| |
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms.This book also introduces algorithms for breaking privacy,...
Editeur :
Springer
Parution :
2020-11-28
PDF, ePub
|
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and...
Editeur :
Wiley
Parution :
2020-10-30
PDF, ePub
|
Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online...
Editeur :
Wiley
Parution :
2020-09-23
PDF, ePub
|
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection...
Editeur :
Apress
Parution :
2020-09-22
PDF, ePub
|
This book features selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. Focusing on applications of the latest smart theories and approaches, and recent advances in the...
Editeur :
Springer
Parution :
2020-09-03
PDF, ePub
|
This book covers recent trends in the field of devices, wireless communication and networking. It gathers selected papers presented at the International Conference on Communication, Devices and Networking (ICCDN 2019), which was organized by the Department of...
Editeur :
Springer
Parution :
2020-07-27
PDF, ePub
|
Set up a secure network at home or the office Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage...
Editeur :
For Dummies
Parution :
2020-07-14
PDF, ePub
|
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data....
Editeur :
For Dummies
Parution :
2020-04-01
PDF, ePub
|
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. AppliedIncident Response details effective ways to respond to advanced attacks against...
Editeur :
Wiley
Parution :
2020-01-14
PDF, ePub
|
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics.
A connected...
Editeur :
Springer
Parution :
2020-01-13
PDF, ePub
|
An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements,...
Editeur :
Wiley
Parution :
2019-12-24
PDF, ePub
|
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous,...
Editeur :
Springer
Parution :
2019-03-15
PDF, ePub
|
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, you...
Editeur :
Wiley
Parution :
2017-07-14
PDF, ePub
|
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security....
Editeur :
Wiley
Parution :
2016-05-04
PDF, ePub
|
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide...
Editeur :
Wiley
Parution :
2015-08-10
PDF, ePub
|
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage....
Editeur :
Wiley
Parution :
2015-07-09
PDF, ePub
|
Defend your networks and data from attack with this unique two-book security set The Attack andDefend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker’s Handbook and Malware Analyst’s Cookbook. This special...
Editeur :
Wiley
Parution :
2014-03-17
PDF, ePub
|
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a...
Editeur :
Wiley
Parution :
2014-02-26
PDF, ePub
|
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and...
Editeur :
Wiley
Parution :
2014-02-03
PDF, ePub
|
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and...
Editeur :
Wiley-IEEE Press
Parution :
2013-10-17
Collection :
IEEE Press Series on Network and Service Management
PDF, ePub
|