Books

20+ results found
Title Authors Description OpenBook ID
System crash System crash Paul Kropp Someone crashes the computers at Devin's school. The ATM at the bank where his dad works starts spitting out extra cash. What's going on? And why? Can Devin and Shelley figure it out in time? If they… OL11690328W
The best of 2600 The best of 2600 Emmanuel Goldstein Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a co… OL11938512W
24 deadly sins of software security 24 deadly sins of software security Michael Howard "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for … OL12066725W
The web application hacker's handbook The web application hacker's handbook Dafydd Stuttard,Dafydd Stuttard This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ex… OL13814659W
Simple Computer Transfer and Backup Simple Computer Transfer and Backup CA CA has assembled dozens of real-world stories from customers to help readers understand how to use the included software to move all of their songs, pictures, files, and settings over to a new comput… OL15102682W
Rootkits for dummies Rootkits for dummies Larry Stevenson A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, maki… OL15103013W
Codes Codes Richard A Mollin From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potentia… OL15170247W
RFID Handbook RFID Handbook Syed A. Ahson Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world's largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwi… OL15172470W
The CEH Prep Guide The CEH Prep Guide Ronald L. Krutz The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, … OL15172912W
Public Key Infrastructure Public Key Infrastructure John R Vacca With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Infor… OL15172981W
Securing E-Business Applications and Communications Securing E-Business Applications and Communications Jonathan S Held Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundam… OL15183796W
The Executive’s Guide to Privacy Management The Executive’s Guide to Privacy Management Michael Erbschloe A McGRAW-HILL EBOOK EXCLUSIVE! The Executive’s Guide to Privacy Management compliments NET Privacy: A Guide to Implementing an Ironclad e-Business Privacy Plan, which provides a step-by-step approach… OL15183825W
Active Defense Active Defense Chris Brenton Active Defense is our new comprehensive guide to implementing effective network security using the latest technologies. Superb coverage of all security threats (internal and external) and ways to… OL15188346W
Incident Response & Computer Forensics Incident Response & Computer Forensics Kevin Mandia Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Completely Updated with the Latest Technique… OL15189060W
Engineering information security Engineering information security Stuart Jacobs "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed … OL15455552W
Managed code rootkits Managed code rootkits Erez Metula "Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change … OL15520822W
Software engineering for secure systems Software engineering for secure systems Haralambos Mouratidis "This book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to impleme… OL15616337W
Digital identity and access management Digital identity and access management Raj Sharman,Sanjukta Das Smith,Manish Gupta "This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with … OL16142915W
Reliability and availability of cloud computing Reliability and availability of cloud computing Eric Bauer "The book is intended for IS/IT system and solution architects, developers and engineers, as well as technical sales, product management, and quality management professionals"-- OL16486564W
Fundamentals of Information Systems Security Fundamentals of Information Systems Security David Kim Revised and updated with the latest information from this fast-paced field, Fundamentals of Information System Security, Second Edition provides a comprehensive overview of the essential concepts rea… OL16811240W
Next page