 |
|
 The CISSP Prep Guide: Mastering the Ten Domains of Computer SecurityA one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination
The CISSP Prep Guide
From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can... |  |  Security Engineering: A Guide to Building Dependable Distributed Systems"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier
"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,... |  |  24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with... |
|
 Securing Wireless Communications at the Physical LayerThe book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the physical layer.
The area of physical... |  |  The Arithmetic of Elliptic Curves (Graduate Texts in Mathematics)The theory of elliptic curves is distinguished by its long history and by the diversity of the methods that have been used in its study. This book treats the arithmetic theory of elliptic curves in its modern formulation, through the use of basic algebraic number theory and algebraic geometry. The book begins with a brief discussion of the... |  |  Security on Rails
The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it... |
|
|
 Arithmetic Optimization Techniques for Hardware and Software Design
Obtain better system performance, lower energy consumption, and avoid hand-coding arithmetic functions with this concise guide to automated optimization techniques for hardware and software design. High-level compiler optimizations and high-speed architectures for implementing FIR filters are covered, which can improve performance in... |  |  Android Application Security Essentials
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.
Overview
-
Understand Android security from kernel to the application layer
-
Protect...
|  |  Network and System Security, Second Edition
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of... |
|
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |