71 livres(s)
Télécharger le livre :  Cyber Breach Response That Actually Works
Ajouter à ma liste d'envies

Cyber Breach Response That Actually Works


Andrew Gorecki


You will be breached—the only question is whether you'll be ready     A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective...

Parution : 2020-06-09
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
40,62
Télécharger le livre :  Cybercrime Investigators Handbook
Ajouter à ma liste d'envies

Cybercrime Investigators Handbook


Graeme Edwards


The investigator’s practical guide for cybercrime evidence identification and collection Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been...

Parution : 2019-09-13
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
58,66
Télécharger le livre :  Windows Security Monitoring
Ajouter à ma liste d'envies

Windows Security Monitoring


Andrei Miroshnikov


Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the...

Parution : 2018-03-13
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
45,15
Télécharger le livre :  Advanced Penetration Testing
Ajouter à ma liste d'envies

Advanced Penetration Testing


Wil Allsopp


Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not...

Parution : 2017-02-22
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
46,42
Télécharger le livre :  Security in Fixed and Wireless Networks
Ajouter à ma liste d'envies

Security in Fixed and Wireless Networks


Michael Roßberg , Guenter Schaefer


Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what...

Parution : 2016-08-19
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
104,39
Télécharger le livre :  The Antivirus Hacker's Handbook
Ajouter à ma liste d'envies

The Antivirus Hacker's Handbook


Elias Bachaalany , Joxean Koret


Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future...

Parution : 2015-08-27
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
45,15
Télécharger le livre :  Introduction to Network Security
Ajouter à ma liste d'envies

Introduction to Network Security


Zachary A. Kissel , Jie Wang


Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect...

Parution : 2015-07-10
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
130,77
Télécharger le livre :  Security Intelligence
Ajouter à ma liste d'envies

Security Intelligence


Gregory Clark , Qing Li


Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable...

Parution : 2015-04-16
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
54,12
Télécharger le livre :  Phishing Dark Waters
Ajouter à ma liste d'envies

Phishing Dark Waters


Michele Fincher , Christopher Hadnagy


An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing...

Parution : 2015-03-18
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
31,65
Télécharger le livre :  The Mobile Application Hacker's Handbook
Ajouter à ma liste d'envies

The Mobile Application Hacker's Handbook


Dominic Chell , Shaun Colley , Tyrone Erasmus , Ollie Whitehouse


See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book...

Parution : 2015-02-17
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
56,97
Télécharger le livre :  Threat Modeling
Ajouter à ma liste d'envies

Threat Modeling


Adam Shostack


The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat...

Parution : 2014-02-12
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
59,08
Télécharger le livre :  Hacking Point of Sale
Ajouter à ma liste d'envies

Hacking Point of Sale


Slava Gomzin


Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive...

Parution : 2014-02-03
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
54,12
Télécharger le livre :  Unmasking the Social Engineer
Ajouter à ma liste d'envies

Unmasking the Social Engineer


Christopher Hadnagy


Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use...

Parution : 2014-01-27
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
33,76
Télécharger le livre :  Data-Driven Security
Ajouter à ma liste d'envies

Data-Driven Security


Jay Jacobs , Bob Rudis


Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data...

Parution : 2014-01-24
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
45,15
Télécharger le livre :  Carry On
Ajouter à ma liste d'envies

Carry On


Bruce Schneier


Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160...

Parution : 2013-11-20
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  Cybersecurity
Ajouter à ma liste d'envies

Cybersecurity


Thomas J. Mowbray


A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as...

Parution : 2013-10-18
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
54,12
Télécharger le livre :  Security Patterns
Ajouter à ma liste d'envies

Security Patterns


Collectif


Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security...

Parution : 2013-07-12
Format(s) : ePub
Éditeur : Wiley
J'achète
47,69
Télécharger le livre :  Hands-On Oracle Application Express Security
Ajouter à ma liste d'envies

Hands-On Oracle Application Express Security


N.C. , N.C.


An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and...

Parution : 2013-04-09
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
22,58
Télécharger le livre :  Wireless Mobile Internet Security
Ajouter à ma liste d'envies

Wireless Mobile Internet Security


Man Young Rhee


The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless...

Parution : 2013-03-26
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
111,78
Télécharger le livre :  Secrets and Lies
Ajouter à ma liste d'envies

Secrets and Lies


Bruce Schneier


Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses...

Parution : 2013-03-12
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
17,30
<< < 1234 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés