Computers / System Administration / Security

Best Selling / Page 4

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (329)

French (6)

German (1)

Spanish (0)

Italian (5)

 

Protection

All (329)

DRM Free (47)

DRM (282)

More options

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

by Bruce Dang, Alexandre Gazet & Elias Bachaalany

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents....


Unmasking the Social Engineer: The Human Element of Security

by Christopher Hadnagy & Paul Ekman

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge...


Data-Driven Security: Analysis, Visualization and Dashboards

by Jay Jacobs & Bob Rudis

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This...


Cyber Security

by John G. Voeller

Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security...


Surveillance and Threat Detection: Prevention versus Mitigation

by Richard Kirchner

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack...


Android Security Cookbook

by Makan Keith & Alexander-Bown Scott

Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs."Android Security Cookbook"...


Bring Your Own Device (BYOD): The mobile computing challenge

by The Chartered Institute for IT BCS

The increasing use of personal devices such as smartphones and tablets at work is offering an opportunity as well as a challenge for organisations, in particular the IT department. This ebook looks at ways to...


How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses and Hackers from Ruining Your Computer or Network: The Complete Guide for Your Home and Wo

by Bruce C Brown

It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research...


Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

by Cameron H. Malin, Eoghan Casey & James M. Aquilina

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies...


Hacking with Kali: Practical Penetration Testing Techniques

by James Broad & Andrew Bindner

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives,...


Professional Penetration Testing: Creating and Learning in a Hacking Lab

by Thomas Wilhelm

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before...


Unified Communications Forensics: Anatomy of Common UC Attacks

by Nicholas Mr. Grant & Joseph II Shaw

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish...


Computer and Information Security Handbook

by John R. Vacca

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory,...


Social Media Security: Leveraging Social Networking While Mitigating Risk

by Michael Cross

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking...


Introduction to Information Security: A Strategic-Based Approach

by Timothy Shimeall & Jonathan Spring

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing...


Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements

by David Lilburn Watson & Andrew Jones

This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance,...


The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online

by Denny Cherry

Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy....


Cyber Security and IT Infrastructure Protection

by John R. Vacca

This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established...


Cloud Storage Forensics

by Darren Quick, Ben Martini & Raymond Choo

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations...


Information Protection Playbook

by Greg Kane & Lorna Koppel

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost....