Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally doesn't integrate well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile developmen..
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals--until now. In Android Security Internals, top Android security..
Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin--the game-changing digital currency used by millions worldwide.But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions wit..
CCNA Security 210-260 Official Cert Guide CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security experts Omar Santos and John Stupp..
Practical, concise, and complete--the ultimate CompTIA Security+ prep CompTIA Security+ Deluxe Study Guide, Fourth Edition is the ultimate preparation resource for Exam SY0-501. Fully updated to cover 100% of the latest exam, this book is packed with essential information on critical security concep..
You've heard the stories about the dark side of the internet--hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn--but they remain just that: stories. Surely these things would never happen to you. Zoe Quinn used to feel the same way. She is a video game developer whose..
Did you know your car can be hacked? Your medical device? Your employer's HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headline-making hacks and breaches, but lack a complete understanding of ..
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety ..
2nd edition. NUME CARTE: Introduction to Modern Cryptography, Second Edition, HardcoverISBN: 1466570261PRET EDITURA: 384.99AUTOR(i): Jonathan KatzEDITURA: Taylor and FrancisCOPERTA: CartonataDATA APARITIEI: Decembrie 2014DATA PUBLICARE: 2014FORMAT: 242x157x39..
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers and misinformed policymakers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride u..
Cyber security is an area that impacts every individual, organization, and nation. While most people have heard the term cyber security and understand the impact it can have on them, such as identity theft, most people have no idea how to deal with the problem. Today, people have an incorrect view o..
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you t..
How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an..
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography,..
Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions..
There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their sy..
Ira Winkler has been dubbed -A Modern Day James Bond- by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the riveting, true stories and case studie..
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his r..
The whirlwind of social media, online dating, and mobile apps can make life a dream--or a nightmare. For every trustworthy website, there are countless jerks, bullies, and scam artists who want to harvest your personal information for their own purposes. But you can fight back, right now. In The Sma..