Зарегистрироваться
Восстановить пароль
FAQ по входу

Информационная безопасность

Требуется помощь в преобразовании раздела Информатика и вычислительная техника

Если Вы компетентны в тематике этого раздела, то Вас, возможно, заинтересует обсуждение планируемых преобразований.

Учебно-методические материалы

Смотри также

Теги, соответствующие этому тематическому разделу

Файлы, которые ищут в этом разделе

Доверенные пользователи и модераторы раздела

Wiley, 2014. - 648p. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has...
  • №1
  • 29,99 МБ
  • добавлен
  • изменен
John Wiley & Sons, Inc., 2014. — 648 p. — ISBN: 978-1-118-66209-0. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of...
  • №2
  • 11,08 МБ
  • добавлен
  • изменен
Praeger, 2008. — 188 p. — ISBN: 0313345589, 9780313345586 Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a...
  • №3
  • 2,20 МБ
  • добавлен
  • изменен
Praeger Security International. Westport, CT, USA. 2008. 188 pages. Includes bibliographical references and index. ISBN: 0313345589 Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep...
  • №4
  • 589,41 КБ
  • добавлен
  • изменен
IGI Global, 2016. — 340 p. — ISBN 9781522508649. Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever. Online Banking Security Measures and Data Protection is an authoritative reference...
  • №5
  • 6,25 МБ
  • добавлен
  • изменен
2nd Edition. — Wiley, 2008. — 1082 p. — ISBN 978-0-470-06852-6. What is Security Engineering? Usability and Psychology Protocols Access Control Cryptography Distributed Systems Economics Multilevel Security Multilateral Security Banking and Bookkeeping Physical Protection Monitoring and Metering Nuclear Command and Control Security Printing and Seals Biometrics Physical Tamper...
  • №6
  • 5,88 МБ
  • добавлен
  • изменен
Syngress, 2017. — 192 p. — ISBN: 978-0-12-802042-5. Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new...
  • №7
  • 4,32 МБ
  • добавлен
  • изменен
2nd edition. — Springer, 2016. — 128 p. — ISBN 978-3-319-29742-2. The purpose of this book is the same as before: to raise user awareness in regard to security and privacy threats present in the use of mobile phones. It is focused on practical issues and easy to follow examples, skipping theoretical analysis of algorithms and standards. Most sections have been enriched with new...
  • №8
  • 4,60 МБ
  • добавлен
  • изменен
Springer, 2016. — 629 p. 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented...
  • №9
  • 28,62 МБ
  • добавлен
  • изменен
Springer, 2016. — 613 p. 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented...
  • №10
  • 16,43 МБ
  • добавлен
  • изменен
Springer, 2019. — 233 p. — ISBN 3030127850. This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September...
  • №11
  • 20,74 МБ
  • добавлен
  • изменен
Syngress, 2017. — 267 p. — ISBN 978-0-12-804629-6. This book provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo-leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and...
  • №12
  • 14,72 МБ
  • добавлен
  • изменен
The Institution of Engineering and Technology, 2018. — 418 p. — (IET Security). — ISBN 9781849199742 (hardback), 9781849199766 (PDF). Information security has extended to include several research directions like user authentication and authorization, network security, hardware security, software security, and data cryptography. Information security has become a crucial need for...
  • №13
  • 25,54 МБ
  • добавлен
  • изменен
Artech House, 2012. — 304 p. — ISBN: 1608074722, 9781608074723, 1608074730, 9781608074730 Computer security was once a casual, even polite, discipline that was practiced in business and government via little tips: Don’t use your name as a password, published policy rules: Please inform the security team of any Internet-facing servers, and off-the-shelf products: Based on our...
  • №14
  • 2,30 МБ
  • добавлен
  • изменен
2nd Edition. — Publishing Certitrek, 2016. — 544 p. — ISBN 978-0-9971607-2-7 Thie CWSP 2nd Edition study guide gives full coverage of all exam objectives in a systematic approach, so you can be confident you're getting the instruction you need for the exam. Exam Essentials is a key feature in each chapter that identifies critical areas you must become proficient in before...
  • №15
  • 16,23 МБ
  • добавлен
  • изменен
Academic Press, 2018. — 503 p. — ISBN 978-0-12-811056-0. This book will assist those who have never collected mobile evidence and augment the work of professionals who are not currently performing advanced destructive techniques. This book is intended for any professional that is interested in pursuing work that involves mobile forensics, and is designed around the outcomes of...
  • №16
  • 49,04 МБ
  • добавлен
  • изменен
Packt Publishing, 2015. — 240 p. iOS has quickly become one of the most popular mobile operating systems, not only with users, but also with developers and companies. This also makes it a popular platform for malicious adversaries. iOS users and developers need to be constantly aware of their mobile security risks. Because of this, there is great demand for risk assessment...
  • №17
  • 5,76 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2018. — 948 р. Recently, the need for knowledge in pc protection and related subjects has expanded dramatically-and is essential for anyone learning Computer Technology or Computer Technological innovation. This is the only written text available to provide incorporated, extensive, up-to-date protection of the wide range of subjects in this topic. In...
  • №18
  • 3,95 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2018. — 1362 р. With new parts dedicated to such current subjects as Reasoning Protection, Cyber-Physical Protection, and Critical Facilities Protection, the book now has 100 sections written by leading experts in their areas, as well as 12 modified appendices and an extended guide. It continues its successful format of offering problem-solving...
  • №19
  • 5,38 МБ
  • добавлен
  • изменен
John Wiley & Sons, Inc., 2013. — 552 p. На англ. языке. Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend....
  • №20
  • 14,62 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 268 p. — ISBN 978-1491960387. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
  • №21
  • 3,31 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 268 p. — ISBN 978-1491960387. — conv. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101...
  • №22
  • 2,11 МБ
  • добавлен
  • изменен
Springer, 2009. — 384 p. It is our great pleasure to compile the Platinum Jubilee Commemorative Monograph Series of the Indian Statistical Institute: Volume 3, titled Algorithms, Architectures, and Information Systems Security. This volume contains mostly a collection of invited papers from leading researchers. It also includes the extended versions of a few papers, which were...
  • №23
  • 5,44 МБ
  • добавлен
  • изменен
CRC Press, 2016. — 311 p. — ISBN 978-1-4987-2965-9. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the...
  • №24
  • 10,02 МБ
  • добавлен
  • изменен
Morgan Kaufmann, 2019. — 501 p. — ISBN 9780128124772. This book provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory...
  • №25
  • 42,78 МБ
  • добавлен
  • изменен
2nd ed. — Addison-Wesley Professional, 2018. — 2065 p. — ISBN: 0321712331, 9780321712332. In his extensively updated Computer Security: Art and Science, 2nd Edition, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers a clear, rigorous, and thorough introduction to the entire modern field of computer security. Bishop covers access control;...
  • №26
  • 28,85 МБ
  • добавлен
  • изменен
Addison-Wesley Professional, 2018. — 1440 p. The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the...
  • №27
  • 27,92 МБ
  • добавлен
  • изменен
Springer, 2013. — 321 p. 57 illus. — ISBN: 9783642394980 In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement...
  • №28
  • 4,50 МБ
  • добавлен
  • изменен
CRC Press; Auerbach Publications, 2017. — 203 p. This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and...
  • №29
  • 5,01 МБ
  • добавлен
  • изменен
Mentor Source, SpuderSec, 2016. — MP4 (Video: AVC 1280x720, Audio: AAC 44KHz 2ch). — Duration: 1 Hours. — Genre: eLearning. — English Do you feel concerned about threats to your cyber security by malware? If so, this course is for you! Do you feel concerned about threats to your cyber security by malware? If so this course is for you! Join us as first we learn a little...
  • №30
  • 83,92 МБ
  • добавлен
  • изменен
New York: Nova Science Publishers, Inc., 2013. — 171 p. — ISBN: 978-1-62948-192-0 (eBook) Chapter 1 – Malware, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or...
  • №31
  • 1,36 МБ
  • добавлен
  • изменен
4th Edition. John Wiley & Sons, Inc., 2002. - 1162 pages. The purpose of this Handbook is to describe information system security (ISS) risks, the measures available to mitigate these risks, and techniques for managing security risks. Security can be defined as the state of being free from danger and not exposed to damage from accidents or attack, or it can be defined as the...
  • №32
  • 10,23 МБ
  • добавлен
  • изменен
Wiley, 2014. — 2207 p. — 6th ed. — ISBN: 1118127064, 9781118127063 Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to...
  • №33
  • 27,72 МБ
  • добавлен
  • изменен
6th edition. — Wiley, 2014. — 2000 p. Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer...
  • №34
  • 15,56 МБ
  • добавлен
  • изменен
3rd Edition. - Prentice Hall, 2012. - 689 p. ISBN-10: 0132145359 ISBN-13: 978-0132145350 A strong business focus through a solid technical presentation of security tools. Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools. This text gives readers the IT security skills they need for the workplace. This edition is more...
  • №35
  • 14,00 МБ
  • добавлен
  • изменен
Syngress, 2007. — 279 p. ISBN-10 1597491144, ISBN-13: 978-1597491143. Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Network...
  • №36
  • 7,81 МБ
  • добавлен
  • изменен
Auerbach Publications, 2018. — 407 р. There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by...
  • №37
  • 17,61 МБ
  • добавлен
  • изменен
Syngress, 2016. — 254 p. Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the...
  • №38
  • 8,26 МБ
  • добавлен
  • изменен
Sybex, 2018. — 768 p. — ISBN 978-1-119-36245-6. An accessible introduction to cybersecurity concepts and practices This book provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices,...
  • №39
  • 94,42 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 284 p. — ISBN 10 1491960388, ISBN 13 978-1491960387. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides...
  • №40
  • 29,25 МБ
  • добавлен
  • изменен
Springer International Publishing AG, 2017. — 177 p. — ISBN 3319686682. This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and...
  • №41
  • 8,23 МБ
  • добавлен
  • изменен
Rockland: Syngress Publishing, Inc., 2006. — 197 с. — ISBN: 1-59749-041-5 User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the...
  • №42
  • 1,80 МБ
  • добавлен
  • изменен
6th edition. — Kogan Page, 2015. — 360 p. Faced with constant and fast-evolving threats to information security and with a growing exposure to cyber risk, managers at all levels and in organizations of all sizes need a robust IT governance system. Now in its sixth edition, the bestselling IT Governance provides guidance for companies looking to protect and enhance their...
  • №43
  • 2,75 МБ
  • добавлен
  • изменен
6th edition. — Kogan Page, 2015. — 360 p. — ISBN 978-0-7494-7405-8. Faced with constant and fast-evolving threats to information security and with a growing exposure to cyber risk, managers at all levels and in organizations of all sizes need a robust IT governance system. Now in its sixth edition, the bestselling IT Governance provides guidance for companies looking to protect...
  • №44
  • 2,65 МБ
  • добавлен
  • изменен
Springer, 2016. — 255 p. — ISBN-10: 3319276670. — ISBN-13: 978-3319276670. — Series: Communications in Computer and Information Science (Book 576) This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were...
  • №45
  • 16,42 МБ
  • добавлен
  • изменен
Apress, 2016. — 253 p. — ISBN 978-1-4842-1685-9. Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective...
  • №46
  • 11,65 МБ
  • добавлен
  • изменен
Artech House, 2001. — 218 p. Here's easy-to-understand book that introduces you to fundamental network security concepts, principles, and terms, while providing you with practical techniques that you can apply on the job. It helps you identify the best type of intrusion detection system for your environment, develop organizational guidelines for passwords, set general computer...
  • №47
  • 2,28 МБ
  • добавлен
  • изменен
4th ed. — Sybex, 2016. — 696 p. — ISBN 978-1119056249. The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of this industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This...
  • №48
  • 6,69 МБ
  • добавлен
  • изменен
Independently published, 2019. — 412 р. — ISBN 978-1793464187. There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several more hundreds of thousands. Tribe of Hackers wants to change that. We asked for industry, career, and personal advice from 70 cybersecurity luminaries who are ready to break down barriers...
  • №49
  • 12,52 МБ
  • добавлен
  • изменен
Wiley, 2019. — 355 p. — ISBN 978-1-119-56637-3. Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how...
  • №50
  • 4,48 МБ
  • добавлен
  • изменен
CRC Press, 2014. — 246 p., 75 Ill. — ISBN: 978-1-4665-1567-3. На англ. языке. Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the...
  • №51
  • 15,61 МБ
  • добавлен
  • изменен
Springer, 2016. — 599. The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari...
  • №52
  • 14,66 МБ
  • добавлен
  • изменен
Sybex, 2016. — 456 p. — ISBN 978-1119252283. Full-length practice tests covering all CISSP domains for the ultimate in exam prep The CISSP Official (ISC)2 Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain so you can practice on any domains you know you need to brush up on....
  • №53
  • 4,27 МБ
  • добавлен
  • изменен
Sybex, 2018. — 477 p. — ISBN 1119433207. CompTIA CySA+ Practice Tests provides invaluable preparation for the Cybersecurity Analyst exam CS0-001. With 1,000 questions covering 100% of the exam objectives, this book offers a multitude of opportunities for the savvy CySA+ candidate. Prepare more efficiently by working through questions before you begin studying, to find out what you...
  • №54
  • 13,47 МБ
  • добавлен
  • изменен
Sybex, 2018. — 477 p. — ISBN 1119433207. CompTIA CySA+ Practice Tests provides invaluable preparation for the Cybersecurity Analyst exam CS0-001. With 1,000 questions covering 100% of the exam objectives, this book offers a multitude of opportunities for the savvy CySA+ candidate. Prepare more efficiently by working through questions before you begin studying, to find out what you...
  • №55
  • 16,02 МБ
  • добавлен
  • изменен
Sybex 2018 - 512 стр. ISBN: 9781119475927 Full-length practice tests covering all CISSP domains for the ultimate exam prep The (ISC)2 CISSP Official Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain. You also have access to four unique 125-question practice exams to help...
  • №56
  • 13,03 МБ
  • добавлен
  • изменен
Sybex, 2017. — 552 p. — ISBN 978-1119348979. Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities with...
  • №57
  • 9,17 МБ
  • добавлен
  • изменен
Sybex, 2017. — 552 p. — ISBN 978-1119348979. Prepare yourself for the newest CompTIA certification. The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities with...
  • №58
  • 16,12 МБ
  • добавлен
  • изменен
Sybex, 2017. — 552 p. — ISBN 978-1-119-34897-9. Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities...
  • №59
  • 5,64 МБ
  • добавлен
  • изменен
Sybex, 2016. — 456 p. — ISBN 978-1-119-25228-3. Full-length practice tests covering all CISSP domains for the ultimate in exam prep The CISSP Official (ISC)2 Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain so you can practice on any domains you know you need to brush up...
  • №60
  • 3,87 МБ
  • добавлен
  • изменен
Sybex, 2016. — 456 p. — ISBN 978-1-119-25228-3. Full-length practice tests covering all CISSP domains for the ultimate in exam prep The CISSP Official (ISC)2 Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain so you can practice on any domains you know you need to brush up...
  • №61
  • 5,59 МБ
  • добавлен
  • изменен
Springer Nature Switzerland AG, 2018. — xxx+219 p. — (Lecture Notes in Computer Science, 11348). — ISBN 978-3-030-05072-6. This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018. The 12 full papers presented together with 5 short paper, were...
  • №62
  • 2,27 МБ
  • добавлен
  • изменен
Springer, 2015. — 151 p. — ISBN 978-3-319-15150-2. Well researched, hard-hitting, and visionary in application, Cybercrime, Digital Forensics and Jurisdiction is an essential reading for anyone involved with understanding and preventing cybercrime—business entities, private citizens, and government agencies. Because cyberspace is easily accessible, geographically unbounded, and...
  • №63
  • 3,08 МБ
  • добавлен
  • изменен
Wiley, 2015. — 816 p. — ISBN-13 978-1118958506. The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone...
  • №64
  • 41,80 МБ
  • добавлен
  • изменен
Wiley, 2015. — 816 p. — ISBN-13 978-1118958506. The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone...
  • №65
  • 6,39 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 300 p. Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you have a surface-level understanding of machine learning,...
  • №66
  • 7,64 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 300 p. Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you have a surface-level understanding of machine learning,...
  • №67
  • 96,67 КБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 300 p. Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you have a surface-level understanding of machine learning,...
  • №68
  • 83,91 КБ
  • добавлен
  • изменен
O'Reilly Media, 2018. — 386 p. — ISBN 1491979909. True PDF Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you have a surface-level...
  • №69
  • 6,36 МБ
  • добавлен
  • изменен
O'Reilly Media, 2018. — 371 p. — ISBN 1491979909. Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you'll explore ways to apply machine learning to...
  • №70
  • 8,63 МБ
  • добавлен
  • изменен
Amazon Digital Services, 2015. — 72 p. Has your email or Facebook ever been hacked? Do you know someone who’s credit card number was stolen? Have you gotten a virus on your computer and had to pay $100 or more to get rid of it? Problems like these plague the average computer user, and happen all too often. Read this book, and you’ll learn how to keep your information secure,...
  • №71
  • 803,02 КБ
  • добавлен
  • изменен
М.: Cisco Russia, 2015. — 53 с. Годовой отчет Cisco по безопасности за 2015 год. Краткий обзор. Аналитика угроз. Сведения об угрозах, представленные в отчете, отражают результаты работы ведущих экспертов Cisco. Злоумышленники против разработчиков систем безопасности: продолжающаяся гонка Веб-эксплойты: создатели эксплойт-китов считают, что высшая строчка в рейтинге не...
  • №72
  • 6,72 МБ
  • добавлен
  • изменен
Cisco, 2017. — 110 с. Содержание: Краткий обзор. Ландшафт атак. Эволюция вредоносного ПО. Зашифрованный вредоносный веб-трафик. Угрозы для электронной почты. Тактики обхода песочницы. Неправомерное использование облачных сервисов и других легитимных ресурсов. IoT и DDoS-атаки. Уязвимости и исправления. Ландшафт защитников. Цена атак. Трудности и препятствия. Сложности, создаваемые...
  • №73
  • 5,19 МБ
  • добавлен
  • изменен
Cisco, 2018. — 68 с. Содержание: Краткий обзор. Ландшафт атак. Эволюция вредоносного ПО. Зашифрованный вредоносный веб-трафик. Угрозы для электронной почты. Тактики обхода песочницы. Неправомерное использование облачных сервисов и других легитимных ресурсов. IoT и DDoS-атаки. Уязвимости и исправления. Ландшафт защитников. Цена атак. Трудности и препятствия. Сложности, создаваемые...
  • №74
  • 5,29 МБ
  • добавлен
  • изменен
Cisco, 2017. — 90 с. Содержание: Краткий обзор. Ландшафт атак. Эволюция вредоносного ПО. Зашифрованный вредоносный веб-трафик. Угрозы для электронной почты. Тактики обхода песочницы. Неправомерное использование облачных сервисов и других легитимных ресурсов. IoT и DDoS-атаки. Уязвимости и исправления. Ландшафт защитников. Цена атак. Трудности и препятствия. Сложности, создаваемые...
  • №75
  • 8,53 МБ
  • добавлен
  • изменен
Syngress, Elsevier, 2013., - 309 p., ISBN: 1597499498 The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and...
  • №76
  • 7,11 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2013. — 560 p. — ISBN 978-0-07-179877-8. Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures....
  • №77
  • 20,58 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2013. — 560 p. — ISBN 978-0-07-179877-8. Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures....
  • №78
  • 29,32 МБ
  • добавлен
  • изменен
O’Reilly Media, Inc., 2014. — 348 p. — ISBN 10 1449357903. Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools...
  • №79
  • 13,51 МБ
  • добавлен
  • изменен
4th ed. — McGraw-Hill Education, 2015. — 768 p. — ASIN 978-0071835978. Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+. Principles of Computer Security, Fourth Edition is a student-tested, introductory computer security textbook that provides comprehensive...
  • №80
  • 30,39 МБ
  • добавлен
  • изменен
4th ed. — McGraw-Hill Education, 2015. — 768 p. — ASIN 978-0071835978. Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+. Principles of Computer Security, Fourth Edition is a student-tested, introductory computer security textbook that provides comprehensive...
  • №81
  • 28,94 МБ
  • добавлен
  • изменен
Fourth Edition. — McGraw-Hill Education, 2016. — 1016 p. — (Official Comptia Guide). — ISBN: 978-0-07-183597-8. Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+. Principles of Computer Security, Fourth Edition is a student-tested, introductory computer...
  • №82
  • 58,65 МБ
  • добавлен
  • изменен
Fourth Edition. — McGraw-Hill Education, 2016. — 768 p. — (Official Comptia Guide). — ISBN: 978-0-07-183597-8. Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+. Principles of Computer Security, Fourth Edition is a student-tested, introductory computer security...
  • №83
  • 28,01 МБ
  • добавлен
  • изменен
Third Edition. — Syngress, 2017. — 226 p. — ISBN 978-0-12-811248-9. This book, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are...
  • №84
  • 8,11 МБ
  • добавлен
  • изменен
Springer, 2018. — 295 p. — (Advances in Information Security 72). — ISBN 3319976427. Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system...
  • №85
  • 5,63 МБ
  • добавлен
  • изменен
Springer, 2018. — 295 p. — (Advances in Information Security 72). — ISBN 3319976427. Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system...
  • №86
  • 16,63 МБ
  • добавлен
  • изменен
Springer, 2016. — 213 p. — (Law, Governance and Technology Series). — ISBN 10 3319391976, ISBN 13 978-3319391977. This book is about power and freedoms in our technological world and has two main objectives. The first is to demonstrate that a theoretical exploration of the algorithmic governmentality hypothesis combined with the capability approach is useful for a better...
  • №87
  • 3,25 МБ
  • добавлен
  • изменен
Springer, 2017. — 241 p. — (Lecture Notes in Computer Science). — ISBN 10 3319548751. — ISBN 13 978-3319548753. This book constitutes the revised selected papers from the 11th International Conference on Risk and Security of Internet and Systems, CRISIS 2016, held in Roscoff, France, in September 2016. The 17 full papers presented in this volume were carefully reviewed and...
  • №88
  • 14,70 МБ
  • добавлен
  • изменен
Momentum Press, 2019. — 154 p. — ISBN 978-1947083998. This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud. Cloud computing has already been adopted by many organizations and people because of its advantages of economy,...
  • №89
  • 1,78 МБ
  • добавлен
  • изменен
Momentum Press, 2019. — 154 p. — ISBN 978-1947083998. This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud. Cloud computing has already been adopted by many organizations and people because of its advantages of economy,...
  • №90
  • 1,81 МБ
  • добавлен
  • изменен
Momentum Press, 2019. — 154 p. — ISBN 978-1947083998. This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud. Cloud computing has already been adopted by many organizations and people because of its advantages of economy,...
  • №91
  • 1,88 МБ
  • добавлен
  • изменен
Momentum Press, 2019. — 154 p. — ISBN 978-1947083998. This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud. Cloud computing has already been adopted by many organizations and people because of its advantages of economy,...
  • №92
  • 2,62 МБ
  • добавлен
  • изменен
Momentum Press, 2019. — 154 p. — ISBN 978-1947083998. This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud. Cloud computing has already been adopted by many organizations and people because of its advantages of economy,...
  • №93
  • 2,11 МБ
  • добавлен
  • изменен
Elsevier, 2015. — 46 p. How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end...
  • №94
  • 3,79 МБ
  • добавлен
  • изменен
Apress, 2007. — 290 p. — ISBN 1590597842. This book offers software developers clear guidance on safe coding practices. It clearly and simply lays out the most common threats that programmers need to defend against. Taking a broad focus, the book then shows programmers how to make their defense. This book offers software developers clear guidance on safe coding practices. It...
  • №95
  • 11,16 МБ
  • добавлен
  • изменен
IMPERVA Whitepaper. Авторство и выходные данные не приведены. DDoS 101 – The Basics. Building the Right DDoS Protection Strategy. Responding To an Attack. Post-Attack Steps. DDoS Glossary.
  • №96
  • 404,65 КБ
  • добавлен
  • изменен
Auerbach Publications, 2017. — 422 p. — ISBN 978-1482244151. This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization. So what is data protection? This...
  • №97
  • 6,44 МБ
  • добавлен
  • изменен
A netZentry Technology White Paper. Авторство и выходные данные не приведены. Distributed Denial-Of-Service (DDoS) Attacks. Approaches to DDoS Defense. Attack Detection. Attack Tracking. Attack Mitigation. Defense Management. CleanTraffic Deployment. CleanTraffic Operating System. Traffic Capture Methods. Mitigation Choices. CleanTraffic Performance. Summary.
  • №98
  • 986,97 КБ
  • добавлен
  • изменен
PCI DSS 3.2 edition. — Amazon Digital Services LLC, 2017. — 117 p. — ASIN: B073WRTJNL. Volume in the series explaining the PCI DSS. This volume tries to provide actual real-life examples of how to address PCI DSS. They remain hypothetical since none of the fictitious companies are clients of mine. But the information is nonetheless based on experience serving clients of all types...
  • №99
  • 902,34 КБ
  • добавлен
  • изменен
PCI DSS 3.2 edition. — Amazon Digital Services LLC, 2017. — 83 p. — ASIN: B073WRTJNL. Volume in the series explaining the PCI DSS. This volume tries to provide actual real-life examples of how to address PCI DSS. They remain hypothetical since none of the fictitious companies are clients of mine. But the information is nonetheless based on experience serving clients of all types...
  • №100
  • 883,68 КБ
  • добавлен
  • изменен
PCI DSS 3.2 edition. — Amazon Digital Services LLC, 2017. — 84 p. — ASIN: B073WRTJNL. Volume in the series explaining the PCI DSS. This volume tries to provide actual real-life examples of how to address PCI DSS. They remain hypothetical since none of the fictitious companies are clients of mine. But the information is nonetheless based on experience serving clients of all types...
  • №101
  • 1,05 МБ
  • добавлен
  • изменен
PCI DSS 3.2 edition. — Amazon Digital Services LLC, 2017. — 31 p. — ASIN: B073WRTJNL. Volume in the series explaining the PCI DSS. This volume tries to provide actual real-life examples of how to address PCI DSS. They remain hypothetical since none of the fictitious companies are clients of mine. But the information is nonetheless based on experience serving clients of all types...
  • №102
  • 1,38 МБ
  • добавлен
  • изменен
Springer, 2015. — 412 p. — ISBN-10: 3319276581. — ISBN-13: 978-3319276588. — Series: Lecture Notes in Computer Science (Book 7807) This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14 short...
  • №103
  • 13,60 МБ
  • добавлен
  • изменен
O'Reilly Media, 2015. - 296p. A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected...
  • №104
  • 57,80 МБ
  • добавлен
  • изменен
O'Reilly Media, 2015. - 296p. A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected...
  • №105
  • 41,90 МБ
  • добавлен
  • изменен
Apress, 2016. — 181 p. — ISBN 10 148422180X. — ISBN 13 978-1484221808. Teaches you exactly how program memory content and organization is vital for computer security, especially Unix-like operating systems. You will learn how it is manipulated to take control of a computer system, as well as the countermeasures that system designers set up to avoid this. Neither a guide for...
  • №106
  • 9,28 МБ
  • добавлен
  • изменен
Apress, 2015. — 536 p. — (The Expert's Voice in Cybersecurity). — ISBN: 978-1430260820 How to Build a Successful Cyberdefense Program Against Advanced Threats. Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a...
  • №107
  • 21,27 МБ
  • добавлен
  • изменен
Apress, 2018. - 709p. - ISBN: 978-1484232576 Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense...
  • №108
  • 54,34 МБ
  • добавлен
  • изменен
Apress, 2018. - 709p. - ISBN: 978-1484232576 Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense...
  • №109
  • 20,49 МБ
  • добавлен
  • изменен
Amazon Asia-Pacific Holdings Private Limited, 2017. — 18 p. — ISBN 1370830629, ASIN: B07414Z5XB. Point to remember for CISA Exam: In any given situation, fiber-optic cables have proven to be more secure than the other media. They have very low transmission loss, not affected by EMI and preferred choice for high volumes and long distance calls. When CISA question is about...
  • №110
  • 256,61 КБ
  • добавлен
  • изменен
Amazon Asia-Pacific Holdings Private Limited, 2017. — 11 p. — ISBN 1370830629, ASIN: B07414Z5XB. Point to remember for CISA Exam: In any given situation, fiber-optic cables have proven to be more secure than the other media. They have very low transmission loss, not affected by EMI and preferred choice for high volumes and long distance calls. When CISA question is about...
  • №111
  • 343,24 КБ
  • добавлен
  • изменен
5th edition. — Sybex, 2011. — 696 p. This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside the new, CompTIA Authorized edition, you'll find complete coverage of all Security+ exam objectives, loads of real-world examples, and a CD packed with cutting-edge exam prep tools. The book covers key exam...
  • №112
  • 33,54 МБ
  • добавлен
  • изменен
Pearson, 2012. - 350 pages. 2nd Edition. На англ. языке. Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor...
  • №113
  • 5,73 МБ
  • добавлен
  • изменен
3rd Edition. — Pearson Education, Inc., USA, 2016. — 447 p. — ISBN: 078975746X One-Volume Introduction to Computer Security Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today’s latest attacks and countermeasures The perfect beginner’s guide for anyone interested in a computer security career Chuck Easttom brings together...
  • №114
  • 7,01 МБ
  • добавлен
  • изменен
Pearson IT Certification, 2018. — 510 р. — ISBN 0789759373. The perfect introduction to pen testing for all IT professionals and students Clearly explains key concepts, terminology, challenges, tools, and skills Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom...
  • №115
  • 16,18 МБ
  • добавлен
  • изменен
Cengage Learning, 2009. — 192 p. — ISBN-10 1435483642; ISBN-13 978-1435483644. The EC-Council Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive...
  • №116
  • 6,43 МБ
  • добавлен
  • изменен
Syngress, 2017. — 413 p. — ISBN 978-0-12-805349-2. This book teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber...
  • №117
  • 11,48 МБ
  • добавлен
  • изменен
Wiley, 2019. — 355 p. — ISBN 1119053285. In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and...
  • №118
  • 4,28 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2015. — 544 р. — ISBN 978-0071819749. Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware. After explaining malware architecture...
  • №119
  • 17,76 МБ
  • добавлен
  • изменен
Springer Science & Business Media, 2012. — 260 p. — (Studies in Computational Intelligence 394). The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference...
  • №120
  • 5,53 МБ
  • добавлен
  • изменен
CRC Press, 2014. — 296 p. — ISBN-10: 1482205394, ISBN-13: 978-1-4822-0540-4. На англ. языке. Since databases are the primary repositories of information for today’s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models...
  • №121
  • 2,26 МБ
  • добавлен
  • изменен
De Gruyter, 2017. — 314 p. — (Advances in Computer Science). — ISBN 10 3110476045, 13 978-3110476040. The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in...
  • №122
  • 3,68 МБ
  • добавлен
  • изменен
Academic Press, 2018. — 356 p. — ISBN 978-0-12-811373-8. This book presents current, state-of-the-art work on novel research in theoretical and practical resilience and security aspects of intelligent data-centric critical systems and networks. The book analyzes concepts and technologies that are successfully used in the implementation of intelligent data-centric critical systems...
  • №123
  • 18,54 МБ
  • добавлен
  • изменен
IGI Global, 2018. — 647 р. — ISBN 978-1522547630. The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with...
  • №124
  • 22,94 МБ
  • добавлен
  • изменен
Springer: 2014. — 144 p. — ISBN: 978-3319057194. Язык: Английский. This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may...
  • №125
  • 10,09 МБ
  • добавлен
  • изменен
Chapman & Hall/CRC Press, 2011. — 356 p. The book has four parts. Part I discusses the fundamentals of privacypreserving data publishing. Part II presents anonymization methods for preserving information utility for some specific data mining tasks. The data publishing scenarios discussed in Part I and Part II assume publishing a single data release from one data holder. In...
  • №126
  • 4,71 МБ
  • добавлен
  • изменен
Black Dog Media Limited, 2018. — 192 p. — (Black Dog iTech Series). Viruses, malware, ransomware, phishing, smishing, vishing, social engineering... the list of digital threats with peculiar names expands daily and hardly a moment goes by without some form of attack appearing in the news. We live in interesting times, wheredata is worth more than oil or gold and your personal...
  • №127
  • 26,78 МБ
  • добавлен
  • изменен
Springer, 2016. — 112 p. — ISBN 10 3319449613. This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and...
  • №128
  • 2,80 МБ
  • добавлен
  • изменен
Syngress, Elsevier, 2013., - 585 p., ISBN: 978-1-59749-641-4 If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department...
