Security and Privacy for Mobile ...
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile H ...
Cloud Management and Security
Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and d ...
Security and the Networked Soci ...
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, a ...
Network Security Assessment, 3r ...
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that prof ...
Handbook of Communications Secu ...
“Handbook of Communications Security” gives the reader information related to all aspects of communications security, from the fundamental concepts to ...
Enterprise Mac Security, 3rd Ed ...
Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to t ...
Building a Home Security System ...
The Raspberry Pi is a powerful low-cost credit-card-sized computer, which lends itself perfectly as the controller for a sophisticated home security s ...
Resource Optimization and Secur ...
This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cl ...
Guide to Security Assurance for ...
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tool ...
Cloud Computing and Security
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 ...
IBM WebSphere Application Serve ...
For IBM WebSphere users, this is the complete guide to securing your applications with Java EE and JAAS security standards. From a far-ranging overvie ...
Microsoft Dynamics AX 2012 Secu ...
Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users’ privileg ...
Intermediate Security Testing w ...
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defend ...
Information Security, 2nd Editi ...
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consume ...
Security and Privacy in Interne ...
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hack ...
Node Security
Node.js is a fast-growing platform for building server applications using JavaScript. Now that it is being more widely used in production settings, No ...
SSCP (ISC)2 Systems Security Ce ...
Fully updated Study Guide for the SSCP This guide prepares you for the SSCP, Systems Security Certified Practitioner certification examination by focu ...
Building a Comprehensive IT Sec ...
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further ...
iOS Application Security
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, ...
Cryptography and Network Securi ...
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-stu ...
Managing Risk and Information S ...
This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience abou ...
IT Security Risk Control Manage ...
This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable ...
Kali Linux 2 Assuring Security ...
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the t ...
SSCP Systems Security Certified ...
This fully-updated, integrated self-study system offers complete coverage of the revised 2015 Systems Security Certified Practitioner (SSCP) exam doma ...
31 Days Before Your CCNA Securi ...
31 Days Before Your CCNA Security Exam offers you an engaging and practical way to understand the certification process, commit to taking the CCNA Sec ...