Auerbach (10-2010) | PDF | 638 pages | 143981919X | 7.1Mb Security of Self-Organizing Networks: MANET, WSN, WMN, VANET /by Al-Sakib Khan Pathan. Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and oft
...
Read more »
|
Little, Brown and Company (8-2011) | EPUB | 432 pages | 0316037702 | 1.1Mb Ghost in the Wires: My Adventures as the World's Most Wanted Hacker /by Kevin Mitnick, Steve Wozniak and William L. Simon. Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast
...
Read more »
|
Random House (2-2002) | PDF | 256 pages | 037575878X | 13.3Mb The Hacker Ethic /by Pekka Himanen, Manuel Castells and Linus Torvalds. You may be a hacker and not even know it. Being a hacker has nothing to do with cyberterrorism, and it doesn’t even necessarily relate to the open-source movement. Being a hacker has more to do with your underlying assumpt
...
Read more »
|
Syngress (6-2011) | PDF | 208 pages | 1597496537 | 2.8Mb The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice /by Jason Andress. "This book is a great primer for anyone who wants to get into cybersecurity. It methodically covers the key principles in a easy to understand flow that builds on itself. I recomm
...
Read more »
|
Cambridge (7-2006) | PDF | 276 pages | 0521864852 | 1.6Mb Quantum Cryptography and Secret-Key Distillation /by Gilles Van Assche. Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This self-contained text introduces the principles and techniques of quantum
...
Read more »
|
Auerbach (12-2010) | PDF | 341 pages | 1439851239 | 5.7Mb Cyber Security Essentials /by James Graham, Ryan Olson and Rick Howard. The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a c
...
Read more »
|
Syngress (9-2006) | PDF | 320 pages | 1597491128 | 12.4Mb BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic /by Tom St Denis. Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The
...
Read more »
|
Packt (3- 2011) | PDF | 204 Pages | ISBN: 1849512647 | 5 MB Moodle Security /by Darko Mileti. Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks
...
Read more »
|
Springer (10-2005) | PDF | 268 pages | 0387279342 | 14.8Mb A Classical Introduction to Cryptography Exercise Book /by Thomas Baigneres, Pascal Junod, Yi Lu and Jean Monnerat. This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the auth
...
Read more »
|
Wiley (12-2003) | CHM | 240 pages | 0471180904 | 1.3Mb E-Commerce: A Control and Security Guide /by Gordon E. Smith. This text provides guidance on how to protect and monitor electronic commerce, and lays out the components and risks of an e-commerce system. It also details security solutions and auditing techniques for an e-commerce environment.This book is intended to provide a st
...
Read more »
|
Syngress (3-2002) | PDF | 800 pages | 1928994741 | 6.4Mb Check Point Next Generation Security Administration /by Cherie Amon, Allen V. Keele, Daniel Kligerman and Drew Simonis. Check Point NGX R65 is the next major release of Check Point's flagship firewall software product. Check Point's NGX is the underlying security software platform for all of the company's
...
Read more »
|
Syngress 2/ed (12-2009) | PDF | 368 pages | 1597494992 | 3.9Mb PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance /by Dr. Anton Chuvakin and Branden R. Williams. Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminal
...
Read more »
|
Syngress (10-2010) | PDF | 320 pages | 1597495700 | 8.5Mb Securing the Smart Grid: Next Generation Power Grid Security /by Tony Flick and Justin Morehouse. Smart Grids are the future of energy. By creating networks from power plant to home, utility companies will be able to regulate power consumption making sure that consumers are receiving the amount that is ne
...
Read more »
|
McGraw-Hill (10-2010) | PDF | 464 pages | 0071701095 | 7.7Mb c /by David Miller, Shon Harris, Allen Harper, and Stephen VanDyke. Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implement
...
Read more »
|
Wiley (6-2002) | PDF | 265 pages | 0470844930 | 20.6Mb Security for Ubiquitous Computing /by Frank Stajano. Twenty or even ten years ago, computer security was a marginal speciality for geeks who liked to obsess about things like enciphering email. Nowadays, it is centre stage. Cyberterrorism and electronic fraud are the subject of hand-wringing press articles;
...
Read more »
|
|