This book takes a novel approach to the presentation and understanding of a controversial topic in
modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals
wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was
a later version of the term,...
Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...
Cloud computing is often described as providing computing resources the way electric utilities provide energy. In theory, anyone with an adequate connection to the Internet should be able to tap into a cloud provider and get exactly the computing resources they want when they want it, just like plugging into the electricity grid and...
As global networks expand the interconnection of the world’s information systems, the
smooth operation of communication and computing solutions becomes vital. However,
recurring events such as virus and worm attacks and the success of criminal attackers illustrate
the weaknesses in current information technologies and the...
Whether an international corporation or a small business, developing and utilizing
a Business Continuity Management (BCM) Plan protects companies and
their personnel, facilities, materials, and activities from the broad spectrum of risks
that face businesses and government agencies on a daily basis, whether at home or...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.
Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,...
Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...
Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the
two together and write a book? Well, surely there will be some individuals that may make that
assumption as to the motivation behind the publication of this book. The real motivation behind
the development of this book is because...
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest...
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply...