Android Apps Security
Network Security Bible
Security Power Tools
Security Metrics
The Myths of Security
Security Monitoring
Cloud Security and Privacy
Beautiful Security
Data-Driven Security
Android Security Internals
Advanced API Security
Application Security for the An ...
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you n ...
Android Apps Security
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can ...
The Fundamentals of Network Sec ...
Here’s a practical book that introduces fundamental network security concepts, principles, and terms. It helps you identify the best type of intrusion ...
Network Security with OpenSSL
OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide ava ...
Network Security Bible
* A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of sec ...
Network Security Hacks, 2nd Edi ...
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network ...
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security P ...
Security Metrics
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample ...
Network Security Assessment, 2n ...
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-base ...
Web Security Testing Cookbook
Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most neglected. The recipes in the ...
The Myths of Security
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional ...
Security Monitoring
How well does your enterprise stand up against today’s sophisticated security threats? In this book, security experts from Cisco Systems demonstrate h ...
Cloud Security and Privacy
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? No ...
Beautiful Security
In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems i ...
Enterprise Mac Security: Mac OS ...
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, secu ...
BackTrack 4: Assuring Security ...
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...
Managing Risk and Information S ...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to in ...
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple l ...
Information Security The Comple ...
Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information ...
Computer Security – ESORICS 201 ...
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013 ...
The Manager’s Guide to Web Appl ...
The Manager’s Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written ...
Data-Driven Security
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This caref ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
Advanced API Security
Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs. API adoption i ...