Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbol……続きを見る
Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attend……続きを見る
Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali Linux
Key Features
Efficiently perform penetration testing techniques on your public cloud……続きを見る
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards……続きを見る
This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and pr……続きを見る
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And mo……続きを見る
'A fascinating exposé of the world behind your screen. Timely, often disturbing, and so important'
Caroline Criado Perez, author of Invisible Women
'Takes us beyond Zuckerberg, Bezos et al to a murk……続きを見る
Learn to deploy proven cryptographic tools in your applications and services
Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, includi……続きを見る
Ripple versus bitcoin
The battle of the cryptocurrencies
Do want to diversify your bitcoin investments in other cryptocurrencies?
Do you want to invest (more) in ripple and / or bitcoin?
Do you want……続きを見る
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sen……続きを見る
Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with concrete exercises and examples
Key Features
Updated with the latest features and additions that c……続きを見る
Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacks
Key Features
Explore blockchain conc……続きを見る
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust ev……続きを見る
Power up your network applications with Python programming
Key Features
Master Python skills to develop powerful network applications
Grasp the fundamentals and functionalities of SDN
Design multi-……続きを見る
The Sunday Times top ten bestseller.
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, includ……続きを見る
One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored ……続きを見る
出版社: Springer International Publishing
発売日: 2019年10月23日
The development of “intelligent” systems that can take decisions and perform autonomously might lead to faster and more consistent decisions. A limiting factor for a broader adoption of AI technolog……続きを見る
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicat……続きを見る
出版社: Springer International Publishing
発売日: 2016年05月26日
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this fiel……続きを見る
著者:Tim Maurer
出版社: Cambridge University Press
発売日: 2018年01月30日
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsors……続きを見る
著者:Melanie Swan
出版社: O'Reilly Media
発売日: 2015年01月23日
Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain ……続きを見る
著者:Andy Greenberg
出版社: Knopf Doubleday Publishing Group
発売日: 2019年11月05日
**"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russi……続きを見る
著者:Mike Meyers
出版社: McGraw Hill LLC
発売日: 2015年05月11日
From Mike Meyers, the #1 name in CompTIA training and exam preparation, a thorough revision of his bestselling exam guideーupdated to cover the 2015 release of the CompTIA Network+ exam.
Get complet……続きを見る
Develop a deeper understanding of what's under the hood of blockchain with this technical reference guide on one of the most disruptive modern technologies
Key Features
Updated with four new chapte……続きを見る
著者:Mike Meyers
出版社: McGraw Hill LLC
発売日: 2016年01月07日
This bestselling on-the-job reference and test preparation guide has been fully revised for the new 2015 CompTIA exam objectives for exams 901 & 902
Written by the leading authority on CompTIA A+ ce……続きを見る
Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating i……続きを見る
著者:Bill Hagestad
出版社: IT Governance Publishing
発売日: 2014年09月21日
This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People’s Republic of China to promote its own hegemonistic, national self-interests and en……続きを見る
出版社: Springer International Publishing
発売日: 2020年03月03日
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is……続きを見る
Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student ……続きを見る
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By ……続きを見る