Computers / System Administration / Security

Best Selling / Page 2

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Language

English (359)

French (7)

German (15)

Spanish (0)

Italian (8)

 

Protection

All (359)

DRM Free (48)

DRM (311)

More options

Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities

by Vittorio Bertocci, Garrett Serack & Caleb Baker

WiUnderstanding Windows CardSpaceis the first insider’s guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors’ unparalleled...


Cyber Security Management: A Governance, Risk and Compliance Framework

by Peter Trim & Yang-Im Lee

Cyber Security Management: A Governance, Risk and Compliance Framework by Peter Trim and Yang-Im Lee has been written for a wide audience. Derived from research, it places security management in a holistic context...


GFI Network Security and PCI Compliance Power Tools

by Brien Posey

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products...


Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange (Digital Short Cut)

by Rand Morimoto

This is the eBook version of the printed book.

With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption...


Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab

by Thomas Wilhelm

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training,...


CCFP Certified Cyber Forensics Professional All-in-One Exam Guide

by Chuck Easttom

Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative...


Geekonomics: The Real Cost of Insecure Software

by David Rice

The Real Cost of Insecure Software

 

•   In 1996, software defects in a Boeing 757 caused a crash that killed 70 people…

•   In 2003, a software vulnerability helped cause the largest U.S. power outage...


Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

by Will Gragido & John Pirc

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry....


Computer and Information Security Handbook

by John R. Vacca

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the...


Social Engineering in IT Security: Tools, Tactics, and Techniques: Testing Tools, Tactics & Techniques

by Sharon Conheady

Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering...


Building Virtual Pentesting Labs for Advanced Penetration Testing

by Cardwell Kevin

Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include...


Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals

by Bob Fahy

How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable,...


The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives...


Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

by Aditya Sood & Richard Enbody

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual,...


The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems

by Robert C. Seacord

“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described...


Computer Forensics and Digital Investigation with EnCase Forensic v7

by Suzanne Widup

Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation...


Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex

by Bill Blunden & Violet Cheung

This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat...


Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

by Gavin Watson, Andrew Mason & Richard Ackroyd

Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration...


Collaboration with Cloud Computing: Security, Social Media, and Unified Communications

by Ric Messier

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes...


Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8

by Harlan Carvey

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free...