Computers / System Administration / Security

New Releases

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

Delete Price range

From :
To :
OK

 

Language

English

French

German

Spanish

Italian

 

Protection

All (391)

DRM Free (50)

DRM (341)

More options

Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD

by Yuri Diogenes, Jeff Gilbert & Robert Mazzoli

Enable employees to be productive and access data from any location or device

Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to...


Principles of Computer Security, Fourth Edition

by Wm. Arthur Conklin, Greg White & Chuck Cothren

Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA's fastest-growing credential, CompTIA Security+. Principles of Computer Security, Fourth...


Information Technology 2016

by Duong Tran

Information Technology 2016 is a collection of Information Technology big pictures. The purpose of the book is to help students and network system administrators to learn Information Technology. The book covers...


Building a Home Security System with Raspberry Pi

by Matthew Poole

Build your own sophisticated modular home security system using the popular Raspberry Pi boardAbout This Book

  • This book guides you through building a complete home security system with Raspberry Pi and helps...


Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

by Henry Dalziel & Ajin Abraham

Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices,...


Deploying Secure Containers for Training and Development

by Jon Schipp & Henry Dalziel

In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use...


Mobile Data Loss: Threats and Countermeasures

by Michael T. Raggo

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised...


Essential Skills for Hackers

by Kevin Cardwell & Henry Dalziel

Essential Skills for Hackers is about the skills you need to be in the elite hacker family.

The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will...


Cyber Security Awareness for CEOs and Management

by David Willson & Henry Dalziel

Cyber Security for CEOs and Managment  is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an...


Meeting People via WiFi and Bluetooth

by Joshua Schroeder & Henry Dalziel

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came...


Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

by Josiah Dykstra

If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for...


Digital Forensics: Threatscape and Best Practices

by John Sammons

Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides...


Managing Cyber Risk in the Financial Sector: Lessons from Asia, Europe and the USA

by Ruth Taplin

Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business...


Security for Web Developers: Using JavaScript, HTML, and CSS

by John Paul Mueller

As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security...


A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET

by Elahe Fazeldehkordi, I.S. Amiri & Oluwatobi Ayodeji Akanbi

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible...


SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition

by Darril Gibson

This fully-updated, integrated self-study system offers complete coverage of the revised 2015 Systems Security Certified Practitioner (SSCP) exam domains

Thoroughly revised for the April 2015 exam update, SSCP...


The Re-Evolution of American Street Gangs

by Dale L. June, Mohamad Khatibloo & Gregorio Estevane

The problem of gangs and gang subculture is a growing threat to the stability of neighborhoods and entire communities. During the past two decades, gang members have increasingly migrated from large urban centers...


CRACK99: The Takedown of a $100 Million Chinese Software Pirate

by David Locke Hall

The utterly gripping story of the most outrageous case of cyber piracy prosecuted by the U.S. Department of Justice.

A former U.S. Navy intelligence officer, David Locke Hall was a federal prosecutor when a...


Learning Penetration Testing with Python

by Duffy Christopher

Utilize Python scripting to execute effective and efficient penetration tests About This Book • Understand how and where Python scripts meet the need for penetration testing • Familiarise yourself with the...


Conducting Network Penetration and Espionage in a Global Environment

by Bruce Middleton

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment...