A Practical Guide to TPM 2.0
Python Hacking Essentials
Security Intelligence
Transnational Security
Bitcoin for the Befuddled
Cyberspace and Cybersecurity
Advanced API Security
Android Hacker’s Handbook
Android Security Internals
Black Hat Python
Cyber Threat!
The Antivirus Hacker’s Handbook
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker’s Handbook guides you through the process of reverse engineering ...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows secur ...
Python Hacking Essentials
This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Her ...
Security Intelligence
Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through ...
Distributed Networks: Intellige ...
For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized comm ...
Security Planning: An Applied A ...
This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan ...
Microsoft Dynamics AX 2012 R3 S ...
Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakehold ...
Transnational Security
Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing ...
Computer Forensics JumpStart, 2 ...
Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. ...
Wireshark Network Analysis, 2nd ...
Wireshark is the world’s most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot ...
Bitcoin for the Befuddled
Unless you’ve been living under a rock for the last couple of years, you’ve probably heard of Bitcoin-the game-changing digital currency used by milli ...
Cyberspace and Cybersecurity
English | ISBN: 1466501332 | 2012 | 236 pages | PDF | 2 MBBased on relate Based on related courses and research on the cyber environment in Europe, th ...
Official (ISC)2 Guide to the CI ...
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was develope ...
Data Analysis For Network Cyber ...
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering sys ...
Engineering Secure Software and ...
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Mila ...
A Practical Guide to Networking ...
This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...
Network Attacks and Defenses: A ...
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attac ...
Advanced API Security
Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs. API adoption i ...
Android Hacker’s Handbook
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by expe ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
Anti-Hacker Tool Kit, 4th Editi ...
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network fr ...
Black Hat Python
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the mag ...
Building Virtual Pentesting Lab ...
A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or net ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
Cyber Threat!
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of go ...