681 livres(s)
Télécharger le livre :  Advanced Penetration Testing
Ajouter à ma liste d'envies

Advanced Penetration Testing


Wil Allsopp


Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not...

Parution : 2017-02-22
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
46,42
Télécharger le livre :  Personal Cybersecurity
Ajouter à ma liste d'envies

Personal Cybersecurity


Marvin Waschke


Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs...

Parution : 2017-01-12
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
52,24
Télécharger le livre :  Federal Cloud Computing
Ajouter à ma liste d'envies

Federal Cloud Computing


Matthew Metheny


Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including theFederal Cloud Computing Strategy, Cloud Computing Standards,...

Parution : 2017-01-05
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Biometric Security and Privacy
Ajouter à ma liste d'envies

Biometric Security and Privacy


Collectif


This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as...

Parution : 2016-12-21
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
158,24
Télécharger le livre :  NTP Security
Ajouter à ma liste d'envies

NTP Security


Allan Liska


Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network...

Parution : 2016-12-10
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
34,50
Télécharger le livre :  Advanced Persistent Security
Ajouter à ma liste d'envies

Advanced Persistent Security


Araceli Treu Gomes , Ira Winkler


Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book...

Parution : 2016-11-30
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Practical Information Security Management
Ajouter à ma liste d'envies

Practical Information Security Management


Tony Campbell


Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works...

Parution : 2016-11-29
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
78,87
Télécharger le livre :  Certified Ethical Hacker (CEH) Foundation Guide
Ajouter à ma liste d'envies

Certified Ethical Hacker (CEH) Foundation Guide


Sagar Ajay Rahalkar


Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from...

Parution : 2016-11-29
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
34,50
Télécharger le livre :  Fundamentals of Network Forensics
Ajouter à ma liste d'envies

Fundamentals of Network Forensics


R.C. Joshi , Emmanuel S. Pilli


This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the...

Parution : 2016-11-25
Format(s) : PDF
Éditeur : Springer
J'achète
105,49
Télécharger le livre :  Meeting Security Challenges through Data Analytics and Decision Support
Ajouter à ma liste d'envies

Meeting Security Challenges through Data Analytics and Decision Support


Galina Rogova


The sheer quantity of widely diverse data which now results from multiple sources presents a problem for decision-makers and analysts, who are finding it impossible to cope with the ever-increasing flow of material. This has potentially serious consequences for the...

Parution : 2016-11-15
Format(s) : PDF
J'achète
107,10
Télécharger le livre :  The Second Economy
Ajouter à ma liste d'envies

The Second Economy


Allison Cerra , Steve Grobman


Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and...

Parution : 2016-10-20
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
39,43
Télécharger le livre :  Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Ajouter à ma liste d'envies

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications


Kim-Kwang Raymond Choo , Ali Dehghantanha


Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and...

Parution : 2016-10-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
75,91
Télécharger le livre :  Building a Practical Information Security Program
Ajouter à ma liste d'envies

Building a Practical Information Security Program


Jason Andress , Mark Leary


Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate...

Parution : 2016-10-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Handbook of System Safety and Security
Ajouter à ma liste d'envies

Handbook of System Safety and Security


Edward Griffor


Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of...

Parution : 2016-10-02
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
150,86
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Ajouter à ma liste d'envies

Penetration Tester's Open Source Toolkit


Jeremy Faircloth


Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This...

Parution : 2016-09-20
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Mobile Security and Privacy
Ajouter à ma liste d'envies

Mobile Security and Privacy


Raymond Choo , Man Ho Au


Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security.Mobile devices and apps have...

Parution : 2016-09-14
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
75,91
Télécharger le livre :  Cybersecurity for Hospitals and Healthcare Facilities
Ajouter à ma liste d'envies

Cybersecurity for Hospitals and Healthcare Facilities


Luis Ayala


Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a...

Parution : 2016-09-06
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
78,87
Télécharger le livre :  Coding for Penetration Testers
Ajouter à ma liste d'envies

Coding for Penetration Testers


Jason Andress , Ryan Linn


Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool...

Parution : 2016-09-03
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Security in Fixed and Wireless Networks
Ajouter à ma liste d'envies

Security in Fixed and Wireless Networks


Michael Roßberg , Guenter Schaefer


Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what...

Parution : 2016-08-19
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
104,39
Télécharger le livre :  The Cyber Effect
Ajouter à ma liste d'envies

The Cyber Effect


Mary Aiken


Dr Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology and technology to investigate the intersection between technology and human behaviour. In this, her first book, Aiken has created a starting...

Parution : 2016-08-18
Format(s) : ePub
Éditeur : John Murray
J'achète
3,99
<< < 89101112 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés