Books

20+ results found
Title Authors Description OpenBook ID
24 deadly sins of software security 24 deadly sins of software security Michael Howard "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for … OL12066725W
Assessing and managing security risk in IT systems Assessing and managing security risk in IT systems John McCumber Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… OL13638173W
Rootkits for dummies Rootkits for dummies Larry Stevenson A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, maki… OL15103013W
RFID Handbook RFID Handbook Syed A. Ahson Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world's largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwi… OL15172470W
The CEH Prep Guide The CEH Prep Guide Ronald L. Krutz The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, … OL15172912W
Information Security Cost Management Information Security Cost Management Ioana V Bazavan While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practi… OL15174009W
The Executive’s Guide to Privacy Management The Executive’s Guide to Privacy Management Michael Erbschloe A McGRAW-HILL EBOOK EXCLUSIVE! The Executive’s Guide to Privacy Management compliments NET Privacy: A Guide to Implementing an Ironclad e-Business Privacy Plan, which provides a step-by-step approach… OL15183825W
Active Defense Active Defense Chris Brenton Active Defense is our new comprehensive guide to implementing effective network security using the latest technologies. Superb coverage of all security threats (internal and external) and ways to… OL15188346W
Engineering information security Engineering information security Stuart Jacobs "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed … OL15455552W
Internet fraud casebook Internet fraud casebook Joseph T. Wells "This one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of submissions and together form a comprehensive pict… OL15632902W
CompTIA security+ study guide CompTIA security+ study guide Emmett A. Dulaney "The preparation you need for the CompTIA Security+ exam SY0-301This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside t… OL15934060W
Information assurance and security technologies for risk assessment and threat management Information assurance and security technologies for risk assessment and threat management Te-Shun Chou "This book details current trends and advances in information assurance and security, as well as explores emerging applications"--Provided by publisher. OL16176284W
Principles of information security Principles of information security Michael E. Whitman The fourth edition of Principles of Information Security continues to explore the field of information security and assurance with updated content on new innovations in technology and methodologies. … OL16262659W
Safeguarding critical e-documents Safeguarding critical e-documents Barclay T. Blair,Robert F. Smallwood "Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking f… OL16342893W
Law, policy and technology Law, policy and technology Eduardo Gelbstein,Pauline C. Reich "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on c… OL16499595W
Handbook of research on computational forensics, digital crime, and investigation Handbook of research on computational forensics, digital crime, and investigation Chang-Tsun Li "This book provides a media for advancing research and the development of theory and practice of digital crime prevention and forensics, embracing a broad range of digital crime and forensics discipl… OL16925549W
Security protocols Security protocols Bruce Christianson Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings<br />Author: Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe<br /> Published by Springer … OL16997618W
The cyber attack survival manual The cyber attack survival manual Selby, Nick (Police detective) "Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at an… OL19726345W
Hiding in Plain Sight Hiding in Plain Sight Eric Cole These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hide… OL19855216W
Introduction to Cryptography Introduction to Cryptography Hans Delfs Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides … OL19858945W
Next page