Security related eBooks
English | June 2, 2015 | ASIN: B00YT5RREE | 56 Pages | EPUB/MOBI | 3.45 MB This tutorial is designed for everyone: even if you've never programmed before or if you have extensive experience programmin...
( Category:Security related Date:05 Jun 2015 )
English | May 29, 2004 | ISBN: 0321197674 | 384 Pages | CHM | 10 MB "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important securi...
( Category:Security related Date:05 Jun 2015 )
2004 | pages: 358 | ISBN: 0824759397 | PDF | 5,7 mb Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current ap...
( Category:Security related Date:04 Jun 2015 )
English | July 21, 2004 | ISBN: 0735620334 | 592 Pages | PDF | 5 MB Don't wait for an attacker to find and exploit your security vulnerabilities-take the lead by assessing the state of your network's ...
( Category:Security related Date:04 Jun 2015 )
English | ISBN: 1498722032 | 2015 | 187 Pages | PDF | 5 MB In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security t...
( Category:Security related Date:02 Jun 2015 )
2012-12-26 | ISBN: 1849518262 | PDF | 456 Pages | 5.93 MB This book demonstrates how to secure your Java applications from hackers using Spring Security 3.1. With plenty of handholding, it takes you s...
( Category:Security related Date:02 Jun 2015 )
2012-09-26 | ISBN: 1461419808, 1493900366 | PDF | 286 Pages | 4.03 MB The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information...
( Category:Security related Date:02 Jun 2015 )
English | Jan 30, 2007 | ISBN: 0471917109 | 425 Pages | PDF | 6 MB A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated be...
( Category:Security related Date:02 Jun 2015 )
2012-05-29 | ISBN: 1439814465 | PDF | 160 Pages | 2.29 MB The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses eng...
( Category:Security related Date:01 Jun 2015 )
2013-12-14 | ISBN: 1466568445 | PDF | 498 Pages | 10.82 MB In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trus...
( Category:Security related Date:01 Jun 2015 )
English | Jan 1, 2001 | ISBN: 0712670947 | 256 Pages | EPUB | 737 KB The advance of digital technology is creating whole new markets and industries. Telecommunications is merging into media; informati...
( Category:Security related Date:01 Jun 2015 )
2015 | ISBN: 178439775X | English | 197 pages | EPUB + Source code | 14 MB If you are a security professional whose workload is increasing, or a Puppet professional looking to increase knowledge of se...
( Category:Security related Date:31 May 2015 )
English | May 16, 2015 | ISBN: 1512049581 | 220 Pages | EPUB/MOBI | 672.26 KB/781.3 KB The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-drai...
( Category:Security related Date:28 May 2015 )
English | ISBN: 0767925874, 0767925866 | 2008 | 256 pages | EPUB | 0.3 MB The charismatic forger immortalized in the film Catch Me If You Can exposes the astonishing tactics of today's identity theft ...
( Category:Security related Date:27 May 2015 )
2015 | 236 Pages | ISBN: 178439775X | PDF | 10 MB If you are a security professional whose workload is increasing, or a Puppet professional looking to increase knowledge of security, or an experienced...
( Category:Security related Date:27 May 2015 )