Télécharger le livre :  Phishing Dark Waters
Ajouter à ma liste d'envies
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing...

Editeur : Wiley
Parution : 2015-03-18

PDF, ePub

31,65
Télécharger le livre :  The Mobile Application Hacker's Handbook
Ajouter à ma liste d'envies
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book...

Editeur : Wiley
Parution : 2015-02-17

PDF, ePub

56,97
Télécharger le livre :  Cyber Security and Resiliency Policy Framework
Ajouter à ma liste d'envies
Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most...

Editeur : SAGE Publications Ltd
Parution : 2014-09-15

PDF

94,94
Télécharger le livre :  Cybercrime and Cyber Warfare
Ajouter à ma liste d'envies
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields...

Editeur : Wiley-ISTE
Parution : 2014-02-19

PDF, ePub

163,47
Télécharger le livre :  Threat Modeling
Ajouter à ma liste d'envies
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat...

Editeur : Wiley
Parution : 2014-02-12

PDF, ePub

59,08
Télécharger le livre :  Hacking Point of Sale
Ajouter à ma liste d'envies
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive...

Editeur : Wiley
Parution : 2014-02-03

PDF, ePub

54,12
Télécharger le livre :  Unmasking the Social Engineer
Ajouter à ma liste d'envies
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use...

Editeur : Wiley
Parution : 2014-01-27

PDF, ePub

33,76
Télécharger le livre :  Data-Driven Security
Ajouter à ma liste d'envies
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data...

Editeur : Wiley
Parution : 2014-01-24

PDF, ePub

45,15
Télécharger le livre :  Carry On
Ajouter à ma liste d'envies
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160...

Editeur : Wiley
Parution : 2013-11-20

PDF, ePub

27,11
Télécharger le livre :  Cybersecurity
Ajouter à ma liste d'envies
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as...

Editeur : Wiley
Parution : 2013-10-18

PDF, ePub

54,12
Télécharger le livre :  Security Patterns
Ajouter à ma liste d'envies
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security...

Editeur : Wiley
Parution : 2013-07-12
Collection : Wiley Software Patterns Series
ePub

47,69
Télécharger le livre :  Hands-On Oracle Application Express Security
Ajouter à ma liste d'envies
An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and...

Editeur : Wiley
Parution : 2013-04-09

PDF, ePub

22,58
Télécharger le livre :  Wireless Mobile Internet Security
Ajouter à ma liste d'envies
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless...

Editeur : Wiley
Parution : 2013-03-26

PDF, ePub

111,78
Télécharger le livre :  Secrets and Lies
Ajouter à ma liste d'envies
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses...

Editeur : Wiley
Parution : 2013-03-12

PDF, ePub

17,30
Télécharger le livre :  Public Key Cryptography
Ajouter à ma liste d'envies
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and...

Editeur : Wiley-IEEE Press
Parution : 2013-01-08
Collection : IEEE Press Series on Information and Communication Networks Security
PDF, ePub

93,84
Télécharger le livre :  Cryptography Engineering
Ajouter à ma liste d'envies
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned...

Editeur : Wiley
Parution : 2012-07-16

PDF, ePub

51,70
Télécharger le livre :  The Death of the Internet
Ajouter à ma liste d'envies
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize...

Editeur : Wiley-IEEE Computer Society Pr
Parution : 2012-07-11
Collection : IEEE Press
PDF, ePub

73,96
Télécharger le livre :  Mastering Windows Network Forensics and Investigation
Ajouter à ma liste d'envies
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement...

Editeur : Sybex
Parution : 2012-05-30

PDF, ePub

54,12
Télécharger le livre :  Predicting Malicious Behavior
Ajouter à ma liste d'envies
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and...

Editeur : Wiley
Parution : 2012-05-25

PDF, ePub

49,58
Télécharger le livre :  Software Safety and Security
Ajouter à ma liste d'envies
Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol...

Editeur : SAGE Publications Ltd
Parution : 2012-05-15

PDF

119,28
<< < 23456 >