-
Managing Information Security, 2nd Edition
Author John R. Vacca
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,....
Release Date 2013/08 -
Network and System Security, 2nd Edition
Author John R. Vacca
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate....
Release Date 2013/08 -
Applied Network Security Monitoring
Author Jason Smith , Chris Sanders
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring i....
Release Date 2013/11 -
Author Raymond Choo , Ben Martini , Darren Quick
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation i....
Release Date 2013/11 -
Author Bruce Wimmer , CPP
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and....
Release Date 2015/03 -
Industrial Network Security, 2nd Edition
Author Joel Thomas Langill , Eric D. Knapp
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you wi....
Release Date 2014/12 -
Social Engineering Penetration Testing
Author Richard Ackroyd , Andrew Mason , Gavin Watson
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and e....
Release Date 2014/04 -
Author Brian Honan , Jim Reavis , Raj Samani
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).For many years the CSA has been at the forefront of researc....
Release Date 2014/09 -
Tissue Engineering, 2nd Edition
Author Jan De Boer , Clemens Van Blitterswijk
Tissue Engineering is a comprehensive introduction to the engineering and biological aspects of this critical subject. With contributions from internationally renowned authors, it provides a broad perspective on tissue engineering for students coming to the subject ....
Release Date 2014/12 -
Detecting and Combating Malicious Email
Author Cade Kamachi , Julie JCH Ryan
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully au....
Release Date 2014/10 -
Cathodic Corrosion Protection Systems
Author Alireza Bahadori
Corrosion is a naturally occurring cost, worth billions in the oil and gas sector. New regulations, stiffer penalties for non-compliance and aging assets are all leading companies to develop new technology, procedures and bigger budgets catering to one prevailing me....
Release Date 2014/07 -
Author Will Gragido , Iain Davison , David DeSanto , John Pirc
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting....
Release Date 2016/05 -
Author Richard Enbody , Aditya Sood
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and....
Release Date 2014/04 -
Cyber Crime and Cyber Terrorism Investigator's Handbook
Author Francesca Bosco , Andrew Staniforth , Babak Akhgar
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become ....
Release Date 2014/07 -
Hacking and Penetration Testing with Low Power Devices
Author Philip Polstra
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a lapto....
Release Date 2014/09 -
Author Lance Kaplan , Tarek Abdelzaher , Dong Wang
Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field ....
Release Date 2015/04 -
Power Plant Instrumentation and Control Handbook
Author Ajay Kumar Debnath , Swapan Basu
The book discusses instrumentation and control in modern fossil fuel power plants, with an emphasis on selecting the most appropriate systems subject to constraints engineers have for their projects. It provides all the plant process and design details, includ....
Release Date 2014/11 -
Author Dan Twing , Rick Sturm , Dennis Drogseth
CMDB Systems: Making Change Work in the Age of Cloud and Agile shows you how an integrated database across all areas of an organization’s information system can help make organizations more efficient reduce challenges during change management and reduce total cost o....
Release Date 2015/03 -
Cyber Reconnaissance, Surveillance and Defense
Author Robert Shimonski
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being ....
Release Date 2014/10 -
Author Babak Akhgar , Colin Pattinson , Mohammad Dastbaz
We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates t....
Release Date 2015/03 -
The Basics of Digital Forensics, 2nd Edition
Author John Sammons
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to per....
Release Date 2014/12 -
Environment Modeling-Based Requirements Engineering for Software Intensive Systems
Author Zhi Jin
Environment Modeling-Based Requirements Engineering for Software Intensive Systems provides a new and promising approach for engineering the requirements of software-intensive systems, presenting a systematic, promising approach to identifying, clarifying, modeling....
Release Date 2018/04 -
Author Ric Messier
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, t....
Release Date 2015/11 -
Application of Big Data for National Security
Author Babak Akhgar , Gregory B. Saathoff , Hamid R. Arabnia , Richard Hill , Andrew Stanif
Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combin....
Release Date 2015/02 -
Author Justin Rainey , Timothy Virtue
The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar ....
Release Date 2014/12 -
Building an Intelligence-Led Security Program
Author Allan Liska
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are....
Release Date 2014/12 -
CISSP Study Guide, 3rd Edition
Author Joshua Feldman , Seth Misenar , Eric Conrad
CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more j....
Release Date 2015/12 -
Introduction to US Cybersecurity Careers
Author Henry Dalziel
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecuri....
Release Date 2014/12 -
How to Defeat Advanced Malware
Author Simon Cros , Henry Dalziel
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverage....
Release Date 2014/12 -
Google Hacking for Penetration Testers, 3rd Edition
Author Justin Brown , Bill Gardner , Johnny Long
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade sec....
Release Date 2015/11