Books

20+ results found
Title Authors Description OpenBook ID
The best of 2600 The best of 2600 Emmanuel Goldstein Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a co… OL11938512W
Payment card industry data security standard handbook Payment card industry data security standard handbook Timothy M. Virtue Clearly written and easy to use, Payment Card Industry Data Security Standard Handbook is your single source along the journey to compliance with the Payment Card Industry Data Security Standard (PCI… OL11962965W
Next generation SSH2 implementation Next generation SSH2 implementation Dale Liu The most up-to-date information on the next generation of SSH2 and how to incorporate it into your organization's security environment New security risks, continuously evolving regulation and increas… OL13614374W
Securing PHP web applications Securing PHP web applications Tricia Ballad Easy, Powerful Code Security Techniques for Every PHP Developer Hackers specifically target PHP Web applications. Why? Because they know many of these apps are written by programmers with little o… OL13617981W
Energy and environmental challenges to security Energy and environmental challenges to security NATO Advanced Research Workshop on Energy and Environmental Challenges to Security (2007 Budapest, Hungary) The thirst for energy and the need to manage environmental impacts arising from the carbon economy are urgent issues facing this and future generations. The environment and security nexus provide an … OL15024433W
CCSP CCSP Todd Lammle Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides: In-depth coverage of every SECUR exam objective Practical information on Cisc… OL15068518W
Public Key Infrastructure Public Key Infrastructure John R Vacca With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Infor… OL15172981W
SECUR Exam Cram 2 (Exam Cram 642-501) SECUR Exam Cram 2 (Exam Cram 642-501) David Minutella Your resource to passing the Cisco CCSP SECUR Certification Exam! Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs! The CCSP SECUR Exam Cram 2 (Exam 6… OL15175400W
Securing E-Business Applications and Communications Securing E-Business Applications and Communications Jonathan S Held Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundam… OL15183796W
Engineering information security Engineering information security Stuart Jacobs "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed … OL15455552W
Managed code rootkits Managed code rootkits Erez Metula "Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change … OL15520822W
Frameworks for ICT policy Frameworks for ICT policy Esharenana E. Adomi "This book provides policy-relevant insights and information to aid those engaged in systematic research and teaching about ICT policy formation and implementation"--Provided by publisher. OL15536435W
Improvised Explosive Devices in Iraq Improvised Explosive Devices in Iraq Andrew Smith Surprise is a familiar term in military writings and is enshrined in most nations’ doctrine. Surprises that emerge in tactics, however, can also operate at the strategic and operational levels and ar… OL15866343W
Cyber security standards, practices and industrial applications Cyber security standards, practices and industrial applications Junaid Ahmed Zubairi "This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classific… OL15917366W
CompTIA security+ study guide CompTIA security+ study guide Emmett A. Dulaney "The preparation you need for the CompTIA Security+ exam SY0-301This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside t… OL15934060W
Facebook me! Facebook me! Dave Awl A guide to using the online social network provides information on creating a profile, communicating with friends, using Facebook applications, and using Facebook to promote projects and businesses. OL15935375W
Pro PHP security Pro PHP security Chris Snyder Provides information on securing PHP applications, covering such topics as SQL injection, XSS, remote execution, temporary files, REST services, CAPTCHAs, identity verification, and versioning. OL15955481W
Penetration tester's open source toolkit Penetration tester's open source toolkit Jeremy Faircloth "Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing p… OL15981093W
Auditing cloud computing Auditing cloud computing Ben Halpert "The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of … OL16014206W
Computer network security and cyber ethics Computer network security and cyber ethics Joseph Migga Kizza "Focuses on security issues, increasing awareness of the magnitude of cyber vandalism, and the ways to protect ourselves and our society, how cyber attacks are committed, and what efforts are being u… OL16214268W
Next page