Computers / System Administration / Security

New Releases

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Language

English (359)

French (7)

German (15)

Spanish (0)

Italian (8)

 

Protection

All (359)

DRM Free (48)

DRM (311)

More options

Sensitive Security Information, Certified® (SSI) Body of Knowledge

by American Board for Certification in Home

Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules. SSI plays a crucial role in all types...


Introduction to Criminal Justice Information Systems

by Ralph Ioimo

The proliferation of information systems throughout the criminal justice system has prompted many universities supporting criminal justice programs to add criminal justice information systems technology to their...


New Developments in Biological and Chemical Terrorism Countermeasures

by Ronald J. Kendall, Steven M. Presley & Seshadri S. Ramkumar

A science-based text, New Developments in Biological and Chemical Terrorism Countermeasures presents research that addresses the growing threat of chemical and biological terrorism as well as the need for improvements...


Threat Assessment and Management Strategies: Identifying the Howlers and Hunters, Second Edition

by Frederick S. Calhoun & J.D., Stephen W. Weston

The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters. To reflect those changes,...


Security without Obscurity: A Guide to PKI Operations

by Jeff Stapleton & W. Clay Epstein

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements....


State Fragility Around the World: Fractured Justice and Fierce Reprisal

by Laurie A. Gould & Matthew Pate

Failed and fragile states often govern through the criminalization of otherwise inconsequential or tolerated acts. These weak states also frequently use kidnapping, murder, and other violent or oppressive tactics...


Advanced Penetration Testing for Highly-Secured Environments - Second Edition

by Lee Allen & Kevin Cardwell

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This Book • Learn how to build your own pentesting lab environment to practice advanced techniques...


Mastering Kali Linux Wireless Pentesting

by Jilumudi Raghu Ram & Brian Sak

Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux About This Book • Develop your skills using attacks such as wireless cracking, Man-in-the-Middle,...


Policing Cyber Hate, Cyber Threats and Cyber Terrorism

by Brian Blakemore & Imran Awan

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive...


Maritime Security: Protection of Marinas, Ports, Small Watercraft, Yachts, and Ships

by Ph.D, Daniel J. Benny

In a time when threats against the maritime community have never been greater, Maritime Security: Protection of Marinas, Ports, Small Watercraft, Yachts, and Ships provides a single, comprehensive source of...


iOS Forensics Cookbook

by Bhanu Birani & Mayank Birani

Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics About This Book • This book gets you straight into solving even the most complex iOS forensic problems with easy-to-understand...


Take Control of 1Password

by Joe Kissell

Easily create and enter secure passwords on all your devices!

Updated March 3, 2016

Wrangling your Web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this...


Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD

by Yuri Diogenes, Jeff Gilbert & Robert Mazzoli

Enable employees to be productive and access data from any location or device

Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to...


Principles of Computer Security, Fourth Edition

by Wm. Arthur Conklin, Greg White & Chuck Cothren

Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA's fastest-growing credential, CompTIA Security+. Principles of Computer Security, Fourth...


Building a Home Security System with Raspberry Pi

by Matthew Poole

Build your own sophisticated modular home security system using the popular Raspberry Pi boardAbout This Book

  • This book guides you through building a complete home security system with Raspberry Pi and helps...


Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

by Henry Dalziel & Ajin Abraham

Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices,...


Deploying Secure Containers for Training and Development

by Jon Schipp & Henry Dalziel

In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use...


Mobile Data Loss: Threats and Countermeasures

by Michael T. Raggo

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised...


Essential Skills for Hackers

by Kevin Cardwell & Henry Dalziel

Essential Skills for Hackers is about the skills you need to be in the elite hacker family.

The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will...


Cyber Security Awareness for CEOs and Management

by David Willson & Henry Dalziel

Cyber Security for CEOs and Managment  is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an...