Operating Systems category: 3874 books

Cover of Social Engineering

Social Engineering

The Science of Human Hacking

by Christopher Hadnagy
Language: English
Release Date: June 25, 2018

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering...
Cover of Secure Information Management Using Linguistic Threshold Approach
by Marek R. Ogiela, Urszula Ogiela
Language: English
Release Date: August 19, 2013

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques...
Cover of The Psychology of Cyber Crime

The Psychology of Cyber Crime

Concepts and Principles

by Gráinne Kirwan, Andrew Power
Language: English
Release Date: November 30, 2011

As more individuals own and operate Internet-enabled devices and more critical government and industrial systems rely on advanced technologies, the issue of cybercrime has become a crucial concern for both the general public and professionals alike. The Psychology of Cyber Crime: Concepts and Principles...
Cover of Machine Learning and Security

Machine Learning and Security

Protecting Systems with Data and Algorithms

by Clarence Chio, David Freeman
Language: English
Release Date: January 26, 2018

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you’ll explore ways...
Cover of Data Lake Development with Big Data
by Pradeep Pasupuleti, Beulah Salome Purra
Language: English
Release Date: July 3, 2016

Explore architectural approaches to building Data Lakes that ingest, index, manage, and analyze massive amounts of data using Big Data technologies About This Book Comprehend the intricacies of architecting a Data Lake and build a data strategy around your current data architecture Efficiently...
Cover of Information Security Practice and Experience

Information Security Practice and Experience

12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings

by
Language: English
Release Date: November 2, 2016

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.
Cover of Enterprise Cybersecurity Study Guide

Enterprise Cybersecurity Study Guide

How to Build a Successful Cyberdefense Program Against Advanced Threats

by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams
Language: English
Release Date: March 22, 2018

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How...
Cover of Cyber Essentials

Cyber Essentials

A Pocket Guide

by Alan Calder
Language: English
Release Date: August 14, 2014

Every year, thousands of computer systems in the UK are compromised. The majority fall victim to easily preventable cyber attacks, carried out with tools which are freely available on the Internet.   Cyber Essentials is the UK Government's reaction to the proliferation of these attacks....
Cover of Designing Usable and Secure Software with IRIS and CAIRIS
by Shamal Faily
Language: English
Release Date: April 28, 2018

Everyone expects the products and services they use to be secure, but 'building security in' at the earliest stages of a system's design also means designing for use as well. Software that is unusable to end-users and unwieldy to developers and administrators may be insecure as errors and violations...
Cover of Handbook of Research on Security Considerations in Cloud Computing
by
Language: English
Release Date: July 28, 2015

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing...
Cover of Hackercool Oct 2016
by kalyan chinta
Language: English
Release Date: October 10, 2016

Hackercool October 2016 Issue comes with many improvements. Real Time Hacking Scenario : Yes, we are going to show you a real time hacking scenario of hacking a web server. Sending the package : Learn some of the effective ways to send the package (for example virus) to our target. FORENSICS:...
Cover of Android Forensics

Android Forensics

Investigation, Analysis and Mobile Security for Google Android

by Andrew Hoog
Language: English
Release Date: July 21, 2011

Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components,...
Cover of Security in Network Coding
by Peng Zhang, Chuang Lin
Language: English
Release Date: May 26, 2016

This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms leverage traditional cryptographic primitives and anonymous protocols, and are redesigned to fit into the new framework of network coding. These three...
Cover of E-Voting and Identity

E-Voting and Identity

5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings

by
Language: English
Release Date: August 12, 2015

This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015. The 10 revised full papers presented, including one keynote and three invited talks, were carefully selected...
First 76 77 78 79 80 81 8283 84 85 86 87 88 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy