| |
Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and...
Editeur :
Apress
Parution :
2016-10-20
PDF, ePub
|
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and...
Editeur :
Syngress
Parution :
2016-10-12
PDF, epub sans DRM
|
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate...
Editeur :
Syngress
Parution :
2016-10-03
epub sans DRM
|
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of...
Editeur :
Syngress
Parution :
2016-10-02
epub sans DRM
|
Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This...
Editeur :
Syngress
Parution :
2016-09-20
PDF, epub sans DRM
|
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security.Mobile devices and apps have...
Editeur :
Syngress
Parution :
2016-09-14
PDF, epub sans DRM
|
Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der neuen Fassung der Norm ISO/IEC 27001. Die Autoren erläutern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das...
Editeur :
Springer Vieweg
Parution :
2016-09-14
Collection :
Edition
PDF, ePub
|
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a...
Editeur :
Apress
Parution :
2016-09-06
PDF, ePub
|
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool...
Editeur :
Syngress
Parution :
2016-09-03
PDF, epub sans DRM
|
Dr Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology and technology to investigate the intersection between technology and human behaviour. In this, her first book, Aiken has created a starting...
Editeur :
John Murray
Parution :
2016-08-18
ePub
|
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of...
Editeur :
Springer
Parution :
2016-08-16
Collection :
Advances in Intelligent Systems and Computing
ePub
|
Ing. Markus Pierer M.Sc. proves whether or not there is a generic valid system comparison approach for various individual specifications facilitating the selection process for organizations. He illustrates important basics of enterprise mobility management, realizes...
Editeur :
Springer Vieweg
Parution :
2016-08-12
PDF
|
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what...
Editeur :
Wiley
Parution :
2016-08-05
PDF, ePub
|
Audio Content Security: Attack Analysis onAudio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of...
Editeur :
Syngress
Parution :
2016-07-16
PDF, epub sans DRM
|
Quantifying the User Experience: Practical Statistics for User Research, Second Edition, provides practitioners and researchers with the information they need to confidently quantify, qualify, and justify their data. The book presents a practical guide on how to use...
Editeur :
Morgan Kaufmann
Parution :
2016-07-12
PDF, epub sans DRM
|
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring commonDNS vulnerabilities, studying different attack vectors, and providing necessary information for securingDNS infrastructure. The book...
Editeur :
Syngress
Parution :
2016-06-10
PDF, epub sans DRM
|
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact.Data breaches are inevitable incidents that can disrupt...
Editeur :
Syngress
Parution :
2016-06-08
PDF, epub sans DRM
|
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the...
Editeur :
Springer
Parution :
2016-05-27
ePub
|
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting...
Editeur :
Syngress
Parution :
2016-05-17
epub sans DRM
|
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts ofOS X, analysts will set themselves apart by acquiring an up-and-coming...
Editeur :
Syngress
Parution :
2016-05-07
PDF, epub sans DRM
|