Home | Amazing | Today | Tags | Publishers | Years | Search 
Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark

You are holding the proceedings of FSE 2011, the 18th International Workshop on Fast Software Encryption. This workshop was organized in cooperation with the International Association for Cryptologic Research. It was held in Lyngby, Denmark, during February 13–16, 2011.

The FSE 2011 Program Committee (PC) consisted of...

Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Mobile and Wireless Network Security and Privacy
Mobile and Wireless Network Security and Privacy

Currently the mobile wireless technology is experiencing rapid growth. However the major challenge for deployment of this technology with its special characteristics is securing the existing and future vulnerabilities. Major security and privacy issues for standard wireless networks include the authentication of wireless clients and...

Focke-Wulf Fw 190 Aces of the Russian Front (Osprey Aircraft of the Aces, No 6)
Focke-Wulf Fw 190 Aces of the Russian Front (Osprey Aircraft of the Aces, No 6)

Of all the fronts fought on by the Jagdflieger during World War 2, the Russian, or Eastern, was easily the most lucrative in terms of targets for the experten. Marry an abundance of targets with the Luftwaffe’s best piston-engined fighter of the war – Focke-Wulf’s Fw 190 ‘Butcher Bird’ – and it quickly...

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

Computers Under Attack: Intruders, Worms and Viruses
Computers Under Attack: Intruders, Worms and Viruses

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The...

WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Warfare and Weaponry in Dynastic Egypt
Warfare and Weaponry in Dynastic Egypt

Defence. Attack. Symbolism. The development of warfare in any society provides an evocative glance into the lives (and deaths) of our predecessors. This is never more the case than with that most enticing of ancient civilizations, Ancient Egypt. Follow Rebecca Dean through the fascinating world of mysterious figures such as...

Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy