This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, …
Red teaming. It is a practice as old as the Devil’s Advocate, the eleventh-century Vatican official charged with discrediting candidates …
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls …
The threat of radiological terrorism has recently come to the attention of the international community, as it became clear that …
Secure today's mobile devices and applications Implement a systematic approach to security in your mobile application development with help from …
Integrated Security Systems Design,2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains …
As countries across the globe continue to adjust their security operations to counter an increasingly volatile political landscape, the issue …
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in …
Excellent high-lvel book for anyone involved with software development and implementation. This book digs deep with enough details of security …
This book is designed for security and risk assessment professionals, DevOpsengineers, penetration testers, cloud security engineers, and cloud softwaredevelopers who …
A case-based approach to cryptanalysis that explains how and why attacks can happenApplied Cryptanalysis focuses on practical attacks on real-world …
Discusses the actions of different types of bodyguards, such as Caesar's Praetorian Guard, Japanese samurai warriors, and Wild West outlaws, …
This timely book spotlights how various entities are using the Internet to shape people's perceptions and decision-making. Also describes detailed …
Книга Foundations of Mac OS X Leopard Security Foundations of Mac OS X Leopard SecurityКниги Mac OS Автор: Charles Edge, …
Learn to evaluate and compare data encryption methods and attack cryptographic systemsKey FeaturesExplore popular and important cryptographic methodsCompare cryptographic modes …
From MSNBC terrorism expert Walid Phares, this is a frightening look into the future of jihad.В Though anВ alarming new …
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content …
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One …
The first book to reveal and dissect the technical aspect ofmany social engineering maneuversFrom elicitation, pretexting, influence and manipulation allaspects …
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always …
Network programming enables processes to communicate with each other over a computer network, but it is a complex task that …
Issues (Editions)YearIssue2024Volume: 611Volume: ??????2020Volume: 5712456Volume: ??????2019Volume: 5712Volume: 56123456Volume: ??????2018Volume: 5612Volume: 55234562017Volume: 5513Volume: 541234562016Volume: 542Volume: 531234562015Volume: 5312Volume: 521234562014Volume: 5212Volume: 511234562013Volume: 51123Volume: …
Issues (Editions)YearIssue2020Volume: 761234562019Volume: 751234562018Volume: 741234562017Volume: 73234562016Volume: 731Volume: 721234562015Volume: 711234562014Volume: 701234562013Volume: 691234562012Volume: 681234562011Volume: 671234562010Volume: 661234562009Volume: 651234562008Volume: 64123452007Volume: 631234562006Volume: 621234562005Volume: 611234562004Volume: 601234562003Volume: …
Issues (Editions)YearIssue2020Volume: 202Volume: ??????2019Volume: 201Volume: 1923Volume: ??????2018Volume: 201Volume: 1912Volume: 18123Volume: ??????2017Volume: 1912Volume: 1812Volume: 17123Volume: ??????2016Volume: 171Volume: 1623Volume: ??????2015Volume: 16123Volume: 15232014Volume: …