Home | Amazing | Today | Tags | Publishers | Years | Search 
Android Hacker's Handbook
Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...

Starting and Managing a Nonprofit Organization: A Legal Guide
Starting and Managing a Nonprofit Organization: A Legal Guide

Nuts-and-bolts guidance on the laws, rules, and regulations governing the nonprofit sector—from leading nonprofit law expert, Bruce R. Hopkins

Nonprofits must comply with stringent federal and state laws due to their special tax-exempt status; the government's ultimate threat is revocation of a nonprofit's...

Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)
Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Practical Aviation Security, Second Edition: Predicting and Preventing Future Threats (Butterworth-Heinemann Homeland Security)
Practical Aviation Security, Second Edition: Predicting and Preventing Future Threats (Butterworth-Heinemann Homeland Security)

The second edition of Practical Aviation Security is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today. The tip-of-the-spear technologies that are shaping the future are also addressed.

...
Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Sustainable Technology Development
Sustainable Technology Development

In the time it takes to read this sentence, about fifteen people will be added to the world's population.  Read the sentence again, and there will be thirty. Tomorrow, each of these people will be demanding greater prosperity. Production and consumption are increasing fast but will have to grow even faster in the future to keep up...

Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling
Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling

"You have a lot of enemies, Hipolito. I heard rumors in jail that some of the people you busted are going to try to kill you, so you better watch yourself." U.S. Special Agent Hipolito Acosta had put lots of thugs in jail, but the death threat from an imprisoned convict was still a shock.


Acosta recounts
...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy