Books in category Computers – Security | Page 5

  • Handbook of Digital Forensics and Investigation

    Handbook of Digital Forensics and Investigation
    Eoghan Casey

    Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource …

  • Management of Information Security

    Management of Information Security
    Michael Whitman, Herbert Mattord

    This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series.

  • Hacked

    Hacked
    Charlie Mitchell

    Charles Mitchell reveals the innovative and too-often hapless government and industry responses to growing cybersecurity threats.

  • Seven Deadliest USB Attacks

    Seven Deadliest USB Attacks
    Brian Anderson, Barbara Anderson

    While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. If you need to keep up with the latest hacks, attacks, and exploits effecting USB technology, then this book is for you.

  • Advances in Security and Payment Methods for Mobile Commerce

    Advances in Security and Payment Methods for Mobile Commerce
    Wen Chen Hu, Chung-Wei Lee, Weidong Kou

    Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists.

  • Inside the SPAM Cartel

    Inside the SPAM Cartel
    Spammer-X Spammer-X

    Authored by a former spammer, this is a methodical, technically explicit expose of the innerworkings of the SPAM economy.

  • The Crypto Controversy A Key Conflict in the Information Society

    The Crypto Controversy:A Key Conflict in the Information Society
    Bert-Jaap Koops

    This is not yet another study of the crypto controversy to conclude that this or that interest is paramount. This is not a study commissioned by a government, nor is it a report that campaigns on the electronic frontier.

  • Seven Deadliest Social Network Attacks

    Seven Deadliest Social Network Attacks
    Carl Timm, Richard Perez

    This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children …

  • Managing an Information Security and Privacy Awareness and Training Program Second Edition

    Managing an Information Security and Privacy Awareness and Training Program, Second Edition
    Rebecca Herold

    Praise for: The first edition was outstanding. The new second edition is even better … the definitive and indispensable guide for information security and privacy awareness and training professionals, worth every cent.

  • Data Driven Security

    Data-Driven Security
    Jay Jacobs, Bob Rudis

    Everything in this book will have practical application for information security professionals.

< Previous 3 4 5 6 7 Next >