-
Introduction to Computer Networks and Cybersecurity
Author Chwan-Hwa Wu
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern net....
Release Date 2016/04 -
Author Denny Cherry
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make r....
Release Date 2022/09 -
Author Wallace Jackson
This book is a brief primer covering concepts central to digital imagery, digital audio and digital illustration using open source software packages such as GIMP, Audacity and Inkscape. These are used for this book because they are free for commercial use. The book....
Release Date 2015/10 -
Author Paul Crowley
CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corpo....
Release Date 2006/12 -
Author Brian T Contos
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist thre....
Release Date 2006/10 -
Author Ido Dubrawsky
Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; appl....
Release Date 2009/10 -
Digital Forensics for Legal Professionals
Author Lars Daniel , Larry Daniel
Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors’ years of experience in working with attorneys as digital forensics experts, common questions arise again....
Release Date 2011/10 -
Author Esther Swilley
Do you know anyone who does not own a mobile device? Consumers use mobile devices not only for communicating but for shopping as well. Searching for product information, inquiring about services, comparing prices, and purchasing make-up are just some of the shoppin....
Release Date 2015/11 -
Information Security Auditor - Careers in information security
Author Wendy Goucher
Identifying security gaps in an organisation’s information systems is a first and vital step in protecting data and information. This is what makes the role of an information security (or assurance) auditor so important. However, this is a role that is often malign....
Release Date 2016/03 -
Learning Penetration Testing with Python
Author Christopher Duffy
Utilize Python scripting to execute effective and efficient penetration tests About This BookUnderstand how and where Python scripts meet the need for penetration testingFamiliarise yourself with the process of highlighting a specific methodology to exploit an envi....
Release Date 2015/09 -
Kali Linux - An Ethical Hacker's Cookbook
Author Himanshu Sharma
Over 120 recipes to perform advanced penetration testing with Kali LinuxAbout This BookPractical recipes to conduct effective penetration testing using the powerful Kali LinuxLeverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities wi....
Release Date 2017/10 -
Mastering Python for Networking and Security - Second Edition
Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapyKey FeaturesEnhance your Python programming skills in securing systems and executing networking tasksExplore Python scripts to debug and secure complex networksLearn to avoid common cyber events wi.... -
CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition
Author Julie Mehan
Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same – but the outcomes can be equally devastating. Each can cause s....
Release Date 2014/05 -
BackTrack 5 Wireless Penetration Testing Beginner’s Guide
Author Vivek Ramachandran
Master bleeding edge wireless testing techniques with BackTrack 5.Learn Wireless Penetration Testing with the most recent version of BacktrackThe first and only book that covers wireless testing with BackTrackConcepts explained with step-by-step practical sessions a....
Release Date 2011/09 -
Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide
Author Dameon D. Welch-Abernathy
"When it comes to security products and technologies, experience is far and away the best teacher. PhoneBoy has been installing, running, and supporting Check Point FireWall-1 for years, and his experience shows in this book. Save yourself the pain of learning from ....
Release Date 2004/01 -
The Business Case For Network Security: Advocacy, Governance, And Roi
Author Warren Saxe , Catherine Paquet
Understand the total cost of ownership and return on investment for network security solutionsUnderstand what motivates hackers and how to classify threatsLearn how to recognize common vulnerabilities and common types of attacksExamine modern day security systems, d....
Release Date 2004/12 -
Author Andrew Bindner , James Broad
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you thr....
Release Date 2013/12 -
Managing Information Security, 2nd Edition
Author John R. Vacca
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,....
Release Date 2013/08 -
Integrating Emergency Management and Disaster Behavioral Health
Author Ronald Sherman , Brian Flynn
Integrating Emergency Management and Disaster Behavioral Health identifies the most critical areas of integration between the profession of emergency management and the specialty of disaster behavioral health, providing perspectives from both of these critical area....
Release Date 2017/01 -
Executing Windows Command Line Investigations
Author Rosanne Pelli , Joshua Bartolomie , Chet Hosmer
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident resp....
Release Date 2016/06 -
Author Robert Morgan , Jean-Louis Bravard
A focused, implementation-orientated, executive-level book on outsourcing by two globally known practitioners.The outsourcing market is booming, the total outsourcing market in EMA forecasts a $59 billion dollar growth between 2004 and 2007.Fills a fills a major gap....
Release Date 2009/01 -
Author Randall F. Trzeciak , Andrew P. Moore , Dawn M. Cappelli
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade sec....
Release Date 2012/01 -
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
Author Madjid Nakhjiri , Mahsa Nakhjiri
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.AAA and Network Security for Mobile Access is an invalua....
Release Date 2005/10 -
Author Michelle Tillis LEDERMAN
We all know that networking is important, and that forming relationships with others is a vital part of success. But sometimes it seems like networking removes all emotions from the equation and focuses only on immediate goals…whereas the kind of relation....
Release Date 2011/09 -
Passwords & Internet Addresses Journal For Dummies
Author Ryan C. Williams
Keep track of your passwords and learn how to make them betterYou have dozens of passwords for dozens of uses, and it seems every account has different password requirements. How can you keep them all straight while keeping them secure? This ingenious little book so....
Release Date 2013/11 -
Predictive Control of Power Converters and Electrical Drives
Author Patricio Cortes , Jose Rodriguez
Describes the general principles and current research into Model Predictive Control (MPC); the most up-to-date control method for power converters and drivesThe book starts with an introduction to the subject before the first chapter on classical control methods for....
Release Date 2012/04 -
Elementary Information Security, 2nd Edition
Author Smith
An ideal text for introductory information security courses, the second edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cyber security and technology. Thoroughly updated with recently re....
Release Date 2015/02 -
Beginning Application Lifecycle Management
Author Joachim Rossberg
Beginning Application Lifecycle Management is a guide to an area of rapidly growing interest within the development community: managing the entire cycle of building software. ALM is an area that spans everything from requirements specifications to retirement of an I....
Release Date 2014/09 -
Author Al-Sakib Khan Pathan , Saiful Azad
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted ele....
Release Date 2014/11