Home | Amazing | Today | Tags | Publishers | Years | Search 
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark

You are holding the proceedings of FSE 2011, the 18th International Workshop on Fast Software Encryption. This workshop was organized in cooperation with the International Association for Cryptologic Research. It was held in Lyngby, Denmark, during February 13–16, 2011.

The FSE 2011 Program Committee (PC) consisted of...

Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Mobile and Wireless Network Security and Privacy
Mobile and Wireless Network Security and Privacy

Currently the mobile wireless technology is experiencing rapid growth. However the major challenge for deployment of this technology with its special characteristics is securing the existing and future vulnerabilities. Major security and privacy issues for standard wireless networks include the authentication of wireless clients and...

Focke-Wulf Fw 190 Aces of the Russian Front (Osprey Aircraft of the Aces, No 6)
Focke-Wulf Fw 190 Aces of the Russian Front (Osprey Aircraft of the Aces, No 6)

Of all the fronts fought on by the Jagdflieger during World War 2, the Russian, or Eastern, was easily the most lucrative in terms of targets for the experten. Marry an abundance of targets with the Luftwaffe’s best piston-engined fighter of the war – Focke-Wulf’s Fw 190 ‘Butcher Bird’ – and it quickly...

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy