Filter
(found 8683 products)
Book cover image
From Russia's tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists. Cheap to acquire, easily deniable, and used for a variety of malicious purposes - from crippling infrastructure to sowing discord and doubt ...
The Perfect Weapon: war, sabotage, and fear in the cyber age
From Russia's tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists. Cheap to acquire, easily deniable, and used for a variety of malicious purposes - from crippling infrastructure to sowing discord and doubt - cyberweapons are re-writing the rules of warfare. In less than a decade, they have displaced terrorism and nuclear missiles as the biggest immediate threat to international security and to democracy. Here, New York Times correspondent David E. Sanger takes us from the White House Situation Room to the dens of Chinese government hackers and the boardrooms of Silicon Valley, piecing together a remarkable picture of a world now coming face-to-face with the most sophisticated - and arguably most dangerous - weapon ever invented. The Perfect Weapon is the dramatic story of a new era of constant sabotage, misinformation, and fear, in which everyone is a target.
https://magrudy-assets.storage.googleapis.com/9781911617723.jpg
25.58 USD

The Perfect Weapon: war, sabotage, and fear in the cyber age

by David Sanger
Paperback
Book cover image
Secure your CISSP certification! If you're a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass the exam. Plus, you'll get tips on ...
CISSP For Dummies
Secure your CISSP certification! If you're a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass the exam. Plus, you'll get tips on setting up a 60-day study plan, tips for exam day, and access to an online test bank of questions. CISSP For Dummies is fully updated and reorganized to reflect upcoming changes (ISC)2 has made to the Common Body of Knowledge. Complete with access to an online test bank this book is the secret weapon you need to pass the exam and gain certification. Get key information for all eight exam domains Find test-taking and exam-day tips and tricks Benefit from access to free online practice questions and flash cards Prepare for the CISSP certification in 2018 and beyond You've put in the time as a security professional--and now you can reach your long-term goal of CISSP certification.
https://magrudy-assets.storage.googleapis.com/9781119505815.jpg
61.41 USD

CISSP For Dummies

by Peter H. Gregory, Lawrence C. Miller
Paperback
Book cover image
This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC) CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition with an all new collection of Practice Exams to give you the best preparation ever for the high-stakes CISSP Exam. (ISC) CISSP Study Guide, 8th ...
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8e & CISSP Official (ISC)2 Practice Tests, 2e
This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC) CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition with an all new collection of Practice Exams to give you the best preparation ever for the high-stakes CISSP Exam. (ISC) CISSP Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes four unique 250 question practice exams to help you identify where you need to study more, more than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam, a searchable glossary in PDF to give you instant access to the key terms you need to know for the exam. Add to that the all-new (ISC) CISSP Certified Information Systems Security Professional Official Practice Tests, 2nd edition with 2 more complete 250-question exams and another 100 questions for each of the 8 domains and you'll be as ready as you can be for the CISSP exam. Coverage of all of the exam topics in each book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security
https://magrudy-assets.storage.googleapis.com/9781119523260.jpg
94.500000 USD

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8e & CISSP Official (ISC)2 Practice Tests, 2e

by Darril Gibson, James Michael Stewart, David Seidl, Mike Chapple
Paperback
Book cover image
Develop blockchain application with step-by-step instructions, working example and helpful recommendations Key Features Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deployment of blockchain based applications Book DescriptionBlockchain technology is being welcomed as one of the most revolutionary and impactful ...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Develop blockchain application with step-by-step instructions, working example and helpful recommendations Key Features Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deployment of blockchain based applications Book DescriptionBlockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the world's most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value. This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solutions. Toward the end of the book, you will also encounter some real-world deployment examples of Blockchain in security cases, and also understand the short-term challenges and future of cybersecurity with Blockchain. What you will learn Understand the cyberthreat landscape Learn about Ethereum and Hyperledger Blockchain Program Blockchain solutions Build Blockchain-based apps for 2FA, and DDoS protection Develop Blockchain-based PKI solutions and apps for storing DNS entries Challenges and the future of cybersecurity and Blockchain Who this book is forThe book is targeted towards security professionals, or any stakeholder dealing with cybersecurity who wants to understand the next-level of securing infrastructure using Blockchain. Basic understanding of Blockchain can be an added advantage.
https://magrudy-assets.storage.googleapis.com/9781788990189.jpg
47.240000 USD

Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

by Rajneesh Gupta
Paperback
Book cover image
Learn to evaluate and compare data encryption methods and attack cryptographic systems Key Features Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems Book DescriptionCryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. ...
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Learn to evaluate and compare data encryption methods and attack cryptographic systems Key Features Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems Book DescriptionCryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption. What you will learn Protect data with encryption and hashing Explore and compare various encryption methods Encrypt data using the Caesar Cipher technique Make hashes and crack them Learn how to use three NIST-recommended systems: AES, SHA, and RSA Understand common errors in encryption and exploit them Who this book is forHands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.
https://magrudy-assets.storage.googleapis.com/9781789534443.jpg
31.490000 USD

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

by Samuel Bowne
Paperback
Book cover image
This book constitutes the thoroughly refereed proceedings of the 6th International Conference on Data Management Technologies and Applications, DATA 2017, held in Madrid, Spain, in July 2017. The 13 revised full papers were carefully reviewed and selected from 66 submissions. The papers deal with the following topics: databases, big data, ...
Data Management Technologies and Applications: 6th International Conference, DATA 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Papers
This book constitutes the thoroughly refereed proceedings of the 6th International Conference on Data Management Technologies and Applications, DATA 2017, held in Madrid, Spain, in July 2017. The 13 revised full papers were carefully reviewed and selected from 66 submissions. The papers deal with the following topics: databases, big data, data mining, data management, data security, and other aspects of information systems and technology involving advanced applications of data.
https://magrudy-assets.storage.googleapis.com/9783319948089.jpg
89.240000 USD

Data Management Technologies and Applications: 6th International Conference, DATA 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Papers

Paperback
Book cover image
The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones ...
Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution
The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones and home security systems who are often unaware of the dangers and the privacy threats around them. The Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution is a critical scholarly resource that creates awareness of the severity of cyber information threats on personal, business, governmental, and societal levels. The book explores topics such as social engineering in information security, threats to cloud computing, and cybersecurity resilience during the time of the Fourth Industrial Revolution. As a source that builds on available literature and expertise in the field of information technology and security, this publication proves useful for academicians, educationalists, policy makers, government officials, students, researchers, and business leaders and managers.
https://magrudy-assets.storage.googleapis.com/9781522547631.jpg
362.250000 USD

Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution

Hardback
Book cover image
Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and balance them to meet the ...
Hands-on Incident Response and Digital Forensics
Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and balance them to meet the needs of an organisation in the event of an information security incident. Best practice tips and real-life examples are included throughout.
https://magrudy-assets.storage.googleapis.com/9781780174204.jpg
44.090000 USD

Hands-on Incident Response and Digital Forensics

by Mike Sheward
Paperback
Book cover image
This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses in contrast to conventional Quantum Key Distribution techniques. Most of the techniques presented in this book do not need conventional encryption. Furthermore, the book presents a technique whereby any symmetric key can be securely transferred using ...
Multi-photon Quantum Secure Communication
This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses in contrast to conventional Quantum Key Distribution techniques. Most of the techniques presented in this book do not need conventional encryption. Furthermore, the book presents a technique whereby any symmetric key can be securely transferred using the polarization channel of an optical fiber for conventional data encryption. The work presented in this book has largely been practically realized, albeit in a laboratory environment, to offer proof of concept rather than building a rugged instrument that can withstand the rigors of a commercial environment.
https://magrudy-assets.storage.googleapis.com/9789811086175.jpg
178.490000 USD

Multi-photon Quantum Secure Communication

by Kam Wai Clifford Chan, Mayssaa El Rifai, Pramode K. Verma
Hardback
Book cover image
This book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018. The 15 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are ...
Trust, Privacy and Security in Digital Business: 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings
This book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018. The 15 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: Permission models and cloud, privacy, proactive security measures, and cyber physical systems.
https://magrudy-assets.storage.googleapis.com/9783319983844.jpg
73.490000 USD

Trust, Privacy and Security in Digital Business: 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings

Paperback / softback
Book cover image
This book presents conjectural advances in big data analysis, machine learning and computational intelligence, as well as their potential applications in scientific computing. It discusses major issues pertaining to big data analysis using computational intelligence techniques, and the conjectural elements are supported by simulation and modelling applications to help address ...
Data Science and Big Data Analytics: ACM-WIR 2018
This book presents conjectural advances in big data analysis, machine learning and computational intelligence, as well as their potential applications in scientific computing. It discusses major issues pertaining to big data analysis using computational intelligence techniques, and the conjectural elements are supported by simulation and modelling applications to help address real-world problems. An extensive bibliography is provided at the end of each chapter. Further, the main content is supplemented by a wealth of figures, graphs, and tables, offering a valuable guide for researchers in the field of big data analytics and computational intelligence.
https://magrudy-assets.storage.googleapis.com/9789811076404.jpg
230.990000 USD

Data Science and Big Data Analytics: ACM-WIR 2018

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The ...
Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings
This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on administration, access control policies, privacy-preserving access and computation, integrity and user interaction, security analysis and private evaluation, fixing vulnerabilities, and networked systems.
https://magrudy-assets.storage.googleapis.com/9783319957289.jpg
83.990000 USD

Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings

Paperback / softback
Book cover image
This, the 37th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five revised selected regular papers. Topics covered include data security in clouds, privacy languages, probabilistic modelling in linked data integration, business intelligence based on multi-agent systems, collaborative filtering, and prediction accuracy.
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII
This, the 37th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five revised selected regular papers. Topics covered include data security in clouds, privacy languages, probabilistic modelling in linked data integration, business intelligence based on multi-agent systems, collaborative filtering, and prediction accuracy.
https://magrudy-assets.storage.googleapis.com/9783662579312.jpg
62.990000 USD

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII

Paperback / softback
Book cover image
This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system ...
Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness
This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective internal controls. By addressing the practitioner in the field, it provides tangible, cost effective and thus pragmatic means to mitigate key risks whilst leveraging built-in cloud capabilities and overarching principles of effective system design.
https://magrudy-assets.storage.googleapis.com/9781482259780.jpg
105.78 USD

Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness

by Chong Ee
Hardback
Book cover image
As digital collections continue to grow, the underlying technologies to serve up content also continue to expand and develop. As such, new challenges are presented whichcontinue to test ethical ideologies in everyday environs of the practitioner. There are currently no solid guidelines or overarching codes of ethics to address such ...
Framing Privacy in Digital Collections with Ethical Decision Making
As digital collections continue to grow, the underlying technologies to serve up content also continue to expand and develop. As such, new challenges are presented whichcontinue to test ethical ideologies in everyday environs of the practitioner. There are currently no solid guidelines or overarching codes of ethics to address such issues. The digitization of modern archival collections, in particular, presents interesting conundrums when factors of privacy are weighed and reviewed in both small and mass digitization initiatives. Ethical decision making needs to be present at the onset of project planning in digital projects of all sizes, and we also need to identify the role and responsibility of the practitioner to make more virtuous decisions on behalf of those with no voice or awareness of potential privacy breaches. In this book, notions of what constitutes private information are discussed, as is the potential presence of such information in both analog and digital collections. This book lays groundwork to introduce the topic of privacy within digital collections by providing some examples from documented real-world scenarios and making recommendations for future research. A discussion of the notion privacy as concept will be included, as well as some historical perspective (with perhaps one the most cited work on this topic, for example, Warren and Brandeis' Right to Privacy, 1890). Concepts from the The Right to Be Forgotten case in 2014 (Google Spain SL, Google Inc. v Agencia Espanola de Proteccion de Datos, Mario Costeja Gonzalez) are discussed as to how some lessons may be drawn from the response in Europe and also how European data privacy laws have been applied. The European ideologies are contrasted with the Right to Free Speech in the First Amendment in the U.S., highlighting the complexities in setting guidelines and practices revolving around privacy issues when applied to real life scenarios. Two ethical theories are explored: Consequentialism and Deontological. Finally, ethical decision making models will also be applied to our framework of digital collections. Three case studies are presented to illustrate how privacy can be defined within digital collections in some real-world examples.
https://magrudy-assets.storage.googleapis.com/9781681734019.jpg
47.200000 USD

Framing Privacy in Digital Collections with Ethical Decision Making

by Virginia Dressler
Paperback / softback
Book cover image
A compelling overview of the systems and strategies that have been implemented to safeguard U.S. resources from a plethora of threats, the vulnerabilities and security gaps in these infrastructure systems, and options to enable the future security of the homeland. * Provides a timely, relevant work that is crucial to ...
Homeland Security and Critical Infrastructure Protection, 2nd Edition
A compelling overview of the systems and strategies that have been implemented to safeguard U.S. resources from a plethora of threats, the vulnerabilities and security gaps in these infrastructure systems, and options to enable the future security of the homeland. * Provides a timely, relevant work that is crucial to understanding the current state of U.S. critical infrastructure security and resilience (CISR) * Offers a comprehensive examination of foundations and contemporary issues within CISR, using various real-world incidents as focusing events * Analyzes the 16 critical infrastructure sectors for purposes of comparison, analysis, and discussion * Investigates various threats and hazards-manmade, natural, and technological-that specifically affect CISR * Summarizes updated federal legislation and doctrine in a clear and concise manner * Overviews academic, training, and career preparedness resources for those interested in the field * Includes learning objectives, key terms, and discussion questions in each chapter to facilitate the book's use in an academic environment
https://magrudy-assets.storage.googleapis.com/9781440853951.jpg
78.750000 USD

Homeland Security and Critical Infrastructure Protection, 2nd Edition

by Brian K. Simpkins, Ryan K. Baggett
Hardback
Book cover image
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including ...
Electronic Voting: Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including experiences and revisions of the real uses of E-voting systems and corresponding processes in elections.
https://magrudy-assets.storage.googleapis.com/9783030004187.jpg
73.490000 USD

Electronic Voting: Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; ...
Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.
https://magrudy-assets.storage.googleapis.com/9783030004699.jpg
115.490000 USD

Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings

Paperback / softback
Book cover image
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such ...
Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.
https://magrudy-assets.storage.googleapis.com/9783319990729.jpg
104.990000 USD

Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I

Paperback / softback
Book cover image
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux. About This Book * Unlock the pain points of identifying vulnerabilities in your system using Kali Linux 2018.02. *Learn the art of exploiting 32 and 64 bit Windows kernel drivers. ...
Hands-On Penetration Testing on Windows: Unleashing Kali Linux, PowerShell and Windows debugging tools for security testing and analysis
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux. About This Book * Unlock the pain points of identifying vulnerabilities in your system using Kali Linux 2018.02. *Learn the art of exploiting 32 and 64 bit Windows kernel drivers. *Learn several bypassing techniques, to gain control of your Windows environment. Who This Book Is For This book is aimed at penetration testers, ethical hackers, and individuals breaking into the pen testing role after demonstrating advanced skill in boot camps. Prior experience with Windows exploitation, Kali Linux and some of the Windows debugging tools would be necessary. What You Will Learn * Learn advanced Pentesting techniques with Kali Linux. *Gain an understanding of Kali Linux tools and methods from behind the scenes. *Learn how to use Kali Linux at an advanced level. *Exploit 32 and 64 bit Windows kernel drivers. *Understand advanced Windows concepts and protections, and how to bypass them using Kali Linux. *Learn windows exploitation techniques like stack and heap overflows and kernel exploitation, through coding principles. In Detail Windows has always been a go-to platform for users around the globe to perform administration or ad-hoc tasks and managing its security has spawned the discipline of IT security. Readers will learn advanced techniques for attacking Windows environments from the indispensable toolkit, Kali Linux. Moving from core network hacking concepts, through advanced Windows exploitation techniques like stack and heap overflows and kernel exploitation, through coding principles that will allow you to leverage powerful Python scripts and shellcode, and then wrapping up with post-exploitation strategies that allow you to go deeper and keep your access, this book will allow you to distinguish yourself from your clients. Later this book will also teach our reader's the pentesting techniques like precision heap spraying and bypassing EMET (Enhanced Mitigation Experience Toolkit). Finally, this book will also cover 64 and 32 bit Windows kernel driver exploitation along with kernel pool exploitation. By the end of this book, our readers will be well versed in identifying vulnerabilities within the Windows OS and developing the desired solution for it.
https://magrudy-assets.storage.googleapis.com/9781788295666.jpg
47.240000 USD

Hands-On Penetration Testing on Windows: Unleashing Kali Linux, PowerShell and Windows debugging tools for security testing and analysis

by Bo Weaver, Wolf Halton
Paperback
Book cover image
Simplified Python programming for Bitcoin and blockchain Key Features Build Bitcoin applications in Python with the help of simple examples Mine Bitcoins, program Bitcoin-enabled APIs and transaction graphs, and build trading bots Analyze Bitcoin transactions and produce visualizations using Python data analysis tools Book DescriptionBitcoin is a cryptocurrency that's changing ...
Hands-On Bitcoin Programming with Python: Build powerful online payment centric applications with Python
Simplified Python programming for Bitcoin and blockchain Key Features Build Bitcoin applications in Python with the help of simple examples Mine Bitcoins, program Bitcoin-enabled APIs and transaction graphs, and build trading bots Analyze Bitcoin transactions and produce visualizations using Python data analysis tools Book DescriptionBitcoin is a cryptocurrency that's changing the face of online payments. Hands-On Bitcoin Programming with Python teaches you to build software applications for mining and creating Bitcoins using Python. This book starts with the basics of both Bitcoin and blockchain and gives you an overview of these inherent concepts by showing you how to build Bitcoin-driven applications with Python. Packed with clear instructions and practical examples, you will learn to understand simple Python coding examples that work with this cryptocurrency. By the end of the book, you'll be able to mine Bitcoins, accept Bitcoin payments on the app, and work with the basics of blockchain technology to create simply distributed ledgers. What you will learn Master the Bitcoin APIs in Python to manipulate Bitcoin from your Python apps Build your own Bitcoin trading bots to buy Bitcoins at a lower price and sell them at a higher price Write scripts to process Bitcoin payments through a website or app Develop software for Bitcoin mining to create Bitcoin currency on your own computer hardware Create your own keys, addresses, and wallets in Python code Write software to analyze Bitcoin transactions and produce reports, graphs, and other visualizations Who this book is forHands-On Bitcoin Programming with Python consists of examples that will teach you to build your own Bitcoin application. You will learn to write scripts, build software for mining, and create Bitcoins using Python. Anyone with prior Python experience, who wants to explore Python Bitcoin programming and start building Bitcoin-driven Python apps, will find this book useful.
https://magrudy-assets.storage.googleapis.com/9781789537000.jpg
25.190000 USD

Hands-On Bitcoin Programming with Python: Build powerful online payment centric applications with Python

by Harish Kumar Garg
Paperback / softback
Book cover image
ADVANCES IN DIGITAL FORENSICS XIV Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. ...
Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers
ADVANCES IN DIGITAL FORENSICS XIV Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XIV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues; Forensic Techniques; Network Forensics; Cloud Forensics; and Mobile and Embedded Device Forensics. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of nineteen edited papers from the Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India in the winter of 2018. Advances in Digital Forensics XIV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
https://magrudy-assets.storage.googleapis.com/9783319992761.jpg
125.990000 USD

Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers

Hardback
Book cover image
This book constitutes the refereed proceedings of the 19th International Conference on Engineering Applications of Neural Networks, EANN 2018, held in Bristol, UK, in September 2018. The 16 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in ...
Engineering Applications of Neural Networks: 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings
This book constitutes the refereed proceedings of the 19th International Conference on Engineering Applications of Neural Networks, EANN 2018, held in Bristol, UK, in September 2018. The 16 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on activity recognition, deep learning, extreme learning machine, machine learning applications, predictive models, fuzzy and recommender systems, recurrent neural networks, spiking neural networks.
https://magrudy-assets.storage.googleapis.com/9783319982038.jpg
89.240000 USD

Engineering Applications of Neural Networks: 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings

Paperback
Book cover image
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't ...
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data-just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes: Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra Expanded coverage on mobile device safety Expanded coverage on safety for kids online More than 150 tips with complete step-by-step instructions and pictures What You'll Learn Solve your password problems once and for all Browse the web safely and with confidence Block online tracking and dangerous ads Choose the right antivirus software for you Send files and messages securely Set up secure home networking Conduct secure shopping and banking online Lock down social media accounts Create automated backups of all your devices Manage your home computers Use your smartphone and tablet safely Safeguard your kids online And more! Who This Book Is For Those who use computers and mobile devices, but don't really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves-step by step, without judgment, and with as little jargon as possible.
https://magrudy-assets.storage.googleapis.com/9781484238516.jpg
39.890000 USD

Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

by Carey Parker
Paperback / softback
Book cover image
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers ...
Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
https://magrudy-assets.storage.googleapis.com/9783319991351.jpg
104.990000 USD

Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings

Paperback / softback
Book cover image
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized ...
Advances in Cryptology - CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
https://magrudy-assets.storage.googleapis.com/9783319968773.jpg
136.490000 USD

Advances in Cryptology - CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III

Paperback / softback
Book cover image
The book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23-25, 2018. It comprises high-quality research by academics and industrial experts in the field of computing and ...
Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 2
The book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23-25, 2018. It comprises high-quality research by academics and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, case studies related to all the areas of data mining, machine learning, IoT and information security.
https://magrudy-assets.storage.googleapis.com/9789811314971.jpg
472.490000 USD

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 2

Paperback / softback
Book cover image
This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can't. A particular focus is presented on establishing sound forensic thinking and methodology, supported by ...
Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications
This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can't. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries. Topics and features: introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment; discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes; offers a practical overview of common practices for cracking encrypted data; reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them; presents a survey of various different search techniques, and several forensic tools that are available for free; examines the functions of AccessData Forensic Toolkit and Registry Viewer; proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled; describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility; provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube. This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector.
https://magrudy-assets.storage.googleapis.com/9783319963181.jpg
52.490000 USD

Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications

by Joakim Kavrestad
Paperback
Book cover image
Enhance file system security and learn about network attack, security tools and different versions of Linux build. Key Features Hands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use various security tools and different versions of Linux for different ...
Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition
Enhance file system security and learn about network attack, security tools and different versions of Linux build. Key Features Hands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use various security tools and different versions of Linux for different tasks Book DescriptionOver the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security flaws, and these security flaws allow attackers to get into your system and modify or even destroy your important data. But there's no need to panic, since there are various mechanisms by which these flaws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system. With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patching Bash vulnerability, packet filtering, handling incidents, and monitoring system logs. Finally, you will learn about auditing using system services and performing vulnerability scanning on Linux. By the end of this book, you will be able to secure your Linux systems and create a robust environment. What you will learn Learn about vulnerabilities and exploits in relation to Linux systems Configure and build a secure kernel and test it Learn about file permissions and how to securely modify files Authenticate users remotely and securely copy files on remote systems Review different network security methods and tools Perform vulnerability scanning on Linux machines using tools Learn about malware scanning and read through logs Who this book is forThis book is intended for all those Linux users who already have knowledge of Linux file systems and administration. You should be familiar with basic Linux commands. Understanding information security and its risks to a Linux system is also helpful in understanding the recipes more easily.
https://magrudy-assets.storage.googleapis.com/9781789138399.jpg
47.240000 USD

Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition

by Tajinder Kalsi
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the Third International Workshop on Simulation and Synthesis in Medical Imaging, SASHIMI 2018, held in conjunction with MICCAI 2018, in Granada, Spain, in September 2018. The 14 full papers presented were carefully reviewed and selected from numerous submissions. This workshop continues to provide ...
Simulation and Synthesis in Medical Imaging: Third International Workshop, SASHIMI 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Proceedings
This book constitutes the refereed proceedings of the Third International Workshop on Simulation and Synthesis in Medical Imaging, SASHIMI 2018, held in conjunction with MICCAI 2018, in Granada, Spain, in September 2018. The 14 full papers presented were carefully reviewed and selected from numerous submissions. This workshop continues to provide a state-of-the-art and integrative perspective on simulation and synthesis in medical imaging for the purpose of invigorating research and stimulating new ideas on how to build theoretical links, practical synergies, and best practices between these two research directions.
https://magrudy-assets.storage.googleapis.com/9783030005351.jpg
62.990000 USD

Simulation and Synthesis in Medical Imaging: Third International Workshop, SASHIMI 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Proceedings

Paperback / softback
Page 1 of 40