Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally doesn't integrate well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile developmen..
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals--until now. In Android Security Internals, top Android security..
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities. Part I starts with a rundown ..
Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin--the game-changing digital currency used by millions worldwide.But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions wit..
1,000 practice questions for smart CompTIA CSA+ preparation CompTIA CSA+ Practice Tests provides invaluable preparation for the Cybersecurity Analyst exam CS0-001. With 1,000 questions covering 100% of the exam objectives, this book offers a multitude of opportunities for the savvy CSA+ candidate. P..
Practical, concise, and complete--the ultimate CompTIA Security+ prep CompTIA Security+ Deluxe Study Guide, Fourth Edition is the ultimate preparation resource for Exam SY0-501. Fully updated to cover 100% of the latest exam, this book is packed with essential information on critical security concep..
Did you know your car can be hacked? Your medical device? Your employer's HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headline-making hacks and breaches, but lack a complete understanding of ..
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety ..
2nd edition. NUME CARTE: Introduction to Modern Cryptography, Second Edition, HardcoverISBN: 1466570261PRET EDITURA: 384.99AUTOR(i): Jonathan KatzEDITURA: Taylor and FrancisCOPERTA: CartonataDATA APARITIEI: Decembrie 2014DATA PUBLICARE: 2014FORMAT: 242x157x39..
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers and misinformed policymakers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride u..
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate in..
Cyber security is an area that impacts every individual, organization, and nation. While most people have heard the term cyber security and understand the impact it can have on them, such as identity theft, most people have no idea how to deal with the problem. Today, people have an incorrect view o..
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you t..
How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an..
Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions..
There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their sy..
Ira Winkler has been dubbed -A Modern Day James Bond- by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the riveting, true stories and case studie..
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his r..
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick..
The whirlwind of social media, online dating, and mobile apps can make life a dream--or a nightmare. For every trustworthy website, there are countless jerks, bullies, and scam artists who want to harvest your personal information for their own purposes. But you can fight back, right now. In The Sma..