Operating Systems category: 3874 books

Cover of Multimedia Data Hiding
by Min Wu, Bede Liu
Language: English
Release Date: March 19, 2013

Comprehensive coverage of an important and current hot topic.; Details both theoretical as well as practical aspects.; Presents new data hiding algorithms for images and videos.; Reveals a number of attacks and countermeasures for data hiding systems, with a focus on digital music.
Cover of Network Security Metrics
by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Language: English
Release Date: November 15, 2017

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since “you cannot improve...
Cover of Cyber Frauds, Scams and their Victims
by Mark Button, Cassandra Cross
Language: English
Release Date: July 14, 2017

Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This...
Cover of Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning
by Progressive Management
Language: English
Release Date: June 3, 2018

Two excellent reports have been professionally converted for accurate flowing-text e-book format reproduction. Book 1: Cybersecurity Capability Maturity Model White Paper - Cybersecurity is a leading national security challenge facing this country today. An emerging topic of importance is how...
Cover of How to Cheat at VoIP Security
by Thomas Porter, CISSP, CCNP
Language: English
Release Date: April 18, 2011

The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies...
Cover of Metasploit Bootcamp
by Nipun Jaswal
Language: English
Release Date: May 25, 2017

Master the art of penetration testing with Metasploit Framework in 7 daysAbout This BookA fast-paced guide that will quickly enhance your penetration testing skills in just 7 daysCarry out penetration testing in complex and highly-secured environments.Learn techniques to Integrate Metasploit with...
Cover of VMware vSphere Resource Management Essentials
by Jonathan Frappier
Language: English
Release Date: February 19, 2014

This concise guide follows a practical approach, covering solutions and methods to manage resources for virtualization. If you are a current vSphere administrator who is aspiring to start your virtualization journey with VMware vSphere and wants to learn how to manage your resources, this is the book for you. Readers are expected to have some prior knowledge of ESXi and vCenter.
Cover of Oracle Solaris Cluster Essentials, Portable Docs
by READ
Language: English
Release Date: September 9, 2010

Thousands of IT organizations have adopted clustering to improve the availability of mission-critical software services. Today, with the rapid growth of cloud computing environments, clustering is even more crucial. Now, there’s a comprehensive, authoritative guide to the industry’s most...
Cover of Building a Home Security System with BeagleBone
by Bill Pretty
Language: English
Release Date: December 17, 2013

Building a Home Security System with BeagleBone is a practical, hands-on guide for practical, hands-on people. The book includes step-by-step instructions for assembling your own hardware on professionally manufactured PCBs and setting up the software on your system.This book is for anyone who is interested...
Cover of Botnets
by Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla
Language: English
Release Date: June 29, 2013

Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware,...
Cover of Information Governance and Security

Information Governance and Security

Protecting and Managing Your Company’s Proprietary Information

by John G. Iannarelli, Michael O’Shaughnessy
Language: English
Release Date: September 9, 2014

Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset—its proprietary information—safe from cyber and physical compromise. Many intrusions...
Cover of The Continuing Arms Race

The Continuing Arms Race

Code-Reuse Attacks and Defenses

by
Language: English
Release Date: February 23, 2018

As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many...
Cover of Hands-On Penetration Testing with Kali NetHunter

Hands-On Penetration Testing with Kali NetHunter

Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go

by Glen D. Singh, Sean-Philip Oriyano
Language: English
Release Date: February 28, 2019

Convert Android to a powerful pentesting platform. Key Features Get up and running with Kali Linux NetHunter Connect your Android device and gain full control over Windows, OSX, or Linux devices Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual...
Cover of The Chinese Information War

The Chinese Information War

Espionage, Cyberwar, Communications Control and Related Threats to United States Interests, 2d ed.

by Dennis F. Poindexter
Language: English
Release Date: July 10, 2018

China’s information war against the United States is clever technically, broadly applied and successful. The intelligence community in the U.S. has publicly stated this is a kind of war we do not know how to fight—yet it is the U.S. military that developed and expanded the doctrine of information...
First 80 81 82 83 84 85 8687 88 89 90 91 92 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy