Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by …
ASP.NET Core in Action, Second Edition is a comprehensive guide to creating web applications with ASP.NET Core 5.0. Go from …
The classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu …
So you're in charge of a network? That's great - and a great big job! Let this book be your …
“Thorough and comprehensive coverage from one of the foremost experts in browser security.” —Tavis Ormandy, Google Inc. Modern web applications …
With a New Introduction by the Author From the oilfields of Saudi Arabia to the Nile delta, from the shipping …
Achieve Linux system administration mastery with time-tested and proven techniques In Mastering Linux System Administration, Linux experts and system administrators …
Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast approaching …
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition …
This is one of the most interesting infosec books to come out in the last several years.–Dino Dai Zovi, Information …
This book is about cryptography as it is used in real-world systems, about cryptography as an engineering discipline rather than …
Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! Web …
Spring Security in Action, Second Edition reveals the Spring Security techniques and tools you need to defend your apps against …
Design and develop Spring applications that are secure right from the start.In Spring Security in Action, Second Edition you will …
In an unparalleled collaboration, two leading global thinkers in technology and foreign affairs give us their widely anticipated, transformational vision …
Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level Security is a …
This book was great and opened mind to a whole new world of investing. Thank you.
Cryptography plays a crucial role in many aspects of today's world, from internet banking and e-commerce to e-mail and web-based …
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario …
This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC …
"The promise of cloud computing is here. These pages provide the 'eyes wide open' insights you need to transform your …
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic …
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what …
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of blockchain …
Developers tasked with security problems are often not cryptographers themselves. They are bright people who, with careful guidance, can implement …
Foundations of Cryptography surveys the main paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic …
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters …
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key …