Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or ……続きを見る
The sixth edition of Security and Loss Prevention continues the tradition of providing introductory and advanced coverage of the body of knowledge of the security profession. To bridge theory to pra……続きを見る
This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and com……続きを見る
Explore every nook and cranny of the Android OS to modify your device and guard it against security threats
About This Book
Understand and counteract against offensive security threats to your appl……続きを見る
A complete pentesting guide facilitating smooth backtracking for working hackers
About This Book
Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux
Gain……続きを見る
Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. The……続きを見る
Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks
Key Features
Gain insights into the latest antivirus evasion techniques
Set up a complete pentesting ……続きを見る
This book provides various speech enhancement algorithms for digital hearing aids. It covers information on noise signals extracted from silences of speech signal. The description of the algorithm u……続きを見る
Learn over 116 Linux commands to develop the skills you need to become a professional Linux system administrator
Key Features
Explore essential Linux commands and understand how to use Linux help t……続きを見る
Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source code in C# and .NET, and come away with an understan……続きを見る
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the de……続きを見る
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostag……続きを見る
Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algor……続きを見る
Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
Master ZAP to protect your syste……続きを見る
The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and secur……続きを見る
The sixth edition of Security and Loss Prevention continues the tradition of providing introductory and advanced coverage of the body of knowledge of the security profession. To bridge theory to pra……続きを見る
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and ……続きを見る
Burp Suite is an integrated platform/graphical tool for performing security testing of web applications. Burp suite is a java application that can be used to secure or crack web applications. The su……続きを見る
Police interviews with suspects and witnesses provide some of the most significant evidence in criminal investigations. Frequently challenging, they require special training and skills. This interac……続きを見る
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust ev……続きを見る
Information and associated technologies continue to advance toward diverse distributed configuration environments for entering, processing, storing, and retrieving data. The magnitude of changes occ……続きを見る
“Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication ……続きを見る
In order for wireless devices to function, the signals must be coded in standard ways so that the sender and the receiver can communicate. This area of video source coding is one of the key challeng……続きを見る
"IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques. In terms of content, this publication co……続きを見る
Build your defense against web attacks with Kali Linux 2.0 About This Book • Gain a deep understanding of the flaws in web applications and exploit them in a practical manner • Get hands-on web appl……続きを見る
Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only hav……続きを見る
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes About This Book • Know how to set up your ……続きを見る
This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure……続きを見る
Cómo sobrevivir al GDPR facilita el cumplimiento normativo en materia de protección de datos personales, explicando de forma clara y sencilla las principales novedades que el GDPR exige implementar ……続きを見る
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several sof……続きを見る