BeagleBone for Secret Agents
Bitcoin Essentials
The Architecture of Privacy
Network Forensics
Learning Network Forensics
iOS Application Security
Computer Forensics with FTK
VMware vCloud Security
Hacking Vim 7.2
This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapte ...
BeagleBone for Secret Agents
The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologi ...
Hacking For Dummies, 5th Editio ...
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! “Hacking ...
Bitcoin Essentials
Blockchain is being billed as the technology of the future. Bitcoin is the first application of that technology. Mining is what makes it all possible. ...
IBM WebSphere Application Serve ...
For IBM WebSphere users, this is the complete guide to securing your applications with Java EE and JAAS security standards. From a far-ranging overvie ...
Big Data Forensics – Learning H ...
Big Data forensics is an important type of digital investigation that involves the identification, collection, and analysis of large-scale Big Data sy ...
The Architecture of Privacy
Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new ...
Intermediate Security Testing w ...
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defend ...
Information Security, 2nd Editi ...
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consume ...
Security and Privacy in Interne ...
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hack ...
Network Forensics
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional ...
Learning Network Forensics
We live in a highly networked world. Every digital device―phone, tablet, or computer is connected to each other, in one way or another. In this new ag ...
Inside Cyber Warfare, 2nd Editi ...
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly rea ...
SSCP (ISC)2 Systems Security Ce ...
Fully updated Study Guide for the SSCP This guide prepares you for the SSCP, Systems Security Certified Practitioner certification examination by focu ...
Building a Comprehensive IT Sec ...
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further ...
iOS Application Security
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, ...
Cryptography and Network Securi ...
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-stu ...
Managing Risk and Information S ...
This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience abou ...
Cybersecurity for Hospitals and ...
This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. The vulnerab ...
CISSP All-in-One Exam Guide, 7t ...
A fully revised edition of the #1 CISSP training resource Thoroughly updated for the latest release of the Certified Information Systems Security Prof ...
SSCP Systems Security Certified ...
This fully-updated, integrated self-study system offers complete coverage of the revised 2015 Systems Security Certified Practitioner (SSCP) exam doma ...
Testing and Securing Android St ...
Today, mobile applications are increasingly being used to access the Web. Mobile developers play a key role in how consumers access the Web with milli ...
Computer Forensics with FTK
With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and approp ...
VMware vCloud Security
VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMwar ...
Digital Privacy and Security Us ...
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure ...