Create account Create free account
Sign in
  • Home
    • Business
    • Career development
    • Data
    • Design
    • Hardware
    • Math Science Engineering
    • Other
    • Security
    • Software Development
    • System Administration
    • Travel Hobbies
    • Web Mobile
    • Recommendation
    • Trending Now

eBook Reading

Search Button
All Ebooks
Free Ebooks
Premium Ebooks
  • Title: A to Z
  • Title: Z to A
  • Release Date: Newest to Oldest
  • Release Date: Oldest to Newest
  • View ↓
  • View ↑

Search Results

1 - 30 of 66 results

Filter
Categories
  • All (35603)
  • Security(1455)
    • Security Engineering(66)
      • Encryption Cryptography(3)
      • Data Protection(27)
      • Security Architecture(7)
      • Access Control(7)
100 Years of Identity Crisis Ebook only for VIP member

100 Years of Identity Crisis

Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment Ebook only for VIP member

Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment

Keycloak - Identity and Access Management for Modern Applications Ebook only for VIP member

Keycloak - Identity and Access Management for Modern Applications

Modern Data Protection Ebook only for VIP member

Modern Data Protection

Consumer Protection in E-Retailing in ASEAN Ebooks for all member

Consumer Protection in E-Retailing in ASEAN

Security Engineering, 3rd Edition Ebooks for all member

Security Engineering, 3rd Edition

Authentication and Access Control: Practical Cryptography Methods and Tools Ebooks for all member

Authentication and Access Control: Practical Cryptography Methods and Tools

The Enterprise Path to Service Mesh Architectures, 2nd Edition Ebook only for VIP member

The Enterprise Path to Service Mesh Architectures, 2nd Edition

Lee Calcote

Access Control and Identity Management, 3rd Edition Ebook only for VIP member

Access Control and Identity Management, 3rd Edition

Mike Chapple

Threat Modeling Ebook only for VIP member

Threat Modeling

Matthew J. Coles, Izar Tarandach

Implementing Cryptography Using Python Ebooks for all member

Implementing Cryptography Using Python

Shannon W. Bray

Microservices Security in Action Ebook only for VIP member

Microservices Security in Action

Wajjakkara Kankanamge Anthony Nuwan Dias, Prabath Siriwardena

Securing Cloud Services - A pragmatic approach, second edition Ebook only for VIP member

Securing Cloud Services - A pragmatic approach, second edition

Lee Newcombe

Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments Ebook only for VIP member

Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments

Ric Messier

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software Ebooks for all member

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Maciej Machulak, Michael Schwartz

Understanding Security Issues Ebooks for all member

Understanding Security Issues

Stanley Siegel, Chris Williams, Scott Donaldson

Secure Sensor Cloud Ebook only for VIP member

Secure Sensor Cloud

Vimal Kumar, Amartya Sen, Sanjay Madria,

Microsoft System Center Data Protection Manager Cookbook Ebooks for all member

Microsoft System Center Data Protection Manager Cookbook

Patrick Lownds, Charbel Nemnom

Hands-On Software Engineering with Python Ebook only for VIP member

Hands-On Software Engineering with Python

Brian Allbee

Getting Started with z/OS Data Set Encryption Ebooks for all member

Getting Started with z/OS Data Set Encryption

Andy Coulson Bill White Jacky Doll, Brad Habbershaw, Cecilia Carranza Lewis, Tho

Hands-On Cryptography with Python Ebooks for all member

Hands-On Cryptography with Python

Samuel Bowne

Fixing an Insecure Software Life Cycle Ebooks for all member

Fixing an Insecure Software Life Cycle

April C. Wright

Threat Hunting Ebooks for all member

Threat Hunting

Michael Collins

Environment Modeling-Based Requirements Engineering for Software Intensive Systems Ebook only for VIP member

Environment Modeling-Based Requirements Engineering for Software Intensive Systems

Zhi Jin

Lessons Learned: Critical Information Infrastructure Protection- How to protect critical information infrastructure Ebook only for VIP member

Lessons Learned: Critical Information Infrastructure Protection- How to protect critical information infrastructure

Toomas Viira

Visual Cryptography and Secret Image Sharing Ebook only for VIP member

Visual Cryptography and Secret Image Sharing

Ching-Nung Yang, Stelvio Cimato

Trusted Computing Ebooks for all member

Trusted Computing

Tsinghua University Tsinghua University Press, Dengguo Feng

Serious Cryptography Ebook only for VIP member

Serious Cryptography

Jean-Philippe Aumasson

Security from First Principles Ebooks for all member

Security from First Principles

Susan Sons, Craig Jackson, Scott Russell

Defensive Security Handbook Ebook only for VIP member

Defensive Security Handbook

Amanda Berlin, Lee Brotherston

  • 100 Years of Identity Crisis by Ebook only for VIP member

    100 Years of Identity Crisis

    Author
    Release Date 2021/09

    The concept of Identity Crisis came into usage in the 1940s and it has continued to dominate the cultural zeitgeist ever since. In his exploration of the historical origins of this development, Frank Furedi argues that the principal driver of the ‘crisis of identity’ was and continues to be the conf....
  • Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment by Ebook only for VIP member

    Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment

    Author
    Release Date 2021/08

    Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the im....
  • Keycloak - Identity and Access Management for Modern Applications by Ebook only for VIP member

    Keycloak - Identity and Access Management for Modern Applications

    Author
    Release Date 2021/06

    Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applicationsKey FeaturesGet up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examplesConfigure, manage, and extend Ke....
  • Modern Data Protection by Ebook only for VIP member

    Modern Data Protection

    Author
    Release Date 2021/05

    Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile d....
  • Consumer Protection in E-Retailing in ASEAN by Ebooks for all member

    Consumer Protection in E-Retailing in ASEAN

    Author
    Release Date 2021/01

    This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef....
  • Security Engineering, 3rd Edition by Ebooks for all member

    Security Engineering, 3rd Edition

    Author
    Release Date 2020/12

    Now that there’s software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic  In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambr....
  • Authentication and Access Control: Practical Cryptography Methods and Tools by Ebooks for all member

    Authentication and Access Control: Practical Cryptography Methods and Tools

    Author
    Release Date 2020/12

    Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked.This book begins with the theoretical background of cryptography and the foundations of authentica....
  • The Enterprise Path to Service Mesh Architectures, 2nd Edition by Lee Calcote Ebook only for VIP member

    The Enterprise Path to Service Mesh Architectures, 2nd Edition

    Author Lee Calcote
    Release Date 2020/11

    Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This....
  • Access Control and Identity Management, 3rd Edition by Mike Chapple Ebook only for VIP member

    Access Control and Identity Management, 3rd Edition

    Author Mike Chapple
    Release Date 2020/10

    Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact acc....
  • Threat Modeling by Matthew J. Coles, Izar Tarandach Ebook only for VIP member

    Threat Modeling

    Author Matthew J. Coles , Izar Tarandach
    Release Date 2020/09

    Threat modeling is one of the most essential—and most misunderstood—parts of the development lifecycle. Whether you’re a security practitioner or application developer, this book will help you gain a better understanding of core concepts and how to apply them to yo....
  • Implementing Cryptography Using Python by Shannon W. Bray Ebooks for all member

    Implementing Cryptography Using Python

    Author Shannon W. Bray
    Release Date 2020/08

    Learn to deploy proven cryptographic tools in your applications and servicesCryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cr....
  • Microservices Security in Action by Wajjakkara Kankanamge Anthony Nuwan Dias, 
            Prabath Siriwardena Ebook only for VIP member

    Microservices Security in Action

    Author Wajjakkara Kankanamge Anthony Nuwan Dias , Prabath Siriwardena
    Release Date 2020/08

    Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you’ve learned i....
  • Securing Cloud Services - A pragmatic approach, second edition by Lee Newcombe Ebook only for VIP member

    Securing Cloud Services - A pragmatic approach, second edition

    Author Lee Newcombe
    Release Date 2020/04

    Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated wi....
  • Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments by Ric Messier Ebook only for VIP member

    Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments

    Author Ric Messier
    Release Date 2020/02

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Manage your own robust, inexpensive cybersecurity testing environment Thi....
  • Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software by Maciej Machulak, Michael Schwartz Ebooks for all member

    Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

    Author Maciej Machulak , Michael Schwartz
    Release Date 2018/12

    Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate y....
  • Understanding Security Issues by Stanley Siegel, Chris Williams, Scott Donaldson Ebooks for all member

    Understanding Security Issues

    Author Stanley Siegel , Chris Williams , Scott Donaldson
    Release Date 2018/12

    With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and busine....
  • Secure Sensor Cloud by Vimal Kumar, 
            Amartya Sen, 
            Sanjay Madria, 
         Ebook only for VIP member

    Secure Sensor Cloud

    Author Vimal Kumar , Amartya Sen , Sanjay Madria
    Release Date 2018/12

    The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It ....
  • Microsoft System Center Data Protection Manager Cookbook by Patrick Lownds, Charbel Nemnom Ebooks for all member

    Microsoft System Center Data Protection Manager Cookbook

    Author Patrick Lownds , Charbel Nemnom
    Release Date 2018/12

    Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPM Key FeaturesAdapt to the modern data center design challenges and improve storage efficiency Effective recipes to help you create your own robust architectural designs S....
  • Hands-On Software Engineering with Python by Brian Allbee Ebook only for VIP member

    Hands-On Software Engineering with Python

    Author Brian Allbee
    Release Date 2018/10

    Explore various verticals in software engineering through high-end systems using PythonKey FeaturesMaster the tools and techniques used in software engineering Evaluates available database options and selects one for the final Central Office system-components Exper....
  • Getting Started with z/OS Data Set Encryption by Andy Coulson Bill White Jacky Doll, Brad Habbershaw, Cecilia Carranza Lewis, Tho Ebooks for all member

    Getting Started with z/OS Data Set Encryption

    Author Andy Coulson Bill White Jacky Doll , Brad Habbershaw , Cecilia Carranza Lewis , Tho
    Release Date 2018/06

    AbstractThis IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/O....
  • Hands-On Cryptography with Python by Samuel Bowne Ebooks for all member

    Hands-On Cryptography with Python

    Author Samuel Bowne
    Release Date 2018/06

    Learn to evaluate and compare data encryption methods and attack cryptographic systemsAbout This BookExplore popular and important cryptographic methodsCompare cryptographic modes and understand their limitationsLearn to perform attacks on cryptographic systemsWho ....
  • Fixing an Insecure Software Life Cycle by April C. Wright Ebooks for all member

    Fixing an Insecure Software Life Cycle

    Author April C. Wright
    Release Date 2018/05

    In the race to remain competitive, development teams in many companies are under tremendous pressure to create software on tight deadlines. And in most cases, that means dealing with security bugs only after software is released. But offensive testing and incident ....
  • Threat Hunting by Michael Collins Ebooks for all member

    Threat Hunting

    Author Michael Collins
    Release Date 2018/05

    Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company’s network. In many organizations, security analysts initiate threat hunting when they spot something weird—network conditions or activ....
  • Environment Modeling-Based Requirements Engineering for Software Intensive Systems by Zhi Jin Ebook only for VIP member

    Environment Modeling-Based Requirements Engineering for Software Intensive Systems

    Author Zhi Jin
    Release Date 2018/04

    Environment Modeling-Based Requirements Engineering for Software Intensive Systems provides a new and promising approach for engineering the requirements of software-intensive systems, presenting a systematic, promising approach to identifying, clarifying, modeling....
  • Lessons Learned: Critical Information Infrastructure Protection- How to protect critical information infrastructure by Toomas Viira Ebook only for VIP member

    Lessons Learned: Critical Information Infrastructure Protection- How to protect critical information infrastructure

    Author Toomas Viira
    Release Date 2018/01

    "I loved the quotes at the beginning of each chapter – very interesting and thought-provoking. I also enjoyed the author’s style and his technical expertise shone through," Christopher Wright, Wright CandA Consulting Ltd. Protecting critical information infra....
  • Visual Cryptography and Secret Image Sharing by Ching-Nung Yang, Stelvio Cimato Ebook only for VIP member

    Visual Cryptography and Secret Image Sharing

    Author Ching-Nung Yang , Stelvio Cimato
    Release Date 2017/12

    With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography ....
  • Trusted Computing by Tsinghua University Tsinghua University Press, Dengguo Feng Ebooks for all member

    Trusted Computing

    Author Tsinghua University Tsinghua University Press , Dengguo Feng
    Release Date 2017/12

    The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such ....
  • Serious Cryptography by Jean-Philippe Aumasson Ebook only for VIP member

    Serious Cryptography

    Author Jean-Philippe Aumasson
    Release Date 2017/11

    "This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, bl....
  • Security from First Principles by Susan Sons, Craig Jackson, Scott Russell Ebooks for all member

    Security from First Principles

    Author Susan Sons , Craig Jackson , Scott Russell
    Release Date 2017/10

    Today, a spate of best practices guides, checklists, policies, and standards pervade nearly every part of information security practice. Some are well thought out and well written, others less so. How do you evaluate them? This report explores the Information Secur....
  • Defensive Security Handbook by Amanda Berlin, Lee Brotherston Ebook only for VIP member

    Defensive Security Handbook

    Author Amanda Berlin , Lee Brotherston
    Release Date 2017/04

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to ....
1 2 3 Next
  • Recommended
  • Privacy Policy
  • About