| |
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how...
Editeur :
Syngress
Parution :
2016-03-10
epub sans DRM
|
This
book covers three major parts of Big Data: concepts, theories and
applications. Written by world-renowned leaders in Big Data, this book explores
the problems, possible solutions and directions for Big Data in research and
practice. It also focuses on...
Editeur :
Springer
Parution :
2016-03-03
PDF, ePub
|
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication...
Editeur :
Wiley-ISTE
Parution :
2016-03-03
PDF, ePub
|
Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable...
Editeur :
Morgan Kaufmann
Parution :
2016-02-02
PDF, epub sans DRM
|
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents...
Editeur :
Butterworth-Heinemann
Parution :
2016-01-12
PDF, epub sans DRM
|
In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.
-...
Editeur :
Syngress
Parution :
2015-12-10
epub sans DRM
|
Essential Skills for Hackers is about the skills you need to be in the elite hacker family.
The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what...
Editeur :
Syngress
Parution :
2015-12-09
epub sans DRM
|
CISSP Study Guide, Third Edition provides readers with information on theCISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals.
With over 100,000 professionals certified worldwide, and many more...
Editeur :
Syngress
Parution :
2015-12-08
PDF
|
Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate...
Editeur :
Syngress
Parution :
2015-12-08
PDF, epub sans DRM
|
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine,...
Editeur :
Syngress
Parution :
2015-12-07
PDF, epub sans DRM
|
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of...
Editeur :
Syngress
Parution :
2015-12-07
epub sans DRM
|
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and...
Editeur :
Syngress
Parution :
2015-12-05
PDF, epub sans DRM
|
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that...
Editeur :
Syngress
Parution :
2015-11-12
PDF, epub sans DRM
|
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.
Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the...
Editeur :
Syngress
Parution :
2015-11-12
PDF, epub sans DRM
|
Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets,...
Editeur :
Syngress
Parution :
2015-11-12
PDF, epub sans DRM
|
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed...
Editeur :
Syngress
Parution :
2015-11-10
epub sans DRM
|
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated...
Editeur :
Syngress
Parution :
2015-11-03
PDF, epub sans DRM
|
This book presents the most interesting talks given at ISSE 2015 – the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include:· Encrypted Communication· Trust Services, eID...
Editeur :
Springer Vieweg
Parution :
2015-11-02
PDF
|
Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic.
As traffic varies...
Editeur :
Iste Press - Elsevier
Parution :
2015-10-31
PDF, epub sans DRM
|
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are...
Editeur :
Springer
Parution :
2015-09-24
PDF, ePub
|