|
The sheer quantity of widely diverse data which now results from multiple sources presents a problem for decision-makers and analysts, who are finding it impossible to cope with the ever-increasing flow of material. This has potentially serious consequences for the...
Editeur :
SAGE Publications Ltd
Parution :
2016-11-15
PDF
|
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what...
Editeur :
Wiley
Parution :
2016-08-19
PDF, ePub
|
Dr Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology and technology to investigate the intersection between technology and human behaviour. In this, her first book, Aiken has created a starting...
Editeur :
John Murray
Parution :
2016-08-18
ePub
|
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication...
Editeur :
Wiley-ISTE
Parution :
2016-03-03
PDF, ePub
|
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future...
Editeur :
Wiley
Parution :
2015-08-27
PDF, ePub
|
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect...
Editeur :
Wiley
Parution :
2015-07-10
PDF, ePub
|
|
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable...
Editeur :
Wiley
Parution :
2015-04-16
PDF, ePub
|
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing...
Editeur :
Wiley
Parution :
2015-03-18
PDF, ePub
|
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book...
Editeur :
Wiley
Parution :
2015-02-17
PDF, ePub
|
Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most...
Editeur :
SAGE Publications Ltd
Parution :
2014-09-15
PDF
|
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields...
Editeur :
Wiley-ISTE
Parution :
2014-02-19
PDF, ePub
|
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat...
Editeur :
Wiley
Parution :
2014-02-12
PDF, ePub
|
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive...
Editeur :
Wiley
Parution :
2014-02-03
PDF, ePub
|
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use...
Editeur :
Wiley
Parution :
2014-01-27
PDF, ePub
|
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data...
Editeur :
Wiley
Parution :
2014-01-24
PDF, ePub
|
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160...
Editeur :
Wiley
Parution :
2013-11-20
PDF, ePub
|
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as...
Editeur :
Wiley
Parution :
2013-10-18
PDF, ePub
|
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security...
Editeur :
Wiley
Parution :
2013-07-12
Collection :
Wiley Software Patterns Series
ePub
|
An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and...
Editeur :
Wiley
Parution :
2013-04-09
PDF, ePub
|