  • №129
  • 9,75 МБ
  • добавлен
  • изменен
Springer, 2017. — 446 p. — (Lecture Notes in Computer Science). — ISBN 10 3319678159, 13 978-3319678153. This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on...
  • №130
  • 16,80 МБ
  • добавлен
  • изменен
O'Reilly, 1997 — 506 p. Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about? Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks are and explains how you can...
  • №131
  • 3,26 МБ
  • добавлен
  • изменен
Springer, 2008. — 577 p. — ISBN 978-0-387-48533-1. The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents the most comprehensive work on...
  • №132
  • 7,59 МБ
  • добавлен
  • изменен
Amazon Digital Services, 2017. — 1207 p. — ASIN B07652KDXM. Pass the First Time. The CompTIA Security+ Get Certified Get Ahead SY0-501 Study Guide is an update to the top-selling SY0-201, SY0-301, and SY0-401 study guides, which have helped thousands of readers pass the exam the first time they took it. It covers all of the SY0-501 objectives and includes the same elements readers...
  • №133
  • 5,31 МБ
  • добавлен
  • изменен
Amazon Digital Services, 2017. — 1207 p. — ASIN B07652KDXM. Pass the First Time. The CompTIA Security+ Get Certified Get Ahead SY0-501 Study Guide is an update to the top-selling SY0-201, SY0-301, and SY0-401 study guides, which have helped thousands of readers pass the exam the first time they took it. It covers all of the SY0-501 objectives and includes the same elements readers...
  • №134
  • 10,51 МБ
  • добавлен
  • изменен
Amazon Digital Services, 2017. — 1207 p. — ASIN B07652KDXM. Pass the First Time. The CompTIA Security+ Get Certified Get Ahead SY0-501 Study Guide is an update to the top-selling SY0-201, SY0-301, and SY0-401 study guides, which have helped thousands of readers pass the exam the first time they took it. It covers all of the SY0-501 objectives and includes the same elements readers...
  • №135
  • 5,22 МБ
  • добавлен
  • изменен
Sybex, 2015. — 1080 p. — ISBN 978-1119042716. True PDF CISSP Study Guide - fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare...
  • №136
  • 37,63 МБ
  • добавлен
  • изменен
Sybex, 2018. — 1080 p. — ISBN 978-111904271 8th.ed. CISSP Study Guide - fully updated for the 2018 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare...
  • №137
  • 9,50 МБ
  • добавлен
  • изменен
Sybex, 2018. — 1080 p. — ISBN 978-111904271 8th.ed. CISSP Study Guide - fully updated for the 2018 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare...
  • №138
  • 4,38 МБ
  • добавлен
  • изменен
Sybex, 2018. — 1080 p. — ISBN 978-111904271 8th.ed. CISSP Study Guide - fully updated for the 2018 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare...
  • №139
  • 5,13 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 240 p. — ISBN 978-1491962190. The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the...
  • №140
  • 2,28 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 240 p. — ISBN 978-1491962190. The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the...
  • №141
  • 5,17 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 240 p. — ISBN 978-1491962190. The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the...
  • №142
  • 2,45 МБ
  • добавлен
  • изменен
2nd ed. — Synthypnion Press LLC, 2017. — 326 p. — ISBN 1944373098. How does one ensure information security for a computer that is entangled with the structures and processes of a human brain - and for the human mind that is interconnected with it? The need to provide information security for neuroprostheses grows as more people utilize cochlear implants, retinal prostheses,...
  • №143
  • 3,74 МБ
  • добавлен
  • изменен
Hoboken: Wiley. 2011. - 456p. A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes...
  • №144
  • 1,64 МБ
  • добавлен
  • изменен
Wiley, 2014. — 312 p. — ISBN-10 1118810112; ISBN-13 978-1118810118. Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected...
  • №145
  • 22,82 МБ
  • добавлен
  • изменен
Butterworth-Heinemann: 2014, - 286c. Язык : English In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better...
  • №146
  • 7,33 МБ
  • добавлен
  • изменен
Syngress, Elsevier, 2011., - 272 p., ISBN-10: 1597496138, ISBN-13: 978-1597496131 Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which...
  • №147
  • 14,33 МБ
  • добавлен
  • изменен
Auerbach Publications, 2010. — 342 p. The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures. To...
  • №148
  • 5,18 МБ
  • добавлен
  • изменен
John Wiley & Sons, Inc., 2015. — 480 p. — ISBN 1118987055. The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and...
  • №149
  • 102,70 МБ
  • добавлен
  • изменен
Special edition. — John Wiley & Sons, Inc., 2013. — 51 p. Contents: Introduction. Discovering What Advanced Persistent Threats (APTs) Are All About. Perusing the Methods Used to Stop APTs. Looking into Seculert’s APT Protection Architecture. Enabling Business in the Shadow of APT. Ten Ways Seculert Helps Reduce APTs.
  • №150
  • 5,02 МБ
  • добавлен
  • изменен
Syngress, 2017. — 283 p. — ISBN 978-0-12-803773-7. This Handbook presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring...
  • №151
  • 15,76 МБ
  • добавлен
  • изменен
New York: IOS Press, 2014. - 104p. Until quite recently, the correctness and security of software systems was a largely theoretical problem relevant only for a small group of computer specialists. Today it is a fundamental problem for society at large, with security breaches in banking software, malware attacks and bugs in programs affecting millions of people and making the...
  • №152
  • 6,42 МБ
  • добавлен
  • изменен
Apress, 2018. — 363 p. Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to...
  • №153
  • 9,74 МБ
  • добавлен
  • изменен
Apress, 2018. — 363 p. Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to...
  • №154
  • 7,67 МБ
  • добавлен
  • изменен
Wiley, 2014. — 914 p. — ISBN-10 1118825098. — ISBN-13 978-1118825099. Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a...
  • №155
  • 7,18 МБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 1045 p. — ASIN: B01N35OHY0. Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Pentest Android apps and perform various attacks in the real world using real case studies Who This Book Is For This course is...
  • №156
  • 54,68 МБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 1045 p. — ASIN: B01N35OHY0. Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Pentest Android apps and perform various attacks in the real world using real case studies Who This Book Is For This course is for...
  • №157
  • 54,72 МБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 1045 p. — ASIN: B01N35OHY0. Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Pentest Android apps and perform various attacks in the real world using real case studies Who This Book Is For This course is for...
  • №158
  • 54,65 МБ
  • добавлен
  • изменен
Britannica Educational Publishing, 2018. — 32 p. — (Let's Find Out! Computer Science). Inexperienced users of computers often jump at the chance to click colorful flashing ads on the sidebar and are also tempted to download files from sites not worthy of trust. In short, people need to learn how to stay safe online. This book will introduce readers to different types of online...
  • №159
  • 6,75 МБ
  • добавлен
  • изменен
Apress, 2013. — 143 p. — (Expert's Voice in Information Technology). — ISBN: 9781430251132 This ApressOpen book describes the changing risk environment and why a fresh approach to information security is needed.The book discusses business risk from a broad perspective, including privacy and regulatory considerations. It describes the increasing number of threats and...
  • №160
  • 2,79 МБ
  • добавлен
  • изменен
2nd ed. — Apress, 2016. — 208 p. — ISBN: 9781484214565 Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology...
  • №161
  • 10,46 МБ
  • добавлен
  • изменен
2nd Ed. — Apress, 2016. — 223 p. — ISBN 10 1484214560, 13 978-1484214565. This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience about how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the...
  • №162
  • 985,50 КБ
  • добавлен
  • изменен
McGraw-Hill, 2018. - 461p. - ISBN: 1260142671 5th.ed. This fully updated self-study guide offers complete coverage of all eight Certified Information Systems Security Professional exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. To reinforce important skills and facilitate retention, every question is accompanied by in-depth...
  • №163
  • 10,81 МБ
  • добавлен
  • изменен
6th Edition. — McGraw-Hill Education, 2012. — 1456 p. Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by the International Information Systems Security Certification Consortium (ISC2). This authoritative exam guide features learning objectives at...
  • №164
  • 58,77 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2010. — 396 p. ISBN-10: 0071713409 ISBN-13: 978-0071713405 IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those...
  • №165
  • 5,13 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2015. — 416 p. — ISBN-13 978-0071846776. Minimize risk, protect corporate assets, and avoid catastrophic cybersecurity incidents by adopting a program philosophy that stresses the human element of security. People-Centric Security: Transforming Your Enterprise Security Culture shows, step-by-step, how to analyze and articulate your organization’s cultural...
  • №166
  • 15,30 МБ
  • добавлен
  • изменен
CRC Press, 2019. — 350 p. The book is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored...
  • №167
  • 47,95 МБ
  • добавлен
  • изменен
CRC Press, 2010. — 568 p. — 2nd ed. — ISBN: 1439815453, 9781439815458 Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective...
  • №168
  • 3,40 МБ
  • добавлен
  • изменен
Wiley, 2016. — 304 p. — ISBN: 1119085292, 9781119085294 A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to...
  • №169
  • 21,93 МБ
  • добавлен
  • изменен
Буклет от компании InfoWatch Содержание. Введение. Защита конфиденциальности. Решения. InfoWatch Traffic Monitor. InfoWatch Device Monitor. InfoWatch Enterpriwe Solution. Сервисы. Наши партнеры. О компании.
  • №170
  • 7,92 МБ
  • дата добавления неизвестна
  • изменен
Springer 2015, http://www.springer.com/la/book/9783662487990, ISBN 978-3-662-48800-3, 809pp. 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference...
  • №171
  • 22,03 МБ
  • добавлен
  • изменен
Wiley, 2014. — 354 p. in color. — ISBN: 1118793722, 9781118793725 Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon...
  • №172
  • 8,17 МБ
  • добавлен
  • изменен
Wiley-IEEE Press, 2011. — 728 p. — ISBN: 0470565128, 9780470565124 Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and...
  • №173
  • 11,85 МБ
  • добавлен
  • изменен
Springer, 2013. — 447 p. This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and...
  • №174
  • 10,03 МБ
  • добавлен
  • изменен
Springer, 2013. — 50 p. — ISBN: 1461473934. На англ. языке. Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and...
  • №175
  • 3,63 МБ
  • добавлен
  • изменен
CTS GMBH, 2017. — 36 p. — (CTS SOLUTIONS IT-PRO E). — ASIN B01N7RZ9XC. Secure your Web server with free Let's Encrypt Certificates. Guide to fully automate the process of creating and renewing certificates without the need of installing extra software. Script based copy & paste solution for Linux, FreeBSD and Plesk. Introduction SSL Certificates In the past services offered on the...
  • №176
  • 144,35 КБ
  • добавлен
  • изменен
CTS GMBH, 2017. — 37 p. — (CTS SOLUTIONS IT-PRO E). — ASIN B01N7RZ9XC. Secure your Web server with free Let's Encrypt Certificates. Guide to fully automate the process of creating and renewing certificates without the need of installing extra software. Script based copy & paste solution for Linux, FreeBSD and Plesk. Introduction SSL Certificates In the past services offered on the...
  • №177
  • 139,28 КБ
  • добавлен
  • изменен
CTS GMBH, 2017. — 26 p. — (CTS SOLUTIONS IT-PRO E). — ASIN B01N7RZ9XC. Secure your Web server with free Let's Encrypt Certificates. Guide to fully automate the process of creating and renewing certificates without the need of installing extra software. Script based copy & paste solution for Linux, FreeBSD and Plesk. Introduction SSL Certificates In the past services offered on the...
  • №178
  • 133,95 КБ
  • добавлен
  • изменен
CTS GMBH, 2017. — 44 p. — (CTS SOLUTIONS IT-PRO E). — ASIN B01N7RZ9XC. Secure your Web server with free Let's Encrypt Certificates. Guide to fully automate the process of creating and renewing certificates without the need of installing extra software. Script based copy & paste solution for Linux, FreeBSD and Plesk. Introduction SSL Certificates In the past services offered on the...
  • №179
  • 455,52 КБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 350 p. — ISBN 978-1787288683. Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed...
  • №180
  • 10,05 МБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 350 p. — ISBN 978-1787288683. Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed...
  • №181
  • 23,98 МБ
  • добавлен
  • изменен
Packt Publishing , 2017. — 350 p. — ISBN 978-1787288683. Key Features Learn incident response fundamentals and create an effective incident response framework Master forensics investigation utilizing digital investigative techniques Contains real-life scenarios that effectively use threat intelligence and modeling techniques Book Description Digital Forensics and Incident Response...
  • №182
  • 10,55 МБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 350 p. — ISBN 978-1787288683. Key Features Learn incident response fundamentals and create an effective incident response framework Master forensics investigation utilizing digital investigative techniques Contains real-life scenarios that effectively use threat intelligence and modeling techniques Book Description Digital Forensics and Incident Response...
  • №183
  • 23,13 МБ
  • добавлен
  • изменен
Packt Publishing , 2017. -350p. - ISBN: 978-1787288683 Key Features Learn incident response fundamentals and create an effective incident response framework Master forensics investigation utilizing digital investigative techniques Contains real-life scenarios that effectively use threat intelligence and modeling techniques Book Description Digital Forensics and Incident Response...
  • №184
  • 10,22 МБ
  • добавлен
  • изменен
Packt Publishing, 2015. — 220 p. Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary...
  • №185
  • 12,28 МБ
  • добавлен
  • изменен
Packt Publishing, 2015. — 220 p. Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary...
  • №186
  • 20,31 МБ
  • добавлен
  • изменен
Syngress, 2016. — 678 p. — ISBN 0128023244. Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and...
  • №187
  • 45,42 МБ
  • добавлен
  • изменен
Cary, NC: DZone, 2018. — 54 p. As software attacks become more frequent and severe, it’s becoming more and more important to understand the top threats and how to protect against them. The 2018 DZone Guide to Security: Defending Your Code covers going beyond shifting left to protect applications, how to reduce hacker risk, and how AI takes security to the next level. Table of...
  • №188
  • 5,62 МБ
  • добавлен
  • изменен
CRC Pres, 2011. — 340 p. A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens,...
  • №189
  • 3,85 МБ
  • добавлен
  • изменен
Simon & Schuster, 2016. — 352 p. “A consistently eye-opening history...not just a page-turner but consistently surprising.” —The New York Times “A book that grips, informs, and alarms, finely researched and lucidly related.” —John le Carré As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber...
  • №190
  • 2,11 МБ
  • добавлен
  • изменен
Springer, 2017. - 147p. - ISBN: 3319674498 This work introduces the reader to the world of digital forensics in a practical and accessible manner. The text was written to fulfill a need for a book that introduces forensic methodology and sound forensic thinking, combined with hands-on examples for common tasks in a computer forensic examination. The author has several years of...
  • №191
  • 5,14 МБ
  • добавлен
  • изменен
Springer, 2018. — 174 p. — (Advances in Information Security 71). — ISBN 331991426X. This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas. It also considers scenarios where deploying smart grids can be both cost-prohibitively expensive and logistically challenging. Deploying smart microgrids...
  • №192
  • 2,85 МБ
  • добавлен
  • изменен
Business Science Reference, 2010. — 350 p. Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are...
  • №193
  • 2,58 МБ
  • дата добавления неизвестна
  • изменен
Jones & Bartlett Learning, 2010. — 514 p. — (Information Systems Security & Assurance Series). — ISBN: 0763790257 Part of the New Jones & Bartlett Learning Information Systems Security & Assurance Series! Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems...
  • №194
  • 16,86 МБ
  • добавлен
  • изменен
3rd ed. — Jones & Bartlett Learning, 2016. — 548 p. — ISBN 9781284116458. Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more: http://www.issaseries.com/ Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential...
  • №195
  • 10,74 МБ
  • добавлен
  • изменен
2nd Ed. — Take Control Books, 2016. — 145 p. — ASIN B01BI2FCRO. Preview ebook The book focuses on 1Password 6 for the Mac, but he also provides details and directions for the iOS, Windows, and Android versions of 1Password. Topics include: Meet 1Password: Set your master passcode, explore the various 1Password components, and decide on your ideal usage strategy. Master logins: In...
  • №196
  • 3,61 МБ
  • добавлен
  • изменен
3rd Ed. — Take Control Books, 2017. — 744 p. — ASIN B0722NNH61. Preview ebook Learn what's private online (not much)--and what to do about it! Nowadays, it can be difficult to complete ordinary activities without placing your personal data online, but having your data online puts you at risk for theft, embarrassment, and all manner of trouble. In this book, Joe Kissell helps you...
  • №197
  • 3,43 МБ
  • добавлен
  • изменен
Syngress, Elsevier, 2013., - 224 p., ISBN: 1597499986 Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the...
  • №198
  • 9,22 МБ
  • добавлен
  • изменен
CRC Press, 2016. — 342 p. — ISBN-10: 1498740545. The Complete Guide to Cybersecurity Risks and Control s presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data....
  • №199
  • 18,25 МБ
  • добавлен
  • изменен
Springer, 2018. — 471 р. This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government. Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security - which is often and incorrectly conflated with resilience – resilience refers to the system's ability to...
  • №200
  • 10,76 МБ
  • добавлен
  • изменен
Morgan & Claypool, 2013. — 117 p. In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of...
  • №201
  • 1,11 МБ
  • добавлен
  • изменен
Springer, 2005. — 118 p. — ISBN 9780387233994. Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography. The Internet is omnipresent...
  • №202
  • 2,65 МБ
  • добавлен
  • изменен
John Wiley & Sons, Inc., 2003. - 331 pages. Get ready to pass the CISSP exam and earn your certification with this advanced test guide. Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by International Information Systems Security Certification Consortium (ISC). ISC formed in mid-1989 as a non-profit...
  • №203
  • 1,63 МБ
  • добавлен
  • изменен
NJ: John Wiley & Sons, 2001. — 528 p. — ISBN-13: 000-0471413569 ISBN-10: 0471413569. With the growing threat of computer viruses and Internet security breaches, companies are fiercely headhunting for CISSP certified security professionals. The industry standard test on IT security, the Certified Information Systems Security Professionals (CISSP) exam is administered 16 times...
  • №204
  • 5,65 МБ
  • дата добавления неизвестна
  • изменен
Springer, 2015. — 368 p. This book describes the challenges that critical infrastructure systems face, and presents state of the art solutions to address them. How can we design intelligent systems or intelligent agents that can make appropriate real-time decisions in the management of such large-scale, complex systems? What are the primary challenges for critical infrastructure...
  • №205
  • 10,54 МБ
  • добавлен
  • изменен
Wiley, 2016. — 184 p. — ISBN 1848218508. This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be...
  • №206
  • 3,66 МБ
  • добавлен
  • изменен
CRC Press, 2017. — 394 p. — ISBN 978-1-138-03193-7 The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data...
  • №207
  • 8,64 МБ
  • добавлен
  • изменен
IT Governance Publishing, 2012. — 328 p. — 9781849283977 This book provides an overview of security architecture processes and how these may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. This guidance is provided through the application of a security reference model to the different Cloud delivery models of...
  • №208
  • 8,77 МБ
  • добавлен
  • изменен
Elsevier Science, 2007. - 887 p. - ISBN: 0444516085 Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
  • №209
  • 111,03 МБ
  • добавлен
  • изменен
Wiley, 2019. — 355 p. — ISBN 1119053285. In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and...
  • №210
  • 4,78 МБ
  • добавлен
  • изменен
Palgrave, 2015. — 262 p. This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the geopolitics of cyber conflicts, defence strategy and practice, cyber intelligence and information security.
  • №211
  • 1,96 МБ
  • добавлен
  • изменен
Wiley, 2015. — 362 p. — ISBN: 1118896696, 9781118896693 Similar to unraveling a math word problem, Security Intelligence: A Practitioner s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates...
  • №212
  • 21,58 МБ
  • добавлен
  • изменен
CRC Press, 2013. — 222 p. — ISBN: 9781439850572 Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securing Cloud and Mobility: A Practitioner's Guide explains how to secure the multifaceted layers of private and public cloud deployments as well as mobility infrastructures. With comprehensive...
  • №213
  • 4,32 МБ
  • добавлен
  • изменен
Berlin: Springer-Verlag. – 2003. – 202 p. (Lecture Notes in Computer Science 2815) In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and furthermore, that the privacy of...
  • №214
  • 1,22 МБ
  • добавлен
  • изменен
23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings. — Springer, 2018. — 571 p. — ISBN 978-3319989884. The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018....
  • №215
  • 18,63 МБ
  • добавлен
  • изменен
CRC Press, 2012. — 488 p. — ISBN: 1439862613, 9781439862612 With annual cost in excess of $150 billion from workplace related illnesses and injuries, any knowledge that can reduce this burden contributes to the overall welfare of the work force and business performance. Yet, there are many key areas of opportunities that have not yet been discussed in the literature, such as...
  • №216
  • 26,22 МБ
  • добавлен
  • изменен
Springer, 2017. — 327 p. — (Lecture Notes in Computer Science). — ISBN 10 3662544547. — ISBN 13 978-3662544549. This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017. The...
  • №217
  • 16,90 МБ
  • добавлен
  • изменен
2nd Edition. — Springer, 2019. — 522 p. — (Advances in Computer Vision and Pattern Recognition). — ISBN 978-3-319-92626-1. This authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) – also known as Biometric Anti-Spoofing. Building on the success of the previous, pioneering edition, this...
  • №218
  • 15,26 МБ
  • добавлен
  • изменен
Springer, 2014. — 290 p. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems and in deriving countermeasures to these attacks. Topics and features: provides a detailed introduction to the field of biometric anti-spoofing and a thorough review of the associated...
  • №219
  • 7,06 МБ
  • добавлен
  • изменен
Nonce, 2019. — 635 p. Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how to create and...
  • №220
  • 3,69 МБ
  • добавлен
  • изменен
Nonce, 2019. — 635 p. Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how to create and...
  • №221
  • 3,66 МБ
  • добавлен
  • изменен
Nonce, 2019. — 635 p. Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how to create and...
  • №222
  • 8,73 МБ
  • добавлен
  • изменен
6th Edition. — Cengage Learning, 2019. — 752 p. — ISBN 978-1-337-40571-3. This book, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current information technologies. You'll develop...
  • №223
  • 91,06 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2017. - 448p. - ASIN: B074BTJW57 This comprehensive self-study guide offers complete coverage of the new CompTIA Cybersecurity Analyst+ certification exam This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CSA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each...
  • №224
  • 34,02 МБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2017. — 190 p. — ISBN 1975999150. Most password books are just that, mere places to write down websites and passwords. (This book does that.) But that’s not enough! In today’s rough-and-tumble Internet – full of scammers, thieves, and scoundrels – you need more than just a “Password Book.” You need: A book that provides scam education...
  • №225
  • 583,90 КБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2017. — 190 p. — ISBN 1975999150. Most password books are just that, mere places to write down websites and passwords. (This book does that.) But that’s not enough! In today’s rough-and-tumble Internet – full of scammers, thieves, and scoundrels – you need more than just a “Password Book.” You need: A book that provides scam education...
  • №226
  • 1,23 МБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2017. — 190 p. — ISBN 1975999150. Most password books are just that, mere places to write down websites and passwords. (This book does that.) But that’s not enough! In today’s rough-and-tumble Internet – full of scammers, thieves, and scoundrels – you need more than just a “Password Book.” You need: A book that provides scam education...
  • №227
  • 7,97 МБ
  • добавлен
  • изменен
Pearson IT Certification, 2017. — 592 p. — ASIN B071KL7SMM. This is the eBook version of the print title and might not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CompTIA Cybersecurity Analyst (CSA+) exam success with this CompTIA Authorized Cert Guide from Pearson IT Certification, a leader in IT certification...
  • №228
  • 21,40 МБ
  • добавлен
  • изменен
Pearson IT Certification, 2017. — 592 p. — ASIN B071KL7SMM. This is the eBook version of the print title and might not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CompTIA Cybersecurity Analyst (CSA+) exam success with this CompTIA Authorized Cert Guide from Pearson IT Certification, a leader in IT certification...
  • №229
  • 420,31 КБ
  • добавлен
  • изменен
Addison-Wesley Professional, 2016. — 317 p. — (SEI Series in Software Engineering). — ISBN 10 0134189809. — ISBN 13 978-0134189802. This book brings together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security early and throughout the full lifecycles of both system development and acquisition....
  • №230
  • 13,52 МБ
  • добавлен
  • изменен
Addison-Wesley Professional, 2016. — 296 p. — (SEI Series in Software Engineering). — ISBN 10 0134189809. — ISBN 13 978-0134189802. This book brings together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security early and throughout the full lifecycles of both system development and acquisition....
  • №231
  • 13,52 МБ
  • добавлен
  • изменен
Addison-Wesley Professional, 2016. — 331 p. — (SEI Series in Software Engineering). — ISBN 10 0134189809. — ISBN 13 978-0134189802. This book brings together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security early and throughout the full lifecycles of both system development and acquisition....
  • №232
  • 13,24 МБ
  • добавлен
  • изменен
Syngress, 2016. — 190 p. — ISBN 978-0-12-804452-0. Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving...
  • №233
  • 7,22 МБ
  • добавлен
  • изменен
Springer, 2016. — 103 p. — ISBN-10: 3319209930. — ISBN-13: 978-3319209937 This book discusses the emerging topic of Smart TV security, including its implications on consumer privacy. The author presents chapters on the architecture and functionality of Smart TVs, various attacks and defenses, and associated risks for consumers. This includes the latest attacks on...
  • №234
  • 2,61 МБ
  • добавлен
  • изменен
Microsoft Press, 2013 © 2014. — 816 p. — ISBN: 0735657823, 9780735657823 Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying your knowledge to real-world case scenarios and practice exercises....
  • №235
  • 58,07 МБ
  • добавлен
  • изменен
O’Reilly Media, Inc., 2013. — 817 p. + CD. — ISBN: 978-0-7356-5782-3. На англ. языке. Maximize your performance on the CISSP (Certified Information System Security Professional) Exam with this Training Kit from Microsoft Press. This 2-in-1 kit includes a comprehensive study guide for 10 security domains, plus online practice tests to help you assess your skills . Work at...
  • №236
  • 160,35 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 18 p. — ASIN: B01L4LE4XM Do you sometimes encounter sudden drops in your Wi-Fi internet connection speed? It is possible that someone could be messing around with your Wi-Fi. No, one does not need to be a hacker to hack Wi-Fi networks. There are many FREE Wi-Fi hacking software flying around. One such example is "WEPCrack - An 802.11 key...
  • №237
  • 120,79 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 16 p. — ASIN: B01L4LE4XM Do you sometimes encounter sudden drops in your Wi-Fi internet connection speed? It is possible that someone could be messing around with your Wi-Fi. No, one does not need to be a hacker to hack Wi-Fi networks. There are many FREE Wi-Fi hacking software flying around. One such example is "WEPCrack - An 802.11 key...
  • №238
  • 81,84 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 29 p. — ASIN: B01L4LE4XM Do you sometimes encounter sudden drops in your Wi-Fi internet connection speed? It is possible that someone could be messing around with your Wi-Fi. No, one does not need to be a hacker to hack Wi-Fi networks. There are many FREE Wi-Fi hacking software flying around. One such example is "WEPCrack - An 802.11 key...
  • №239
  • 333,52 КБ
  • добавлен
  • изменен
Wiley, 2014. — 66 p. — ISBN 978-1-118-81982-1. Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, its security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic...
  • №240
  • 12,41 МБ
  • добавлен
  • изменен
Wiley, 2016. — 504 p. — ISBN 978-1119210238. The fast and easy way to secure your CISSP certification Are you a security professional seeking the valuable CISSP certification? Good for you! CISSP For Dummies is the ideal starting point on your journey, providing you with a friendly and accessible framework for studying for this highly sought-after certification. Fully updated to...
  • №241
  • 1,36 МБ
  • добавлен
  • изменен
Wiley, 2016. — 505 p. — (For Dummies). — ISBN-13 978-1-119-21023-8. — 5 ed. — conv. The fast and easy way to secure your CISSP certification Are you a security professional seeking the valuable CISSP certification? Good for you! CISSP For Dummies is the ideal starting point on your journey, providing you with a friendly and accessible framework for studying for this highly...
  • №242
  • 3,26 МБ
  • добавлен
  • изменен
Wiley, 2016. — 505 p. — (For Dummies). — ISBN-13 978-1-119-21023-8. — 5 ed. — conv. The fast and easy way to secure your CISSP certification Are you a security professional seeking the valuable CISSP certification? Good for you! CISSP For Dummies is the ideal starting point on your journey, providing you with a friendly and accessible framework for studying for this highly...
  • №243
  • 1,40 МБ
  • добавлен
  • изменен
6th ed. — Wiley, 2018. — 563 p. — (For Dummies). — ISBN 111950581X. Secure your CISSP certification! If you’re a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass the exam. Plus, you'll get tips on setting up a...
  • №244
  • 12,35 МБ
  • добавлен
  • изменен
4th ed. — Wiley, 2012. — 624 p. — (For Dummies). — ISBN-10 111836239X; ISBN-13 978-1118362396. A fully updated guide to CISSP certification CISSP certification is the most prestigious and highly valued of the security certifications. This is the book you need to approach the exam with confidence and become CISSP certified! The CISSP Body of Knowledge underwent many changes...
  • №245
  • 27,10 МБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2018. — 176 р. Cyber Security has become an absolute necessity. Today no device can be connected to the Internet without proper security in place. Every year millions of users fall victim of malware and cyber attacks. How should we ensure our cyber security then? The best way to prevent an attack is to understand how the attack works,...
  • №246
  • 3,55 МБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2018. — 176 р. Cyber Security has become an absolute necessity. Today no device can be connected to the Internet without proper security in place. Every year millions of users fall victim of malware and cyber attacks. How should we ensure our cyber security then? The best way to prevent an attack is to understand how the attack works,...
  • №247
  • 1,73 МБ
  • добавлен
  • изменен
Springer, 2017. — 139 p. This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the...
  • №248
  • 13,17 МБ
  • добавлен
  • изменен
CRC Press, 2018. — 458 р. Cyber security, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cyber security focus on, both from a human computer interaction point of view, and human factors. This handbook is a unique source of...
  • №249
  • 18,47 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. — 510 p. — ISBN 1788392507. Understand malware analysis and its practical implementation Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures,...
  • №250
  • 14,13 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. — 510 p. — ISBN 1788392507. Understand malware analysis and its practical implementation Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures,...
  • №251
  • 27,30 МБ
  • добавлен
  • изменен
Wiley, 2018. — 213 p. — ISBN 978-1-119-43000-1. Get answers to all your cybersecurity questions In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people...
  • №252
  • 2,43 МБ
  • добавлен
  • изменен
CRC Press, 2016. — 426 p. — ISBN-10: 1498719708. — ISBN-13: 978-1498719704 Smart Grid: Networking, Data Management, and Business Models delivers a comprehensive overview of smart grid communications, discussing the latest advances in the technology, the related cyber security issues, and the best ways to manage user demand and pricing. Comprised of 16 chapters authored by...
  • №253
  • 10,94 МБ
  • добавлен
  • изменен
Leanpub, 2017. — 167 p. The Mobile Security Testing Guide (MSTG) Summit Preview is a proof-of-concept for an unusual security book. It is the result of an open, crowd-sourced effort, made of the contributions of dozens of authors and reviewers from all over the world. With the MSTG, we aim to create best practices for mobile security, along with a comprehensive set of security...
  • №254
  • 5,15 МБ
  • добавлен
  • изменен
Mercury Learning & Information, 2018. — 581 p. — ISBN 978-1-942270-83-6. This book introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical...
  • №255
  • 16,21 МБ
  • добавлен
  • изменен
Mercury Learning & Information, 2018. — 581 p. — ISBN 978-1-942270-83-6. This book introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical...
  • №256
  • 4,30 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 100 p. — ASIN B076MKH2NZ. The CISSP is a global measure of excellence in the world of cybersecurity. This 100-page study review summarizes what you need to know to be successful with the CISSP certification exam. CISSP in 100 Pages is intended to supplement your other CISSP study materials and act as a review or a refresher for the large...
  • №257
  • 1,28 МБ
  • добавлен
  • изменен
Springer, 2015. — 453 pp. This book presents the research work done under the auspices of the ARES Project (CSD2007-00004). ARES, which stands for Advanced Research in Privacy and Security, has been one of the most ambitious research projects on computer security and privacy funded by the Spanish Government. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a...
  • №258
  • 4,97 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 54 p. — ASIN: B01CZ92Q78 Adding an Secure Socket Layer to your website is crucial to securing your customers information, payments, and traffic to your site. Having an SSL Certificate also is a factor in Google's search ranking checklist, increasing your search engine optimization with the use of an SSL. SSLs can be confusing and difficult...
  • №259
  • 546,74 КБ
  • добавлен
  • изменен
Издательство: Idea Group Reference; 2008. - 4145 с., english, ISBN-10: 1599049376, ISBN-13: 978-1599049373, Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information processing and management technologies. As technology continues to advance, the need for strong responses to these challenges, well centered on reliable...
  • №260
  • 48,63 МБ
  • добавлен
  • изменен
Springer, 2016. — 216 p. — (Springer Topics in Signal Processing). — ISBN 10 9811020949. — ISBN 13 978-9811020940. This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent...
  • №261
  • 4,18 МБ
  • добавлен
  • изменен
МсGrаw-Нil, 2011. - 353 p. Second Edition Written by leading IT security educators, this fully updated Lab Manual supplements. The book contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives The Lab Manual also includes materials lists and lab...
  • №262
  • 5,54 МБ
  • добавлен
  • изменен
4th ed. — McGraw-Hill Education, 2014. — 385 p. — ASIN B00N9ICA3U. Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies; Step-by-step scenarios require you to think critically; Lab analysis tests measure your understanding of lab results; Key term quizzes help build your vocabulary; Labs can be...
  • №263
  • 4,62 МБ
  • добавлен
  • изменен
4th ed. — McGraw-Hill Education, 2014. — 385 p. — ASIN B00N9ICA3U. Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies; Step-by-step scenarios require you to think critically; Lab analysis tests measure your understanding of lab results; Key term quizzes help build your vocabulary; Labs can be...
  • №264
  • 9,93 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 359 p. — ASIN: B01M59TGT0. The Essential Cyber Security Handbook is a great resource anywhere you go; it presents the most current and leading edge research on system safety and security. You do not need to be a cyber-security expert to protect your information. There are people out there whose main job it is trying to steal personal and...
  • №265
  • 717,04 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 365 p. — ASIN: B01M59TGT0. The Essential Cyber Security Handbook is a great resource anywhere you go; it presents the most current and leading edge research on system safety and security. You do not need to be a cyber-security expert to protect your information. There are people out there whose main job it is trying to steal personal and...
  • №266
  • 431,84 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 255 p. — ASIN: B01M59TGT0. The Essential Cyber Security Handbook is a great resource anywhere you go; it presents the most current and leading edge research on system safety and security. You do not need to be a cyber-security expert to protect your information. There are people out there whose main job it is trying to steal personal and...
  • №267
  • 898,21 КБ
  • добавлен
  • изменен
Глоссарий основных терминов в области информационной безопасности. Национальный Институт стандартов и технологий - 2011 г. - 211 с. Даны основные определения в области информационной безопасности на английском языке.
  • №268
  • 941,58 КБ
  • добавлен
  • изменен
6th edition. — CRC Press, 2012 — 418 p. — ISBN : 978-1-4665-6752-8. Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume...
  • №269
  • 27,30 МБ
  • добавлен
  • изменен
Издательство Springer, 2014, -147 pp. Contemporary science is clearly interdisciplinary in nature. Combining the knowledge and scientific experience gained in independent research domains and areas now allows new and astounding solutions to be developed. These, thanks to the development of computational techniques and computer infrastructure, make it possible to execute tasks...
  • №270
  • 1,72 МБ
  • добавлен
  • изменен
Packt Publishing, 2013. — 142 p. Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide...
  • №271
  • 7,50 МБ
  • добавлен
  • изменен
Apress, 2015. — 744 p. Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with...
  • №272
  • 8,55 МБ
  • добавлен
  • изменен
Apress, 2015. — 744 p. Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with...
  • №273
  • 20,48 МБ
  • добавлен
  • изменен
2nd Edition. — Apress, 2019. — 1136 р. Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network...
  • №274
  • 25,02 МБ
  • добавлен
  • изменен
2nd Edition. — Apress, 2019. — 1136 р. Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network...
  • №275
  • 26,49 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 17 p. — ASIN B075PPX95V. This was created for busy IT Security folks, who have to juggle with daily operations, project advisories, incident response, audits AND IT security awareness. The slides (the link to the actual editable Powerpoint slides is in the PDF) come with suggested speaker's note so it's a ready-to-present material. This is the...
  • №276
  • 1,55 МБ
  • добавлен
  • изменен
Jones & Bartlett Learning, 2018. — 594 p. — ISBN 9781284147810. Hacker Techniques, Tools, and Incident Handling, Third Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview...
  • №277
  • 8,49 МБ
  • добавлен
  • изменен
2011, 1 st edition, Publisher: Jones & Bartlett Learning, 416 p. Language: English. Hacker Techniques, Tools, and Incident Handling, Second Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the...
  • №278
  • 58,87 МБ
  • добавлен
  • изменен
2017. — 220 p. Welcome to the second edition of the OWASP Code Review Guide Project. The second edition brings the successful OWASP Code Review Guide up to date with current threats and countermeasures. This version also includes new content refecting the OWASP communities’ experiences of secure code review best practices. The Second Edition of the Code Review Guide has been...
  • №279
  • 2,31 МБ
  • добавлен
  • изменен
New York: Springer, 2014. — 244 p. This engaging and accessible text addresses the fundamental question: What Is Computer Science? The book showcases a set of representative concepts broadly connected by the theme of information security, for which the presentation of each topic can be treated as a "mini" lecture course, demonstrating how it allows us to solve real problems, as...
  • №280
  • 3,40 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2018. — 352 p. — ISBN 1260117014. Prepare for the CompTIA CySA+ certification exam with this effective self-study resource Don’t Let the Real Test Be Your First Test! Pass the new Cybersecurity Analyst+ certification exam and obtain the latest security credential from CompTIA using the accurate practice questions contained in this guide. CompTIA CySA+...
  • №281
  • 4,31 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2018. — 352 p. — ISBN 1260117014. Prepare for the CompTIA CySA+ certification exam with this effective self-study resource Don’t Let the Real Test Be Your First Test! Pass the new Cybersecurity Analyst+ certification exam and obtain the latest security credential from CompTIA using the accurate practice questions contained in this guide. CompTIA CySA+...
  • №282
  • 4,24 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2018. — 352 p. — ISBN 1260117014. Prepare for the CompTIA CySA+ certification exam with this effective self-study resource Don’t Let the Real Test Be Your First Test! Pass the new Cybersecurity Analyst+ certification exam and obtain the latest security credential from CompTIA using the accurate practice questions contained in this guide. CompTIA CySA+...
  • №283
  • 9,15 МБ
  • добавлен
  • изменен
4th Edition. — Butterworth-Heinemann, 2018. — 545 p. — ISBN 978-0-12-809278-1. This book, Fourth Edition, identifies and condenses into clear language the principal functions and responsibilities for security professionals in supervisory and managerial positions. Managers will learn to understand the mission of the corporate security department and how the mission intersects with...
  • №284
  • 20,47 МБ
  • добавлен
  • изменен
Auerbach Publications, 2013. — 424 p. — 2nd ed. — ISBN: 1439810621, 9781439810620 Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second...
  • №285
  • 25,66 МБ
  • добавлен
  • изменен
Cham: Springer International Publishing, 2018. — 377 p. — ISBN 978-3-319-76451-1. In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data...
  • №286
  • 47,67 МБ
  • добавлен
  • изменен
Springer, 2015. — 552 p. 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers...
  • №287
  • 17,76 МБ
  • добавлен
  • изменен
Springer, 2015. — 667 p. 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers...
  • №288
  • 18,40 МБ
  • добавлен
  • изменен
Prentice Hall, 2006. - 880 pages. 4th Edition. ISBN: 0132390779. На рус. языке. A sweeping revision of the classic computer security text. This book provides end-to-end, detailed coverage of the state of the art in all aspects of computer security. Starting with a clear, in-depth review of cryptography, it also covers specific options for securing software and data against...
  • №289
  • 7,76 МБ
  • добавлен
  • изменен
Prentice Hall, 2011. - 848 pages ISBN: 0132789469 Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still...
  • №290
  • 25,69 МБ
  • добавлен
  • изменен
5th Edition. — Prentice Hall, 2015. — 944 p. The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare. Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic...
  • №291
  • 6,67 МБ
  • добавлен
  • изменен
Apress, 2016. — 328 p. This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable behavior for IT professionals. Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires...
  • №292
  • 17,78 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 298 p. — ISBN 978-1-78528-458-8. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques...
  • №293
  • 14,62 МБ
  • добавлен
  • изменен
CRC Press,2013. - 399 c. For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, Security, and Applications brings together scientific...
  • №294
  • 15,69 МБ
  • добавлен
  • изменен
Artech House, 2003. — 446 p. As magnetic stripe cards are being replaced by chip cards that offer consumers and businesses greater protection against fraud, a new standard for this technology is being introduced by Europay, MasterCard, and Visa (EMV). This cutting-edge, new book provides you with a comprehensive overview of the EMV chip solution and explains how this technology...
  • №295
  • 3,00 МБ
  • добавлен
  • изменен
CRC Press, 2010. — 870 p. — ISBN: 1420078542, 9781420078541 Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there...
  • №296
  • 4,75 МБ
  • добавлен
  • изменен
CRC Press, 2013. — 250 p. — ISBN: 1439877300, 9781439877302 The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization. It examines data anonymization from both a practitioner's and a program sponsor's perspective. Discussing analysis, planning, setup, and governance, it illustrates the...
  • №297
  • 10,59 МБ
  • добавлен
  • изменен
CRC Press, 2016. — 220 р. — (Internal Audit and IT Audit). — ISBN 978-1498738835. Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the...
  • №298
  • 14,25 МБ
  • добавлен
  • изменен
Cisco Press, 2010. — 251 p. — ISBN 978-1-58705-264-4. The practical guide to building and running incident response and product security teams. Organizations increasingly recognize the urgent importance of effective, cohesive, and efficient security incident response. The speed and effectiveness with which a company can respond to incidents has a direct impact on how devastating...
  • №299
  • 2,88 МБ
  • добавлен
  • изменен
Springer, 2017. — 362 p. — (Lecture Notes in Computer Science). — ISBN 10 3319651269, 13 978-3319651262. This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. The 12 revised full papers, 13 revised short...
  • №300
  • 37,09 МБ
  • добавлен
  • изменен
CRC Press, 2018. — xiv+962 p. — ISBN 978-1-1385-6384-1. This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including...
  • №301
  • 14,22 МБ
  • добавлен
  • изменен
Springer, 2016. — 203 p. — ISBN 331928777X, 9783319287775 This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author surveys related work,...
  • №302
  • 1,26 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. — 346 p. Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging...
  • №303
  • 2,87 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. — 346 p. Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging...
  • №304
  • 6,76 МБ
  • добавлен
  • изменен
Kogan Page Business Books, 2005. — 224 р. — ISBN 978-0749444259. Published in association with the Institute of Directors* Provides effective strategies for managing online risks and defenses against them * "Best practice" advice from leading advisers and case studies from successful firms * Case studies from successful firms* Of interest to managers in organizations of all sizes...
  • №305
  • 1,64 МБ
  • добавлен
  • изменен
McGraw-Hill, 2013. — 898 p. — 2nd ed. — ISBN: 9780071784368 Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral...
  • №306
  • 24,15 МБ
  • добавлен
  • изменен
Oxford: Digital Press, 2004. — 468 p. — ISBN:1555583172 — ISBN-13: 978-1555583170 This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even...
  • №307
  • 1,47 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 284 p. — ISBN 978-1-491-93494-4. True PDF Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this...
  • №308
  • 7,56 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 284 p. — ISBN 978-1-491-93494-4. Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical...
  • №309
  • 1,87 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 284 p. — ISBN 978-1-491-93494-4. Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical...
  • №310
  • 1,92 МБ
  • добавлен
  • изменен
2nd ed. — CreateSpace Independent Publishing Platform, 2017. — 45 p. — (TOR). — ISBN 10 1974216780, 13 978-1974216789. Best-selling author, Bruce Rogers, presents a remarkable beginners' guide made simple and easy to understand to help all aspiring hackers learn and master the fundamentals of hacking and IT security. In Part 1: TOR - Beginners to Expert Guide to Accessing the Dark...
  • №311
  • 274,13 КБ
  • добавлен
  • изменен
2nd ed. — CreateSpace Independent Publishing Platform, 2017. — 45 p. — (TOR). — ISBN 10 1974216780, 13 978-1974216789. Best-selling author, Bruce Rogers, presents a remarkable beginners' guide made simple and easy to understand to help all aspiring hackers learn and master the fundamentals of hacking and IT security. In Part 1: TOR - Beginners to Expert Guide to Accessing the Dark...
  • №312
  • 570,25 КБ
  • добавлен
  • изменен
Springer, 2015. — 193 p. This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC...
  • №313
  • 9,12 МБ
  • добавлен
  • изменен
Time Room, 2016. — 222 p. Millions of people around the worlds wants to learn hacking, that's a fact. The sad part comes in when there is very few information compiled in one spot. Not to mention step by step. This book contains everything a beginner or a professional would like to put to practice everyday. Subjects that would be broken down in step by steps are like. Finishing...
  • №314
  • 5,06 МБ
  • добавлен
  • изменен
Time Room, 2016. — 222 p. Millions of people around the worlds wants to learn hacking, that's a fact. The sad part comes in when there is very few information compiled in one spot. Not to mention step by step. This book contains everything a beginner or a professional would like to put to practice everyday. Subjects that would be broken down in step by steps are like. Finishing...
  • №315
  • 5,62 МБ
  • добавлен
  • изменен
Springer, 2016. — 334 р. — ISBN 978-3-319-41187-3. This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features...
  • №316
  • 19,15 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 336 p. This book Learn to design and implement cyber security strategies for your organization Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem Learn best practices to secure your data from device to the cloud Gain insight into privacy-enhancing techniques and technologies
  • №317
  • 4,20 МБ
  • добавлен
  • изменен
Syber Risk, 2019. — 127 p. — ASIN B07MKJJ99Z. This book is designed to implement the most extensive Threat Hunt Process (THP) for companies and agencies seeking to proactively determine whether intrusions into their Information Technology (IT) environments are real and malicious. THP is the active ability for businesses or organizations to investigate, mitigate, and stop the "bad...
  • №318
  • 1,69 МБ
  • добавлен
  • изменен
Syber Risk, 2019. — 127 p. — ASIN B07MKJJ99Z. This book is designed to implement the most extensive Threat Hunt Process (THP) for companies and agencies seeking to proactively determine whether intrusions into their Information Technology (IT) environments are real and malicious. THP is the active ability for businesses or organizations to investigate, mitigate, and stop the "bad...
  • №319
  • 1,86 МБ
  • добавлен
  • изменен
Syber Risk, 2019. — 127 p. — ASIN B07MKJJ99Z. This book is designed to implement the most extensive Threat Hunt Process (THP) for companies and agencies seeking to proactively determine whether intrusions into their Information Technology (IT) environments are real and malicious. THP is the active ability for businesses or organizations to investigate, mitigate, and stop the "bad...
  • №320
  • 4,40 МБ
  • добавлен
  • изменен
Springer, 2010. — 425 p. — ISBN 978-3-642-14451-6. Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal...
  • №321
  • 7,97 МБ
  • добавлен
  • изменен
Wiley, 2016. — 746 p. — ISBN 978-1-119-08751-9 This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding...
  • №322
  • 102,68 МБ
  • добавлен
  • изменен
Springer, 2010. — 378 p. — ISBN 978-0-85729-005-2. As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the...
  • №323
  • 5,44 МБ
  • добавлен
  • изменен
Springer Nature Switzerland AG, 2018. — XII+487 p. — (Lecture Notes in Computer Science, 11170). —- ISBN 978-3-030-04834-1. This Festschrift is in honor of Sushil Jajodia, Professor in the George Mason University, USA, on the occasion of his 70th birthday. This book contains papers written in honor of Sushil Jajodia, of his vision and his achievements. Sushil has sustained a...
  • №324
  • 7,39 МБ
  • добавлен
  • изменен
Elsevier, 2016. — 254 p. — ISBN 0124166504. The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at...
  • №325
  • 3,74 МБ
  • добавлен
  • изменен
Pearson IT Certification, 2018. — 672 p. — ISBN 0789759403. All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work. Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and technical professionals Today,...
  • №326
  • 5,08 МБ
  • добавлен
  • изменен
Pearson IT Certification, 2018. — 672 p. — ISBN 0789759403. All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work. Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and technical professionals Today,...
  • №327
  • 8,81 МБ
  • добавлен
  • изменен
New York, USA: Business Expert Press, LLC, 2019. — 94 p. — (Business Law and Corporate Risk Management Collection). — ISBN-13 978-1-94897-618-3. Cyber security could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing languages...
  • №328
  • 4,91 МБ
  • добавлен
  • изменен
No Starch Press, 2018. — 272 p. Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In...
  • №329
  • 9,15 МБ
  • добавлен
  • изменен
No Starch Press, 2018. — 272 p. Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In...
  • №330
  • 7,61 МБ
  • добавлен
  • изменен
Syngress, 2007. — 464 p. — ISBN 9781597491358. The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for...
  • №331
  • 6,98 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 173 p. — ISBN 10 1491917628, 13 978-1491917626. Are you satisfied with the way your company responds to IT incidents? How prepared is your response team to handle critical, time-sensitive events such as service disruptions and security breaches? IT professionals looking for effective response models have successfully adopted the Incident Management System...
  • №332
  • 14,08 МБ
  • добавлен
  • изменен
Apress, 2017. — 76 p. — ISBN-13 978-1-4842-2834-0. Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This...
  • №333
  • 5,51 МБ
  • добавлен
  • изменен
O'Reilly, 2003. —988 p. — 3rd ed. — ISBN: 0596003234, 9780596003234 Focusing on the four most popular Unix variants today-Solaris, Mac OS X, Linux, and FreeBSD-this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails,...
  • №334
  • 17,26 МБ
  • добавлен
  • изменен
Apress, 2019. — 377 р. Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack. The most common culprit of the largest hacks has been bad personal...
  • №335
  • 10,60 МБ
  • добавлен
  • изменен
Apress, 2019. — 377 р. Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack. The most common culprit of the largest hacks has been bad personal...
  • №336
  • 13,86 МБ
  • добавлен
  • изменен
Packt Publishing, 2015. - 118p. Nmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility. This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap,...
  • №337
  • 3,03 МБ
  • добавлен
  • изменен
CRС Prеss, 2016. — 406 p. — ISBN 978-1482236880. Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not...
  • №338
  • 14,68 МБ
  • добавлен
  • изменен
Elsevier, 2014. — 359 p. Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This...
  • №339
  • 6,50 МБ
  • добавлен
  • изменен
Boca Raton, USA: CRC Press, Taylor & Francis Group, 2018. — 443 p. — ISBN 1138054216. This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image...
  • №340
  • 10,28 МБ
  • добавлен
  • изменен
John Wiley & Sons, Inc., 2014. — 590 p. — ISBN 9781118809990. This book describes the useful models you can employ to address or mitigate these potential threats. People who build software, systems, or things with software need to address the many predictable threats their systems can face. Threat modeling is a fancy name for something we all do instinctively. If I asked you to...
  • №341
  • 5,95 МБ
  • добавлен
  • изменен
CRC Press, 2013. — 244 p. — ISBN: 1439879095, 9781439879092 With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people. Managing Risk and Security in Outsourcing...
  • №342
  • 4,33 МБ
  • добавлен
  • изменен
University Of Chicago Press, 2007. — 274 p. Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other sophisticated technologies. With just a few keystrokes, records containing our financial information, phone and e-mail logs, and sometimes...
  • №343
  • 2,39 МБ
  • добавлен
  • изменен
O'Reilly Media, 2017. — 240 p. — ISBN 10 149196362X, 13 978-1491963623. By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built...
  • №344
  • 17,46 МБ
  • добавлен
  • изменен
Syngress, 2014. — 602 p. — 2nd ed. — ISBN: 9780124105263 Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT...
  • №345
  • 5,21 МБ
  • добавлен
  • изменен
Packt Publishing, 2013. — 242 p. The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be...
  • №346
  • 3,88 МБ
  • добавлен
  • изменен
Packt Publishing, 2013. — 242 p. The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be...
  • №347
  • 4,78 МБ
  • добавлен
  • изменен
CRC Press, 2015. — 800 p. Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and...
  • №348
  • 143,97 МБ
  • добавлен
  • изменен
2nd Revised edition. — Packt Publishing, 2016. — 402 p. — ISBN 978-1785884498. Day-by-day plan to study and assimilate core concepts from CISSP CBK Revise and take a mock test at the end of every four chapters A systematic study and revision of myriad concepts to help you crack the CISSP examination Who This Book Is For If you are a networking professional aspiring to take the...
  • №349
  • 12,16 МБ
  • добавлен
  • изменен
Pearson, 2012. — 817 p. — 2nd ed. — ISBN: 0132775069, 9780132775069 In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this...
  • №350
  • 13,64 МБ
  • добавлен
  • изменен
3rd ed. — Pearson, 2015. — 839 p. — ISBN: 9780133773927 Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer/Network Security. It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists. In recent...
  • №351
  • 14,13 МБ
  • добавлен
  • изменен
4th edition. — London: Pearson Education Limited, 2018. — 986 p. Computer Security: Principles and Practice, Fourth Global Edition, is ideal for courses in Computer/Network Security. It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists. In...
  • №352
  • 27,26 МБ
  • добавлен
  • изменен
Addison-Wesley Professional, 2018. — 800 р. — ISBN 978-0134772806. The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and...
  • №353
  • 9,59 МБ
  • добавлен
  • изменен
Wiley, 2011. - 606 pages ISBN: 978-0470626399 Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully...
  • №354
  • 26,90 МБ
  • добавлен
  • изменен
Springer, 2010. — 862 pp. At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called Y2K issue. The Y2K scare was the fear that computer networks and the systems that are controlled or operated by software would...
  • №355
  • 17,43 МБ
  • добавлен
  • изменен