Skip to main content

Books in Computer security

21-30 of 403 results in All results

Eleventh Hour CISSP®

  • 3rd Edition
  • September 3, 2016
  • Joshua Feldman + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 1 2 4 8 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 1 3 7 7 - 6
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.

The Basics of Cyber Safety

  • 1st Edition
  • August 20, 2016
  • John Sammons + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 6 6 5 0 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 6 3 9 - 4
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

Information Security Science

  • 1st Edition
  • June 21, 2016
  • Carl Young
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 6 4 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 6 4 6 - 8
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

Cyber Guerilla

  • 1st Edition
  • June 13, 2016
  • Jelle Van Haaster + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 1 9 7 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 2 8 4 - 6
Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.

Executing Windows Command Line Investigations

  • 1st Edition
  • June 11, 2016
  • Chet Hosmer + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 2 6 8 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 2 7 1 - 2
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.

DNS Security

  • 1st Edition
  • June 10, 2016
  • Allan Liska + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 3 0 6 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 3 3 9 - 5
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.

Data Breach Preparation and Response

  • 1st Edition
  • June 8, 2016
  • Kevvie Fowler
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 4 5 1 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 4 5 0 - 7
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

Cybersecurity and Applied Mathematics

  • 1st Edition
  • June 7, 2016
  • Leigh Metcalf + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 2 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 4 9 9 - 5
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

Threat Forecasting

  • 1st Edition
  • May 17, 2016
  • John Pirc + 3 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 0 0 6 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 4 7 8 - 4
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

OS X Incident Response

  • 1st Edition
  • May 6, 2016
  • Jaron Bradley
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 6 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 3 - 9
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset. Digital forensics is a critical art and science. While forensics is commonly thought of as a function of a legal investigation, the same tactics and techniques used for those investigations are also important in a response to an incident. Digital evidence is not only critical in the course of investigating many crimes but businesses are recognizing the importance of having skilled forensic investigators on staff in the case of policy violations. Perhaps more importantly, though, businesses are seeing enormous impact from malware outbreaks as well as data breaches. The skills of a forensic investigator are critical to determine the source of the attack as well as the impact. While there is a lot of focus on Windows because it is the predominant desktop operating system, there are currently very few resources available for forensic investigators on how to investigate attacks, gather evidence and respond to incidents involving OS X. The number of Macs on enterprise networks is rapidly increasing, especially with the growing prevalence of BYOD, including iPads and iPhones. Author Jaron Bradley covers a wide variety of topics, including both the collection and analysis of the forensic pieces found on the OS. Instead of using expensive commercial tools that clone the hard drive, you will learn how to write your own Python and bash-based response scripts. These scripts and methodologies can be used to collect and analyze volatile data immediately.   For online source codes, please visit: https://github.com/jbradley89/osx_incident_response_scripting_and_analysis