Computer Security category: 2451 books

Cover of Digital Forensics and Incident Response
by Gerard Johansen
Language: English
Release Date: July 24, 2017

A practical guide to deploying digital forensic techniques in response to cyber security incidents About This Book Learn incident response fundamentals and create an effective incident response framework Master forensics investigation utilizing digital investigative techniques Contains real-life...
Cover of Getting Started with FortiGate
by Rosato Fabbri, Fabrizio Volpe
Language: English
Release Date: November 25, 2013

This book is a step-by-step tutorial that will teach you everything you need to know about the deployment and management of FortiGate, including high availability, complex routing, various kinds of VPN working, user authentication, security rules and controls on applications, and mail and Internet access.This...
Cover of Cyber Security Awareness for CEOs and Management
by David Willson, Henry Dalziel
Language: English
Release Date: December 9, 2015

Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need...
Cover of Cybercrime and Espionage

Cybercrime and Espionage

An Analysis of Subversive Multi-Vector Threats

by Will Gragido, John Pirc
Language: English
Release Date: January 7, 2011

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from...
Cover of Conquer the Web

Conquer the Web

The Ultimate Cybersecurity Guide

by Nick Wilding, Tim Mitchell, Maureen Kendal
Language: English
Release Date: June 30, 2018

This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it? 'A must read for anyone looking to upskill their cyber awareness,' Steve Durbin, Managing Director, Information Security Forum Tons of malicious...
Cover of Kali Linux 2: Windows Penetration Testing
by Wolf Halton, Bo Weaver
Language: English
Release Date: June 28, 2016

Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers About This Book Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Footprint, monitor, and audit your network and investigate any ongoing infestations Customize...
Cover of Sunshine on Secure Software

Sunshine on Secure Software

Baking Security into your SDLC Process

by Natalie "Sunny" Wear
Language: English
Release Date: April 29, 2013

Provides a step-by-step guide on how to bake security techniques into the software life cycle. This book poses a challenge to move security, privacy and compliance into functional business requirements. Security, privacy and compliance are generally not addressed or only nodded to in the SDLC instead...
Cover of Availability, Reliability, and Security in Information Systems

Availability, Reliability, and Security in Information Systems

IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings

by
Language: English
Release Date: August 22, 2016

This volume constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security in Information Systems, CD-ARES 2016, and the Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, co-located...
Cover of Malware, Rootkits & Botnets A Beginners Guide
by Christopher Elisan
Language: English
Release Date: August 25, 2012

Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginners Guide explains the nature, sophistication, and danger of these risks and offers...
Cover of Information Security Breaches

Information Security Breaches

Avoidance and Treatment based on ISO27001

by Michael Krausz
Language: English
Release Date: December 15, 2009

If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat...
Cover of Next Generation SSH2 Implementation

Next Generation SSH2 Implementation

Securing Data in Motion

by Dale Liu
Language: English
Release Date: April 18, 2011

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into...
Cover of Information Security Risk Assessment Toolkit

Information Security Risk Assessment Toolkit

Practical Assessments through Data Collection and Data Analysis

by Mark Talabis, Jason Martin
Language: English
Release Date: October 17, 2012

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention...
Cover of Hacking Point of Sale

Hacking Point of Sale

Payment Application Secrets, Threats, and Solutions

by Slava Gomzin
Language: English
Release Date: February 3, 2014

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not...
Cover of Principles of Security and Trust

Principles of Security and Trust

6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings

by
Language: English
Release Date: March 27, 2017

This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017. The 14 papers presented in this...
First 45 46 47 48 49 50 5152 53 54 55 56 57 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy