Security category: 5602 books

Cover of Deterrence and the New Global Security Environment
by
Language: English
Release Date: October 18, 2013

This collection of papers rigorously examines the current place of deterrence in international security relations, delivering the best of contemporary thinking. This is a special issue of the leading journal Contemporary Security Policy. It shows how and why nuclear deterrence was the central...
Cover of Hacking Exposed Mobile Security Secrets & Solutions
by Neil Bergman, Mike Stanfield, Jason Rouse
Language: English
Release Date: July 9, 2013

Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices.... The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition...
Cover of SAP Security Interview Questions, Answers, and Explanations
by Equity Press
Language: English
Release Date: October 3, 2011

It’s clear that security and audit are among the most challenging areas in SAP and learning can be difficult. SAP Security Interview Questions, Answers and Explanations is a direct answer to the need for practical security information for SAP users,consultants, and managers. From default passwords...
Cover of Secrets and Lies

Secrets and Lies

Digital Security in a Networked World

by Bruce Schneier
Language: English
Release Date: March 25, 2011

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience...
Cover of Managing Security with Snort & IDS Tools

Managing Security with Snort & IDS Tools

Intrusion Detection with Open Source Tools

by Kerry J. Cox, Christopher Gerg
Language: English
Release Date: August 2, 2004

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts,...
Cover of Japan, Australia and Asia-Pacific Security
by
Language: English
Release Date: September 27, 2006

The threats to security in Southeast Asia have been serious and constant since the end of the Second World War. The book provides an absorbing account of the evolution of a key axis of regional stability - defence contacts between Japan and Australia, tracing the relationship from the early post-war...
Cover of CISSP Boxed Set, Second Edition
by Shon Harris
Language: English
Release Date: September 16, 2013

Save 12% on This CISSP Boxed Set—Plus Bonus DVD! This money-saving CISSP boxed set from the #1 name in IT security certification and training includes: CISSP All-in-One Exam Guide, Sixth Edition Up-to-date coverage of all 10 CISSP exam domains Electronic content—1400+ practice exam...
Cover of Security for Web Developers

Security for Web Developers

Using JavaScript, HTML, and CSS

by John Paul Mueller
Language: English
Release Date: November 10, 2015

As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. You’ll learn how...
Cover of How to Define and Build an Effective Cyber Threat Intelligence Capability
by Henry Dalziel
Language: English
Release Date: December 5, 2014

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become...
Cover of Cyber Security

Cyber Security

Deterrence and IT Protection for Critical Infrastructures

by
Language: English
Release Date: October 4, 2013

The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber...
Cover of IoT Penetration Testing Cookbook
by Aaron Guzman, Aditya Gupta
Language: English
Release Date: November 29, 2017

Over 80 recipes to master IoT security techniques. About This Book Identify vulnerabilities in IoT device architectures and firmware using software and hardware pentesting techniques Understand radio communication analysis with concepts such as sniffing the air and capturing radio signals A recipe...
Cover of A Practical Introduction to Homeland Security and Emergency Management
by Bruce Oliver Newsome, Jack A. Jarmon
Language: English
Release Date: September 24, 2015

A Practical Introduction to Homeland Security and Emergency Management: From Home to Abroad offers a comprehensive overview of the homeland security field, examining topics such as counter-terrorism, border and infrastructure security, and emergency management. Authors Bruce Newsome and Jack Jarmon...
Cover of Android Security Cookbook
by Keith Makan, Scott Alexander-Bown
Language: English
Release Date: December 23, 2013

Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs."Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be...
Cover of Kali Linux Cookbook - Second Edition
by Corey P. Schultz, Bob Perciaccante
Language: English
Release Date: September 12, 2017

Over 80 recipes to effectively test your network and boost your career in security About This Book Learn how to scan networks to find vulnerable computers and servers Hack into devices to control them, steal their data, and make them yours Target wireless networks, databases, and web servers,...
First 34 35 36 37 38 39 4041 42 43 44 45 46 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy