Skip to main content

Books in Computer security

31-40 of 403 results in All results

Protecting Patient Information

  • 1st Edition
  • April 7, 2016
  • Paul Cerrato
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 3 9 2 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 4 1 1 - 7
Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic, 3-pronged approach for addressing the IT security deficits present in healthcare organizations of all sizes. Healthcare decision-makers are shown how to conduct an in-depth analysis of their organization’s information risk level. After this assessment is complete, the book offers specific measures for lowering the risk of a data breach, taking into account federal and state regulations governing the use of patient data. Finally, the book outlines the steps necessary when an organization experiences a data breach, even when it has taken all the right precautions.

Network Performance and Security

  • 1st Edition
  • March 9, 2016
  • Chris Chapman
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 5 8 4 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 0 1 - 3
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory.   The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.   Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.

Windows Registry Forensics

  • 2nd Edition
  • March 3, 2016
  • Harlan Carvey
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 2 9 1 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 3 3 5 - 7
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.

Implementing Digital Forensic Readiness

  • 1st Edition
  • February 26, 2016
  • Jason Sachowski
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 4 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 1 - 5
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization’s business operations and information security’s program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.

The Information Systems Security Officer's Guide

  • 3rd Edition
  • January 12, 2016
  • Gerald L. Kovacich
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 1 9 0 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 3 7 9 - 2
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

  • 1st Edition
  • December 10, 2015
  • Henry Dalziel + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 0 5 - 4
Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.

Security Controls Evaluation, Testing, and Assessment Handbook

  • 1st Edition
  • December 7, 2015
  • Leighton Johnson
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 3 2 4 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 5 6 4 - 2
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

Digital Forensics

  • 1st Edition
  • December 7, 2015
  • John Sammons
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 5 2 6 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 4 2 - 8
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.

Breaking into Information Security

  • 1st Edition
  • December 5, 2015
  • Josh More + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 7 8 3 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 9 8 9 - 5
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.

Automating Open Source Intelligence

  • 1st Edition
  • December 3, 2015
  • Robert Layton + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 9 1 6 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 9 1 7 - 6
Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data.