Détail de l'éditeur
|
Documents disponibles chez cet éditeur (21)

![]()
Books
Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range [...]
ISBN/ISSN/EAN : 978-0-12-804718-7 Article en page(s) : 30 p. Catégories : Index. décimale : 005.8 Tags : Application software--Security measures Langues: Anglais ![]()
Books
Robert Layton ; Paul a. Watters | Syngress | Syngress advanced topics in information security | 2016Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more rec[...]
ISBN/ISSN/EAN : 978-0-12-802916-9 Article en page(s) : X, 211 p. Catégories : Index. décimale : 327.1/2/0285 Tags : Open source intelligence (E) Langues: Anglais ![]()
Books
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of stati[...]
ISBN/ISSN/EAN : 978-0-12-804452-0 Article en page(s) : XI, 188 p. Catégories : Index. décimale : 005.820151 Tags : Computer security--Mathematics Langues: Anglais ![]()
Books
In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data co[...]
ISBN/ISSN/EAN : 978-0-12-804449-0 Article en page(s) : XV, 307 p. Catégories : Index. décimale : 005.82 Tags : Microsoft Windows (Computer file) ; Computer security ; Cryptography ; Data protection Langues: Anglais ![]()
Books
Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in re[...]
Mention d'édition : 4th ed. ISBN/ISSN/EAN : 978-0-12-802149-1 Article en page(s) : XXI, 435 p. Catégories : Index. décimale : 005.8 Tags : Penetration testing (Computer security) ; Computers--Access control ; Computer networks--Security measures--Testing Langues: Anglais ![]()
Books
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you h[...]
ISBN/ISSN/EAN : 978-0-12-802324-2 Article en page(s) : IX, 667 p. Index. décimale : 658.15/5 Tags : Computer security ; Risk management Langues: Anglais ![]()
Books
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these [...]
ISBN/ISSN/EAN : 978-0-12-801308-3 Article en page(s) : XV, 241 p. Catégories : Index. décimale : 327.12 Tags : Electronic intelligence ; Internet in espionage ; Cyber intelligence (Computer security) ; Internet--Security measures ; Computer crimes Langues: Anglais ![]()
Books
The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices. Two modes for 802.11i for two different g[...]
ISBN/ISSN/EAN : 978-0-12-802222-1 Article en page(s) : XVI, 52 p. Catégories : Index. décimale : 005.71376 Tags : Computer security--Software ; Computers--Networking ; Data encryption (Computer science) Langues: Anglais ![]()
Books
Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and c[...]
ISBN/ISSN/EAN : 978-0-12-800743-3 Article en page(s) : XXIII, 282 p. Index. décimale : 363.25/968 Tags : Computer crimes--Investigation ; Cyberterrorism--Investigation ; Computer crimes--Investigation--Handbooks, manuals, etc. Langues: Anglais ![]()
Books
Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even nov[...]
Mention d'édition : 1st ISBN/ISSN/EAN : 978-0-12-418676-7 Article en page(s) : 318 p. Catégories : Index. décimale : 004.6 Tags : Computers--Programming Languages--Python ; Python (Computer program language) Langues: Anglais ![]()
Books
This field guide gives you the tools and answers you need to improve Microsoft Windows performance, including: •Save money on optimizing Windows performance with deep technical troubleshooting that tells you "What would Microsoft do to solve thi[...]
ISBN/ISSN/EAN : 978-0-12-416701-8 Article en page(s) : XXV, 349 p. Catégories : Index. décimale : 004/.36 Tags : Windows (Computer programs) Langues: Anglais ![]()
Books
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to [...]
Mention d'édition : 2nd ed. ISBN/ISSN/EAN : 978-0-12-411644-3 Article en page(s) : XVIII, 204 p. Catégories : Index. décimale : 005.8 Tags : Penetration testing (Computer security) ; Hackers ; Computer software--Testing ; Computer crimes--Prevention Langues: Anglais ![]()
Books
Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber c[...]
Mention d'édition : 2nd ed. ISBN/ISSN/EAN : 978-0-12-416672-1 Article en page(s) : XVII, 306 p. Index. décimale : 355.343 Tags : Information warfare--Handbooks, manuals, etc. ; Computer networks--Security measures--Handbooks, manuals, etc. ; Computer networks--Security measures Langues: Anglais ![]()
Books
In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in[...]
ISBN/ISSN/EAN : 978-1-59749-735-0 Article en page(s) : XIX, 258 p. Catégories : 2.05 Approche scientifique > Méthode scientifique > Évaluation > Évaluation du risque
Index. décimale : 005.8 Tags : Computer security ; Risk assessment ; Data mining Langues: Anglais ![]()
Books
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state [...]
ISBN/ISSN/EAN : 978-1-59749-949-1 Article en page(s) : XVI, 290 p. Catégories : Index. décimale : 005.8 Tags : Computer networks--Security measures ; Computer security ; Data protection ; Computer crimes--Prevention Langues: Anglais