There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals--until now. In Android Security Internals, top Android security..
Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin--the game-changing digital currency used by millions worldwide.But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions wit..
1,000 practice questions for smart CompTIA CSA+ preparation CompTIA CSA+ Practice Tests provides invaluable preparation for the Cybersecurity Analyst exam CS0-001. With 1,000 questions covering 100% of the exam objectives, this book offers a multitude of opportunities for the savvy CSA+ candidate. P..
Did you know your car can be hacked? Your medical device? Your employer's HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headline-making hacks and breaches, but lack a complete understanding of ..
Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves yo..
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition explains t..
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety ..
Everyone is besieged by a nonstop cyber-crime wave that victimizes millions of people and businesses each year. And trouble usually starts with a click. In just the next 24 hours: Scammers will target the public with 94 billion emails Hackers will seize and hold 88,000 computers for ransom Iden..
Stop hackers before they hack you In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability asse..
Best practices for protecting critical data and systems Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance fail..
2nd edition. NUME CARTE: Introduction to Modern Cryptography, Second Edition, HardcoverISBN: 1466570261PRET EDITURA: 398.99AUTOR(i): Jonathan KatzEDITURA: Taylor and FrancisCOPERTA: CartonataDATA APARITIEI: Decembrie 2014DATA PUBLICARE: 2014FORMAT: 242x157x39..
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers and misinformed policymakers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride u..
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate in..
Cyber security is an area that impacts every individual, organization, and nation. While most people have heard the term cyber security and understand the impact it can have on them, such as identity theft, most people have no idea how to deal with the problem. Today, people have an incorrect view o..
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you t..
How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an..
There have been distinct turning point moments in human history, such as when "germ theory" explained how to control many diseases, or how cholesterol levels helped to predict heart disease. The list goes on. All of these moments have one thing in common: the risk of radiation, germs, and cholestero..
Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions..
There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their sy..
Ira Winkler has been dubbed -A Modern Day James Bond- by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the riveting, true stories and case studie..
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his r..
Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to..
The whirlwind of social media, online dating, and mobile apps can make life a dream--or a nightmare. For every trustworthy website, there are countless jerks, bullies, and scam artists who want to harvest your personal information for their own purposes. But you can fight back, right now. In The Sma..