Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally doesn't integrate well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile developmen..
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities. Part I starts with a rundown ..
Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin--the game-changing digital currency used by millions worldwide.But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions wit..
Practical, concise, and complete--the ultimate CompTIA Security+ prep CompTIA Security+ Deluxe Study Guide, Fourth Edition is the ultimate preparation resource for Exam SY0-501. Fully updated to cover 100% of the latest exam, this book is packed with essential information on critical security concep..
Did you know your car can be hacked? Your medical device? Your employer's HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headline-making hacks and breaches, but lack a complete understanding of ..
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition explains t..
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety ..
Everyone is besieged by a nonstop cyber-crime wave that victimizes millions of people and businesses each year. And trouble usually starts with a click. In just the next 24 hours: Scammers will target the public with 94 billion emails Hackers will seize and hold 88,000 computers for ransom Iden..
Stop hackers before they hack you In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability asse..
Best practices for protecting critical data and systems Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance fail..
2nd edition. NUME CARTE: Introduction to Modern Cryptography, Second Edition, HardcoverISBN: 1466570261PRET EDITURA: 398.99AUTOR(i): Jonathan KatzEDITURA: Taylor and FrancisCOPERTA: CartonataDATA APARITIEI: Decembrie 2014DATA PUBLICARE: 2014FORMAT: 242x157x39..
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers and misinformed policymakers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride u..
Cyber security is an area that impacts every individual, organization, and nation. While most people have heard the term cyber security and understand the impact it can have on them, such as identity theft, most people have no idea how to deal with the problem. Today, people have an incorrect view o..
There have been distinct turning point moments in human history, such as when "germ theory" explained how to control many diseases, or how cholesterol levels helped to predict heart disease. The list goes on. All of these moments have one thing in common: the risk of radiation, germs, and cholestero..
Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions..
There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their sy..
Ira Winkler has been dubbed -A Modern Day James Bond- by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the riveting, true stories and case studie..
Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to..