| |
Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets,...
Editeur :
Syngress
Parution :
2015-11-12
PDF, epub sans DRM
|
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed...
Editeur :
Syngress
Parution :
2015-11-10
epub sans DRM
|
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated...
Editeur :
Syngress
Parution :
2015-11-03
PDF, epub sans DRM
|
This book presents the most interesting talks given at ISSE 2015 – the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include:· Encrypted Communication· Trust Services, eID...
Editeur :
Springer Vieweg
Parution :
2015-11-02
PDF
|
Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic.
As traffic varies...
Editeur :
Iste Press - Elsevier
Parution :
2015-10-31
PDF, epub sans DRM
|
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are...
Editeur :
Springer
Parution :
2015-09-24
PDF, ePub
|
This book examines the most recent and contentious issues in relation to cybercrime facing the world today, and how best to address them. The contributors show how Eastern and Western nations are responding to the challenges of cybercrime, and the latest trends and...
Editeur :
Palgrave Macmillan
Parution :
2015-09-01
Collection :
Palgrave Studies in Cybercrime and Cybersecurity
PDF
|
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability...
Editeur :
Syngress
Parution :
2015-08-31
epub sans DRM
|
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future...
Editeur :
Wiley
Parution :
2015-08-27
PDF, ePub
|
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and...
Editeur :
Syngress
Parution :
2015-08-20
PDF, epub sans DRM
|
Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden – Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von...
Editeur :
Springer Vieweg
Parution :
2015-08-12
Collection :
Edition
PDF, ePub
|
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing...
Editeur :
Syngress
Parution :
2015-08-11
epub sans DRM
|
Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business...
Editeur :
Syngress
Parution :
2015-08-10
PDF, epub sans DRM
|
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of theRed Team is to see how weak or otherwise the organization's security posture is....
Editeur :
Syngress
Parution :
2015-08-10
PDF, epub sans DRM
|
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor,Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a...
Editeur :
Syngress
Parution :
2015-07-20
PDF, epub sans DRM
|
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect...
Editeur :
Wiley
Parution :
2015-07-10
PDF, ePub
|
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case...
Editeur :
Elsevier
Parution :
2015-07-06
PDF, epub sans DRM
|
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity.
The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a...
Editeur :
Syngress
Parution :
2015-06-10
PDF, epub sans DRM
|
|
|
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the...
Editeur :
Syngress
Parution :
2015-06-01
PDF, epub sans DRM
|