|
24 deadly sins of software security
|
Michael Howard |
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for … |
OL12066725W |
|
Assessing and managing security risk in IT systems
|
John McCumber |
Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… |
OL13638173W |
|
Rootkits for dummies
|
Larry Stevenson |
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, maki… |
OL15103013W |
|
RFID Handbook
|
Syed A. Ahson |
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world's largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwi… |
OL15172470W |
|
The CEH Prep Guide
|
Ronald L. Krutz |
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, … |
OL15172912W |
|
Information Security Cost Management
|
Ioana V Bazavan |
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practi… |
OL15174009W |
|
The Executive’s Guide to Privacy Management
|
Michael Erbschloe |
A McGRAW-HILL EBOOK EXCLUSIVE! The Executive’s Guide to Privacy Management compliments NET Privacy: A Guide to Implementing an Ironclad e-Business Privacy Plan, which provides a step-by-step approach… |
OL15183825W |
|
Active Defense
|
Chris Brenton |
Active Defense is our new comprehensive guide to implementing effective network security using the latest technologies. Superb coverage of all security threats (internal and external) and ways to… |
OL15188346W |
|
Engineering information security
|
Stuart Jacobs |
"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed … |
OL15455552W |
|
Internet fraud casebook
|
Joseph T. Wells |
"This one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of submissions and together form a comprehensive pict… |
OL15632902W |
|
CompTIA security+ study guide
|
Emmett A. Dulaney |
"The preparation you need for the CompTIA Security+ exam SY0-301This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside t… |
OL15934060W |
|
Information assurance and security technologies for risk assessment and threat management
|
Te-Shun Chou |
"This book details current trends and advances in information assurance and security, as well as explores emerging applications"--Provided by publisher. |
OL16176284W |
|
Principles of information security
|
Michael E. Whitman |
The fourth edition of Principles of Information Security continues to explore the field of information security and assurance with updated content on new innovations in technology and methodologies. … |
OL16262659W |
|
Safeguarding critical e-documents
|
Barclay T. Blair,Robert F. Smallwood |
"Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records. Managers and public officials are looking f… |
OL16342893W |
|
Law, policy and technology
|
Eduardo Gelbstein,Pauline C. Reich |
"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on c… |
OL16499595W |
|
Handbook of research on computational forensics, digital crime, and investigation
|
Chang-Tsun Li |
"This book provides a media for advancing research and the development of theory and practice of digital crime prevention and forensics, embracing a broad range of digital crime and forensics discipl… |
OL16925549W |
|
Security protocols
|
Bruce Christianson |
Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings<br />Author: Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe<br /> Published by Springer … |
OL16997618W |
|
The cyber attack survival manual
|
Selby, Nick (Police detective) |
"Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at an… |
OL19726345W |
|
Hiding in Plain Sight
|
Eric Cole |
These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hide… |
OL19855216W |
|
Introduction to Cryptography
|
Hans Delfs |
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides … |
OL19858945W |