance in your environment Packed...
Cover of You'll see this message when it is too late

You'll see this message when it is too late

The Legal and Economic Aftermath of Cybersecurity Breaches

by Josephine Wolff
Language: English
Release Date: October 19, 2018

What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's...
Cover of Wireless Hacking 101
by Karina Astudillo
Language: English
Release Date: February 20, 2018

Wireless Hacking 101 - How to hack wireless networks easily! "The ethical hacker and IT security expert, Karina Astudillo B., has trained thousands of university students and IT professionals since 1996, and has helped hacking enthusiasts worldwide by sharing practical advice in her popular...
Cover of Anatomy of a cyberattack
by Mikko Niemelä
Language: English
Release Date: March 16, 2016

They have the power to destroy lives, shut down businesses, and affect every one of us all around the world. They always come unannounced and you hear about them every day. Cyberattacks. The plague of today's technology-reliant world. Many consider cyberattacks pure computer magic; something too complicated...
Cover of pfSense 2.x Cookbook

pfSense 2.x Cookbook

Manage and maintain your network using pfSense, 2nd Edition

by David Zientara
Language: English
Release Date: December 17, 2018

A practical, example-driven guide to configuring even the most advanced features of pfSense 2.x Key Features Build a high-availability fault-tolerant security system with pfSense 2.x Leverage the latest version of pfSense to secure your cloud environment A recipe-based guide that will help you...
First 91 92 93 94 95 96 9798 99 100
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy