Filter
(found 11883 products)
Book cover image
This book constitutes the refereed proceedings of the 14th International Symposium on Visual Computing, ISVC 2019, held in Lake Tahoe, NV, USA in October 2019. The 100 papers presented in this double volume were carefully reviewed and selected from 163 submissions. The papers are organized into the following topical sections: ...
Advances in Visual Computing: 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7-9, 2019, Proceedings, Part I
This book constitutes the refereed proceedings of the 14th International Symposium on Visual Computing, ISVC 2019, held in Lake Tahoe, NV, USA in October 2019. The 100 papers presented in this double volume were carefully reviewed and selected from 163 submissions. The papers are organized into the following topical sections: Deep Learning I; Computer Graphics I; Segmentation/Recognition; Video Analysis and Event Recognition; Visualization; ST: Computational Vision, AI and Mathematical methods for Biomedical and Biological Image Analysis; Biometrics; Virtual Reality I; Applications I; ST: Vision for Remote Sensing and Infrastructure Inspection; Computer Graphics II; Applications II; Deep Learning II; Virtual Reality II; Object Recognition/Detection/Categorization; and Poster.
https://magrudy-assets.storage.googleapis.com/9783030337193.jpg
115.490000 USD

Advances in Visual Computing: 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7-9, 2019, Proceedings, Part I

Paperback / softback
Book cover image
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP exam Thoroughly revised for the ...
CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP exam Thoroughly revised for the 2019 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge, as established both by CSA and the (ISC)2. The book offers clear explanations of every subject on the brand-new CCSP exam and features accurate practice questions and real-world examples. Written by a respected computer security expert, CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition is both a powerful study tool and a valuable reference that will serve professionals long after the test. To aid in self-study, each chapter includes exam tips that highlight key information, a summary that serves as a quick review of salient points, and practice questions that allow you to test your comprehension. Notes, Tips, and Cautions throughout provide insight and call out potentially harmful situations. *All practice questions match the tone, content, and format of those on the actual exam*Electronic content includes 300+ practice questions *Written by an IT security expert with 20 years of experience
https://magrudy-assets.storage.googleapis.com/9781260456929.jpg
57.750000 USD

CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition

by Daniel Carter
Paperback / softback
Book cover image
A curated collection of HBR's latest thinking on blockchain. Curates the latest and most important thinking on blockchain--a topic that all leaders and managers need to be up to speed with and conversant on. Provides a range of diverse contributors and viewpoints with clear takeaways. From foundational basics to research ...
Blockchain: The Insights You Need from Harvard Business Review
A curated collection of HBR's latest thinking on blockchain. Curates the latest and most important thinking on blockchain--a topic that all leaders and managers need to be up to speed with and conversant on. Provides a range of diverse contributors and viewpoints with clear takeaways. From foundational basics to research to use cases--all with HBR's quality and rigor. Introduces readers to the topic. Provides the essential basics and prepares them for more in-depth engagement. Provides intermediates with a refresher on the basics of the topic and extends their knowledge with HBR's most cutting-edge, forward-looking, and provocative content on the topic. Answers the question What does HBR have to say about blockchain? for customers who have read authored books on the topic. Features an introduction, tying the book together, from one of HBR's leading experts on the topic. Executive summaries and key points bullets to give readers immediate takeaways. Audience: Leaders and managers who need to get up to speed, quickly, on what they need to know about Blockchain. Leaders who need to understand the basics of Blockchain, know what the options are when they're considering adopting blockchain-based technology, keep up with their competitors and colleagues, and reinvent their business for the future.
https://magrudy-assets.storage.googleapis.com/9781633697911.jpg
27.88 USD

Blockchain: The Insights You Need from Harvard Business Review

by Karim R. Lakhani, Marco Iansiti, Don Tapscott, Harvard Business Review
Paperback / softback
Book cover image
The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments The revised and updated second edition of Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity. Written by an experienced cybersecurity lawyer and law professor, ...
Cybersecurity Law
The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments The revised and updated second edition of Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity. Written by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information that reflects the latest changes in laws and regulations. The book includes material on recent FTC data security consent decrees and data breach litigation. Topics covered reflect new laws, regulations, and court decisions that address financial sector cybersecurity, the law of war as applied to cyberspace, and recently updated guidance for public companies' disclosure of cybersecurity risks. This important guide: Provides a new appendix, with 15 edited opinions covering a wide range of cybersecurity-related topics, for students learning via the caselaw method Includes new sections that cover topics such as: compelled access to encrypted devices, New York's financial services cybersecurity regulations, South Carolina's insurance sector cybersecurity law, the Internet of Things, bug bounty programs, the vulnerability equities process, international enforcement of computer hacking laws, the California Consumer Privacy Act, and the European Union's Network and Information Security Directive Contains a new chapter on the critical topic of law of cyberwar Presents a comprehensive guide written by a noted expert on the topic Offers a companion Instructor-only website that features discussion questions for each chapter and suggested exam questions for each chapter Written for students and professionals of cybersecurity, cyber operations, management-oriented information technology (IT), and computer science, Cybersecurity Law, Second Edition is the up-to-date guide that covers the basic principles and the most recent information on cybersecurity laws and regulations. JEFF KOSSEFF is Assistant Professor of Cybersecurity Law at the United States Naval Academy in Annapolis, Maryland. He was a finalist for the Pulitzer Prize, and a recipient of the George Polk Award for national reporting.
https://magrudy-assets.storage.googleapis.com/9781119517207.jpg
120.750000 USD

Cybersecurity Law

by Jeff Kosseff
Hardback
Book cover image
This book explores a wide range of topics in digital ethics. It features 11 chapters that analyze the opportunities and the ethical challenges posed by digital innovation, delineate new approaches to solve them, and offer concrete guidance to harness the potential for good of digital technologies. The contributors are all ...
The 2018 Yearbook of the Digital Ethics Lab
This book explores a wide range of topics in digital ethics. It features 11 chapters that analyze the opportunities and the ethical challenges posed by digital innovation, delineate new approaches to solve them, and offer concrete guidance to harness the potential for good of digital technologies. The contributors are all members of the Digital Ethics Lab (the DELab), a research environment that draws on a wide range of academic traditions. The chapters highlight the inherently multidisciplinary nature of the subject, which cannot be separated from the epistemological foundations of the technologies themselves or the political implications of the requisite reforms. Coverage illustrates the importance of expert knowledge in the project of designing new reforms and political systems for the digital age. The contributions also show how this task requires a deep self-understanding of who we are as individuals and as a species. The questions raised here have ancient -- perhaps even timeless -- roots. The phenomena they address may be new. But, the contributors examine the fundamental concepts that undergird them: good and evil, justice and truth. Indeed, every epoch has its great challenges. The role of philosophy must be to redefine the meaning of these concepts in light of the particular challenges it faces. This is true also for the digital age. This book takes an important step towards redefining and re-implementing fundamental ethical concepts to this new era.
https://magrudy-assets.storage.googleapis.com/9783030171513.jpg
104.990000 USD

The 2018 Yearbook of the Digital Ethics Lab

Hardback
Book cover image
The instant New York Times bestseller 'A clear, compelling guide to some of the most pressing debates in technology today.' Bill Gates, from the foreword 'The de facto ambassador for the technology industry at large.' The New York Times 'One of the few executives willing to speak openly about the ...
Tools and Weapons: The Promise and The Peril of the Digital Age
The instant New York Times bestseller 'A clear, compelling guide to some of the most pressing debates in technology today.' Bill Gates, from the foreword 'The de facto ambassador for the technology industry at large.' The New York Times 'One of the few executives willing to speak openly about the industry's most vexing issues.' Sunday Times __________ Microsoft President Brad Smith operates by a simple core belief: when your technology changes the world, you bear a responsibility to help address the world you have helped create. This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformation holds great promise, we have reached an inflection point. The world has turned information technology into both a powerful tool and a formidable weapon, and new approaches are needed to manage an era defined by even more powerful inventions like artificial intelligence. Companies that create technology must accept greater responsibility for the future, and governments will need to regulate technology by moving faster and catching up with the pace of innovation. In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no pre-existing playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech's relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying Microsoft memoir, the book pulls back the curtain remarkably wide onto some of the company's most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort. From Microsoft's President and one of the tech industry's wisest thinkers, a frank and thoughtful reckoning with how to balance enormous promise and existential risk as the digitization of everything accelerates. __________ In Tools and Weapons, Brad Smith takes us behind the scenes on some of the biggest stories to hit the tech industry in the past decade and some of the biggest threats we face. From Edward Snowden's NSA leak to the NHS WannaCry ransomware attack, this book is essential reading to understand what's happening in the world around us. If you watched Inside Bill's Brain: Decoding Bill Gates on Netflix, you will find Tools and Weapons equally fascinating. 'This is a colourful and insightful insiders' view of how technology is both empowering us and threatening us. From privacy to cyberattacks, this timely book is a useful guide for how to navigate the digital future.' Walter Isaacson, bestselling author of Steve Jobs
https://magrudy-assets.storage.googleapis.com/9781529351576.jpg
25.75 USD

Tools and Weapons: The Promise and The Peril of the Digital Age

by Carol Ann Browne, Brad Smith
Paperback / softback
Book cover image
Faced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes ...
IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002
Faced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes and across industries, and deals with the strategic and operational aspects of information security. Now in its seventh edition, the bestselling IT Governance provides guidance for companies looking to protect and enhance their information security management systems (ISMS) and protect themselves against cyber threats. The new edition covers changes in global regulation, particularly GDPR, and updates to standards in the ISO/IEC 27000 family, BS 7799-3:2017 (information security risk management) and the latest standards on auditing. It also includes advice on the development and implementation of an ISMS that will meet the ISO 27001 specification and how sector-specific standards can and should be factored in. With information on risk assessments, compliance, equipment and operations security, controls against malware and asset management, IT Governance is the definitive guide to implementing an effective information security management and governance system.
https://magrudy-assets.storage.googleapis.com/9781789660302.jpg
220.500000 USD

IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002

by Steve Watkins, Alan Calder
Hardback
Book cover image
ADVANCES IN DIGITAL FORENSICS XIV Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. ...
Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers
ADVANCES IN DIGITAL FORENSICS XIV Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XIV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues; Forensic Techniques; Network Forensics; Cloud Forensics; and Mobile and Embedded Device Forensics. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of nineteen edited papers from the Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India in the winter of 2018. Advances in Digital Forensics XIV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
https://magrudy-assets.storage.googleapis.com/9783030075842.jpg
125.990000 USD

Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book draws on research into darknet cryptomarkets to examine themes of cybercrime, cybersecurity, illicit markets and drug use. Cybersecurity is increasingly seen as essential yet it is also a point of contention between citizens, states, non-governmental organisations and private corporations as each grapples with existing and developing technologies. The ...
The Darknet and Smarter Crime: Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy
This book draws on research into darknet cryptomarkets to examine themes of cybercrime, cybersecurity, illicit markets and drug use. Cybersecurity is increasingly seen as essential yet it is also a point of contention between citizens, states, non-governmental organisations and private corporations as each grapples with existing and developing technologies. The increased importance of privacy online has sparked concerns about the loss of confidentiality and autonomy in the face of state and corporate surveillance on one hand, and the creation of ungovernable spaces and the facilitation of terrorism and harassment on the other. These differences and disputes highlight the dual nature of the internet: allowing counter-publics to emerge and providing opportunities for state and corporate domination through control of the data infrastructure. The Darknet and Smarter Crime argues that, far from being a dangerous anarchist haven, the darknet and the technologies used within it could have benefits and significance for everyone online. This book engages with a number of debates about the internet and new communication technologies, including: surveillance and social control, anonymity and privacy, the uses and abuses of data encryption technologies and cyber-cultures and collective online identities
https://magrudy-assets.storage.googleapis.com/9783030265113.jpg
104.990000 USD

The Darknet and Smarter Crime: Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy

by Angus Bancroft
Hardback
Book cover image
The only official body of knowledge for SSCP--(ISC)2's popular credential for hands-on security professionals--fully revised and updated. Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. SSCP certification--fully compliant with ...
The Official (ISC)2 SSCP CBK Reference
The only official body of knowledge for SSCP--(ISC)2's popular credential for hands-on security professionals--fully revised and updated. Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. SSCP certification--fully compliant with U.S. Department of Defense Directive 8140 and 8570 requirements--is valued throughout the IT security industry. The Official (ISC)2 SSCP CBK Reference is the only official Common Body of Knowledge (CBK) available for SSCP-level practitioners, exclusively from (ISC)2, the global leader in cybersecurity certification and training. This authoritative volume contains essential knowledge practitioners require on a regular basis. Accurate, up-to-date chapters provide in-depth coverage of the seven SSCP domains: Access Controls; Security Operations and Administration; Risk Identification, Monitoring and Analysis; Incident Response and Recovery; Cryptography; Network and Communications Security; and Systems and Application Security. Designed to serve as a reference for information security professionals throughout their careers, this indispensable (ISC)2guide: Provides comprehensive coverage of the latest domains and objectives of the SSCP Helps better secure critical assets in their organizations Serves as a complement to the SSCP Study Guide for certification candidates The Official (ISC)2 SSCP CBK Reference is an essential resource for SSCP-level professionals, SSCP candidates and other practitioners involved in cybersecurity.
https://magrudy-assets.storage.googleapis.com/9781119601944.jpg
84.000000 USD

The Official (ISC)2 SSCP CBK Reference

by Mike Wills
Hardback
Book cover image
This book constitutes the refereed proceedings of the 6th International Conference on Advances in Visual Informatics, IVIC 2019, held in Bangi, Malaysia, in November 2019.The 65 papers presented were carefully reviewed and selected from 130 submissions. The papers are organized into the following topics: Visualization and Digital Innovation for Society ...
Advances in Visual Informatics: 6th International Visual Informatics Conference, IVIC 2019, Bangi, Malaysia, November 19-21, 2019, Proceedings
This book constitutes the refereed proceedings of the 6th International Conference on Advances in Visual Informatics, IVIC 2019, held in Bangi, Malaysia, in November 2019.The 65 papers presented were carefully reviewed and selected from 130 submissions. The papers are organized into the following topics: Visualization and Digital Innovation for Society 5.0; Engineering and Digital Innovation for Society 5.0; Cyber Security and Digital Innovation for Society 5.0; and Social Informatics and Application for Society 5.0.
https://magrudy-assets.storage.googleapis.com/9783030340315.jpg
125.990000 USD

Advances in Visual Informatics: 6th International Visual Informatics Conference, IVIC 2019, Bangi, Malaysia, November 19-21, 2019, Proceedings

Paperback / softback
Book cover image
This book constitutes the thoroughly refereed papers of the workshops held at the 9th International Conference on New Trends in Model and Data Engineering, MEDI 2019, in Toulouse, France, in October 2019. The 12 full and the three short workshop papers presented together with one invited paper were carefully reviewed ...
New Trends in Model and Data Engineering: MEDI 2019 International Workshops, DETECT, DSSGA, TRIDENT, Toulouse, France, October 28-31, 2019, Proceedings
This book constitutes the thoroughly refereed papers of the workshops held at the 9th International Conference on New Trends in Model and Data Engineering, MEDI 2019, in Toulouse, France, in October 2019. The 12 full and the three short workshop papers presented together with one invited paper were carefully reviewed and selected from 35 submissions. The papers are organized according to the 3 workshops: Workshop on Modeling, Verification and Testing of Dependable Critical systems, DETECT 2019, Workshop on Data Science for Social Good in Africa, DSSGA 2019, and Workshop on Security and Privacy in Models and Data, TRIDENT 2019.
https://magrudy-assets.storage.googleapis.com/9783030322120.jpg
89.240000 USD

New Trends in Model and Data Engineering: MEDI 2019 International Workshops, DETECT, DSSGA, TRIDENT, Toulouse, France, October 28-31, 2019, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and ...
Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.
https://magrudy-assets.storage.googleapis.com/9783030315108.jpg
62.990000 USD

Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings

Paperback / softback
Book cover image
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud ...
Security and Privacy for Big Data, Cloud Computing and Applications
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
https://magrudy-assets.storage.googleapis.com/9781785617478.jpg
162.750000 USD

Security and Privacy for Big Data, Cloud Computing and Applications

Hardback
Book cover image
Faced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes ...
IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002
Faced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes and across industries, and deals with the strategic and operational aspects of information security. Now in its seventh edition, the bestselling IT Governance provides guidance for companies looking to protect and enhance their information security management systems (ISMS) and protect themselves against cyber threats. The new edition covers changes in global regulation, particularly GDPR, and updates to standards in the ISO/IEC 27000 family, BS 7799-3:2017 (information security risk management) and the latest standards on auditing. It also includes advice on the development and implementation of an ISMS that will meet the ISO 27001 specification and how sector-specific standards can and should be factored in. With information on risk assessments, compliance, equipment and operations security, controls against malware and asset management, IT Governance is the definitive guide to implementing an effective information security management and governance system.
https://magrudy-assets.storage.googleapis.com/9780749496951.jpg
92.97 USD

IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002

by Steve Watkins, Alan Calder
Paperback / softback
Book cover image
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions ...
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.
https://magrudy-assets.storage.googleapis.com/9781119643326.jpg
35.31 USD

Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

by Jennifer Jin, Marcus J. Carey
Paperback / softback
Book cover image
Penetration testing is the attempt to professionally break in to an organisation's computer systems, with the goal of determining whether the systems are secure. This guide for business and IT managers, developed in collaboration with CREST, explains the process of penetration testing and the benefits it brings. The book provides ...
Penetration Testing: A guide for business and IT managers
Penetration testing is the attempt to professionally break in to an organisation's computer systems, with the goal of determining whether the systems are secure. This guide for business and IT managers, developed in collaboration with CREST, explains the process of penetration testing and the benefits it brings. The book provides essential insight and tips for setting up a penetration testing programme, maintaining it, and responding to the results of penetration tests.
https://magrudy-assets.storage.googleapis.com/9781780174082.jpg
40.940000 USD

Penetration Testing: A guide for business and IT managers

by Felix Ryan, Roderick Douglas, Peter Taylor, Moinuddin Zaki, Jason Charalambous, Rob Ellis, Jims Marchang, Nick Furneaux
Paperback / softback
Book cover image
Explore the blockchain-based decentralized platform and understand how Ethereum works with Dapps examples Key Features Explore the Ethereum ecosystem and understand the latest research on the platform Build decentralized apps (Dapps) using smart contracts and Ethereum with the help of practical examples Learn to make your decentralized applications fast and ...
Learn Ethereum: Build your own decentralized applications with Ethereum and smart contracts
Explore the blockchain-based decentralized platform and understand how Ethereum works with Dapps examples Key Features Explore the Ethereum ecosystem and understand the latest research on the platform Build decentralized apps (Dapps) using smart contracts and Ethereum with the help of practical examples Learn to make your decentralized applications fast and highly secure Book DescriptionEthereum is a blockchain-based, decentralized computing platform that allows running smart contracts. This book provides a basic overview of how Ethereum works, its ecosystem, mining process, and the consensus mechanism. It also demonstrates a step-by-step approach for building decentralized applications. This book begins with the very basics of Blockchain technology. Then it dives deep into the Ethereum architecture, framework and tools in its ecosystem. It also provides you an overview of ongoing research on Ethereum, for example, Layer 1 and 2 scaling solution, Stablecoin, ICO/STO/IEO, etc. Next, it explains Solidity language in detail, and provides step-by-step instructions for designing, developing, testing, deploying, and monitoring decentralized applications. In addition, you'll learn how to use Truffle, Remix, Infura, Metamask, and many other Ethereum technologies. It'll also help you develop your own cryptocurrency by creating ERC20, and ERC721 smart contracts from scratch. Finally, we explain private blockchains, and you learn how to interact with smart contracts through wallets. What you will learn Understand the concepts of blockchain and cryptocurrency Master Ethereum development tools such as Truffle, Remix IDE and Infura Delve into smart contract development Develop DApps frontend using Node.js, React.js, and Web3js API Learn Etherscan and other tools to secure and monitor smart contracts Develop and debug smart contracts by working with Remix Apply Truffle suite to compile, migrate, and unit test smart contracts Explore smart contracts such as ERC20 token and decentralized digital market Who this book is forThis book is for all developers and architects who want to explore Ethereum blockchain fundamentals and get started with building real-world decentralized applications. Knowledge of an object-oriented programming language such as JavaScript will be useful but not mandatory.
https://magrudy-assets.storage.googleapis.com/9781789954111.jpg
36.740000 USD

Learn Ethereum: Build your own decentralized applications with Ethereum and smart contracts

by Dongying Song, Zhihong Zou, Xun (Brian) Wu
Paperback / softback
Book cover image
This book constitutes the refereed post-conference proceedings for the VLBD conference workshops entitled: Towards Polystores That Manage Multiple Databases, Privacy, Security and/or Policy Issues for Heterogenous Data (Poly 2019) and the Fifth International Workshop on Data Management and Analytics for Medicine and Healthcare (DMAH 2019), held in Los Angeles, CA, ...
Heterogeneous Data Management, Polystores, and Analytics for Healthcare: VLDB 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August 30, 2019, Revised Selected Papers
This book constitutes the refereed post-conference proceedings for the VLBD conference workshops entitled: Towards Polystores That Manage Multiple Databases, Privacy, Security and/or Policy Issues for Heterogenous Data (Poly 2019) and the Fifth International Workshop on Data Management and Analytics for Medicine and Healthcare (DMAH 2019), held in Los Angeles, CA, USA, in August 2019, in conjunction with the 45th International Conference on Very Large Data Bases, VLDB 2019. The 20 regular papers presented together with 2 keynote papers were carefully reviewed and selected from 31 initial submissions. The papers are organized in topical sections named: Poly 2019: Privacy, Security and/or Policy Issues for Heterogenous Data; Building Polystore Systems. DMAH 2019: Database Enabled Biomedical Research; AI for Healthcare; Knowledge Discovery from Unstructured Biomedical Data; Blockchain and Privacy Preserving Data Management.
https://magrudy-assets.storage.googleapis.com/9783030337513.jpg
73.490000 USD

Heterogeneous Data Management, Polystores, and Analytics for Healthcare: VLDB 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August 30, 2019, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the proceedings of the Second International Conference on Machine Learning for Cyber Security, ML4CS 2019, held in Xi'an, China in September 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 70 submissions. The papers detail all aspects of machine ...
Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings
This book constitutes the proceedings of the Second International Conference on Machine Learning for Cyber Security, ML4CS 2019, held in Xi'an, China in September 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 70 submissions. The papers detail all aspects of machine learning in network infrastructure security, in network security detections and in application software security.
https://magrudy-assets.storage.googleapis.com/9783030306182.jpg
83.990000 USD

Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings

Paperback / softback
Book cover image
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood of the digital world's security infrastructure. From governments around the world to the average ...
Practical Cryptography in Python: Learning Correct Cryptography by Example
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood of the digital world's security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how bad cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You'll Learn Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break Use message integrity and/or digital signatures to protect messages Utilize modern symmetric ciphers such as AES-GCM and CHACHA Practice the basics of public key cryptography, including ECDSA signatures Discover how RSA encryption can be broken if insecure padding is used Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs Who This Book Is For IT administrators and software developers familiar with Python. Although readers may have some knowledge of cryptography, the book assumes that the reader is starting from scratch.
https://magrudy-assets.storage.googleapis.com/9781484248997.jpg
39.890000 USD

Practical Cryptography in Python: Learning Correct Cryptography by Example

by Christopher K. Monson, Seth James Nielson
Paperback / softback
Book cover image
This book constitutes the thoroughly refereed post-workshop proceedings of the workshops that were held in conjunction with the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, in Macau, China, in April 2019.The 31 revised papers presented were carefully reviewed and selected from a total of 52 submissions. ...
Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2019 Workshops, BDM, DLKT, LDRC, PAISI, WeL, Macau, China, April 14-17, 2019, Revised Selected Papers
This book constitutes the thoroughly refereed post-workshop proceedings of the workshops that were held in conjunction with the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, in Macau, China, in April 2019.The 31 revised papers presented were carefully reviewed and selected from a total of 52 submissions. They stem from the following workshops: * PAISI 2019: 14th Pacific Asia Workshop on Intelligence and Security Informatics * WeL 2019: PAKDD 2019 Workshop on Weakly Supervised Learning: Progress and Future * LDRC 2019: PAKDD 2019 Workshop on Learning Data Representation for Clustering * BDM 2019: 8th Workshop on Biologically-inspired Techniques for Knowledge Discovery and Data Mining * DLKT 2019: 1st Pacific Asia Workshop on Deep Learning for Knowledge Transfer
https://magrudy-assets.storage.googleapis.com/9783030261412.jpg
83.990000 USD

Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2019 Workshops, BDM, DLKT, LDRC, PAISI, WeL, Macau, China, April 14-17, 2019, Revised Selected Papers

Paperback / softback
Book cover image
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release ...
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product. Looking for real-world advice from leading cybersecurity experts? You've found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world's most noteworthy hackers and influential security specialists.
https://magrudy-assets.storage.googleapis.com/9781119643371.jpg
26.250000 USD

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

by Jennifer Jin, Marcus J. Carey
Paperback / softback
Book cover image
Description As a developer, you need to build software in a secure way. But you can't spend all your time focusing on security. The answer is to use good design principles, tools, and mindsets that make security an implicit result - it's secure by design. Secure by Design teaches developers ...
Secure By Design
Description As a developer, you need to build software in a secure way. But you can't spend all your time focusing on security. The answer is to use good design principles, tools, and mindsets that make security an implicit result - it's secure by design. Secure by Design teaches developers how to use design to drive security in software development. This book is full of patterns, best practices, and mindsets that you can directly apply to your real world development. Key features * Use good design to create secure software * Apply design concepts in real-world cases * Spot hidden security problems * Assess security by identifying design patterns * Understand benefits and limitations of secure-by-design Audience Readers should have some experience in Java, C#/.NET, or similar language. About the technology Secure-by-design becomes a guiding principle in how you build your software, from code to architecture. This begins by understanding designs and patterns that promote security so they become easy to apply in your day-to-day work.
https://magrudy-assets.storage.googleapis.com/9781617294358.jpg
74.37 USD

Secure By Design

by Daniel Sawano, Daniel Deogun, Dan Bergh Johnsson
Paperback / softback
Book cover image
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being cyber-secure means that a person or organization has both protected itself against attacks by cyber criminals ...
Cybersecurity For Dummies
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being cyber-secure means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached! The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime -- and to defend yourself before it is too late.
https://magrudy-assets.storage.googleapis.com/9781119560326.jpg
26.240000 USD

Cybersecurity For Dummies

by Joseph Steinberg
Paperback / softback
Book cover image
A non-technical, hands-on guide that shows boards and executives how to take full ownership of their company's cybersecurity. A detailed, non-technical, and actionable guide that walks leaders through all of the steps they need to take to make organizations safe from cyberthreats. An overview of the current state of cybersecurity ...
Leader's Guide to Cybersecurity: Why Boards Need to Lead - and How to Do It
A non-technical, hands-on guide that shows boards and executives how to take full ownership of their company's cybersecurity. A detailed, non-technical, and actionable guide that walks leaders through all of the steps they need to take to make organizations safe from cyberthreats. An overview of the current state of cybersecurity and why things need to change. A list of a the most common mistakes companies make--and how to avoid them. An argument for why Boards and Senior Leaders need to take ownership of the problem. Primary audience: Corporate directors and executive leadership of public and privately held companies. Secondary audience: Corporate governance professionals (e.g., corporate secretaries, general counsels and governance attorneys); chief risk officers, enterprise risk managers, internal auditors, chief security Officers; institutional investors and advisors; technology and cybersecurity management (e.g., CIO and CISO); regulators and government officials charged with establishing private sector cyber policy; leaders and influencers who would be interested in the book based on their engagement with boards.
https://magrudy-assets.storage.googleapis.com/9781633697997.jpg
46.49 USD

Leader's Guide to Cybersecurity: Why Boards Need to Lead - and How to Do It

by Jack J. Domet, Thomas J. Parenty
Hardback
Book cover image
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well ...
Botnets: Architectures, Countermeasures, and Challenges
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
https://magrudy-assets.storage.googleapis.com/9780367191542.jpg
185.97 USD

Botnets: Architectures, Countermeasures, and Challenges

Hardback
Book cover image
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile ...
Cyber Security: The Lifeline of Information and Communication Technology
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are growing exponentially. This book discusses a variety of problems and solutions including: * Internet of things and Machine to Machine Communication; * Infected networks such as Botnets; * Social media and networking; * Cyber Security for Smart Devices and Smart Grid * Blockchain Technology and * Artificial Intelligence for Cyber Security Given its scope, the book offers a valuable asset for cyber security researchers, as well as industry professionals, academics, and students.
https://magrudy-assets.storage.googleapis.com/9783030317027.jpg
178.490000 USD

Cyber Security: The Lifeline of Information and Communication Technology

by Vandana Rohokale, Ramjee Prasad
Hardback
Book cover image
This book constitutes the proceedings of the 6th International Symposium on Model-Based Safety and Assessment, IMBSA 2019, held inThessaloniki, Greece, in October 2019. The 24 revised full papers presented were carefully reviewed and selected from 46 initial submissions. The papers are organized in topical sections on safety models and languages; ...
Model-Based Safety and Assessment: 6th International Symposium, IMBSA 2019, Thessaloniki, Greece, October 16-18, 2019, Proceedings
This book constitutes the proceedings of the 6th International Symposium on Model-Based Safety and Assessment, IMBSA 2019, held inThessaloniki, Greece, in October 2019. The 24 revised full papers presented were carefully reviewed and selected from 46 initial submissions. The papers are organized in topical sections on safety models and languages; dependability analysis process; safety assessment; safety assessment in automotive industry; AI in safety assessment.
https://magrudy-assets.storage.googleapis.com/9783030328719.jpg
83.990000 USD

Model-Based Safety and Assessment: 6th International Symposium, IMBSA 2019, Thessaloniki, Greece, October 16-18, 2019, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the Second International Conference on Frontiers in Cyber Security, FCS 2019, held in Xi'an, China, in November 2019. The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections ...
Frontiers in Cyber Security: Second International Conference, FCS 2019, Xi'an, China, November 15-17, 2019, Proceedings
This book constitutes the proceedings of the Second International Conference on Frontiers in Cyber Security, FCS 2019, held in Xi'an, China, in November 2019. The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on: symmetric key cryptography; public key cryptography; post-quantum cryptography: signature; attack and behavior detection; authenticated key agreement; blockchain; system and network security.
https://magrudy-assets.storage.googleapis.com/9789811508172.jpg
104.990000 USD

Frontiers in Cyber Security: Second International Conference, FCS 2019, Xi'an, China, November 15-17, 2019, Proceedings

Paperback / softback
Page 1 of 40