Computer Security category: 2451 books

Cover of Differential Privacy and Applications
by Tianqing Zhu, Gang Li, Wanlei Zhou
Language: English
Release Date: August 22, 2017

This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential...
Cover of Air Force Cyberspace Reports: Principles of War, Act and Actor Attribution, Legal Framework, Influence Operations and the Internet, Command and Control Model, Sea Power and Fleet Resources
by Progressive Management
Language: English
Release Date: April 7, 2016

Professionally converted for accurate flowing-text e-book format reproduction, this unique book reproduces five important military reports and studies dealing with cyberspace attacks and computer network security:Act and Actor Attribution in Cyberspace: A Proposed Analytic Framework * Principles...
Cover of Applications and Techniques in Information Security

Applications and Techniques in Information Security

8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

by
Language: English
Release Date: June 21, 2017

This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017.  The 14 revised full papers and 4 short papers presented together with two abstracts of invited...
Cover of Game Hacking

Game Hacking

Developing Autonomous Bots for Online Games

by Nick Cano
Language: English
Release Date: July 1, 2016

You don’t need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle. Bring your knowledge of Windows-based development and memory...
Cover of Financial Cryptography and Data Security

Financial Cryptography and Data Security

19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers

by
Language: English
Release Date: July 15, 2015

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from...
Cover of Infosec Management Fundamentals
by Henry Dalziel
Language: English
Release Date: August 10, 2015

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of...
Cover of Future Network Systems and Security

Future Network Systems and Security

Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings

by
Language: English
Release Date: October 13, 2016

This book constitutes the refereed proceedings of the Second International Conference on Future Network Systems and Security, FNSS 2016, held in Paris, France, in November 2016. The 12 full papers and one short paper presented were carefully reviewed and selected from 34 submissions. The papers focus...
Cover of An Introduction to Number Theory with Cryptography
by James Kraft, Lawrence Washington
Language: English
Release Date: January 29, 2018

Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors have written the text in an engaging...
Cover of Candidate Multilinear Maps
by Sanjam Garg
Language: English
Release Date: March 1, 2015

The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize...
Cover of Defending Yourself from Hackers and Spammers
by Damien Fellows
Language: English
Release Date: May 6, 2016

Defending Yourself from Hackers and Spammers is a tool for the average computer user, to understand, enact and protect themselves from the ever increasing cyber attacks on personal information and technology. In turn it will give the reader greater peace of mind and added security whilst using their personal computers.
Cover of Future Network Systems and Security

Future Network Systems and Security

4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings

by
Language: English
Release Date: June 26, 2018

This book constitutes the refereed proceedings of the 4th International Conference on Future Network Systems and Security, FNSS 2018, held in Paris, France, in July 2018. The 14 full papers and two short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized...
Cover of The Antivirus Hacker's Handbook
by Joxean Koret, Elias Bachaalany
Language: English
Release Date: August 27, 2015

Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your...
Cover of Managing Online Risk

Managing Online Risk

Apps, Mobile, and Social Media Security

by Deborah Gonzalez
Language: English
Release Date: September 25, 2014

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and...
Cover of 10 Things That Used to be Good Ideas in Data Security
by Mike Winkler
Language: English
Release Date: July 30, 2014

Data security has two objectives and only two: To keep our company’s assets safe from improper users, and to make it available to the proper ones.We continually make the same human nature mistakes again and again in pursuit of these two deceptively complex objectives. In 10 Things that Used to be...
First 63 64 65 66 67 68 6970 71 72 73 74 75 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy