Home > Tags: security (Total 1698 Records)
Honeypots: A New Paradigm to Information Security
Security By:R. C. Joshi 2011-02-03 00:00:00
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in inform Security
Tags: security information honeypots paradigm
Security De-Engineering: Solving the Problems in Information Risk Management
Security By:Ian Tibble 2011-12-15 00:00:00
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is Security
Tags: security information management problem risk
Security Testing with Kali NetHunter
Security By:Daniel Dieterle 2017-06-28 00:00:00
Security Testing with Kali NetHunter Kali Linux NetHunter is an Ethical Hacking platform that allows you to run a mobile version of Kali Linux on a supported Android device. In Security Testing with Kali NetHunter, you will see the basic usage of NetHunter as we walk through the entire NetHunter to Security
The Internet of Things: Emergence, Perspectives, Privacy and Security Issues (Internet Theory, Technology and Applications)
Security By:The Internet of Things : 2015-05-25 00:00:00
The Internet of Things (''IoT'') refers to the ability of everyday objects to connect to the Internet and to send and receive data. It includes, for example, Internet-connected cameras that allow you to post pictures online with a single click home automation systems that turn on your front porch l Security
Tags: security application theory technology internet perspectives things privacy issue emergence
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools.
.NET By:Brandon Perry 2017-06-18 00:00:00
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like fuzzing, performing vulnerability scans, and analyzing malware. With some help from Mono, you'll write your own practical security tools that will run on Windows, OS X, Linux, and even mobile devices. Afte .NET
The Secrets of Information Security hack Book
Security By:Nejim Developer 2017-06-29 00:00:00
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security,provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vu Security
Tags: security secret information hack
Resiliency: Enhancing Coping with Crisis and Terrorism (Nato Science for Peace and Security Series E: Human and Social Dynamics)
Security By:n/a 2015-04-15 00:00:00
This book contributes to a better understanding of what makes people and communities resilient in the face of disasters, violence and terrorism. This resilience is understood as a resource that facilitates recovery, effective functioning and positive outcomes in the wake of major critical events tha Security
Tags: security series science social dynamics enhancing terrorism nato peace crisis coping resiliency
CISSP Exam Prep Questions: Domain 6 Security Assessment and Testing
Security By:Richard Anderson 2017-06-30 00:00:00
Practice questions for Domain 6 (Security Assessment and Testing) of the Certified Information Systems Security Professional (CISSP) exam. Prep. Pass. Protect. Thats the purpose of this eBook. This is not a study guide rather, this is meant to augment your other preparation material. These questi Security
Tags: security exam testing question cissp assessment domain
Machine Learning and Security: Protecting Systems with Data and Algorithms
Security By:Clarence Chio 2017-10-25 00:00:00
Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you hav Security
Tags: security data system algorithm learning machine protecting
CISSP Exam Prep Questions: Domain 7 Security Operations
Security By:Richard Anderson 2017-06-30 00:00:00
Practice questions for Domain 7 (Security Operations) of the Certified Information Systems Security Professional (CISSP) exam. Prep. Pass. Protect. Thats the purpose of this eBook. This is not a study guide rather, this is meant to augment your other preparation material. These questions are enti Security