Data-Driven Security
Android Security Internals
Advanced API Security
UMTS Security
End-to-End Network Security
LTE Security
Hyper-V Security
Junos Security
Managing Risk and Information S ...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to in ...
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple l ...
Information Security The Comple ...
Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information ...
Computer Security – ESORICS 201 ...
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013 ...
The Manager’s Guide to Web Appl ...
The Manager’s Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written ...
Data-Driven Security
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This caref ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
Advanced API Security
Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs. API adoption i ...
UMTS Security
Can you afford not to read this book?…The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and ...
Router Security Strategies: Sec ...
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separat ...
End-to-End Network Security
End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highl ...
Wireless and Mobile Networks Se ...
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with ...
WiMAX Security and Quality of S ...
WiMAX is the first standard technology to deliver true broadbandmobility at speeds that enable powerful multimedia applicationssuch as Voice over Inte ...
LTE Security
Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security su ...
Nmap 6: Network Exploration and ...
Master the basic scanning techniques for port scanning and host discovery. Perform security checks to web applications, mail servers and databases. Le ...
The Practice of Network Securit ...
Network security is not simply about building impenetrable walls â determined attackers will eventually overcome traditional defenses. The most effe ...
Advances in Security of Informa ...
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecN ...
Hyper-V Security
Keeping systems safe and secure is a new challenge for Hyper-V Administrators. As critical data and systems are transitioned from traditional hardware ...
Building the Infrastructure for ...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This boo ...
A+, Network+, Security+ Exams i ...
If you’re preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you’ll find this book invaluab ...
Junos Security
Junos Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, h ...
CCNA Security Portable Command ...
Preparing for the latest CCNA® Security exam? Here are all the CCNA Security commands you need in one condensed, portable resource. Filled with valuab ...
Network Security Through Data A ...
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security resea ...
A Practical Guide to Networking ...
This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...