Skip to main content

Books in Computer security

71-80 of 403 results in All results

Information Security Analytics

  • 1st Edition
  • November 25, 2014
  • Mark Talabis + 3 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 2 0 7 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 5 0 6 - 4
Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.

Securing VoIP

  • 1st Edition
  • November 14, 2014
  • Regis J. Jr (Bud) Bates
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 0 3 9 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 2 2 - 0
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

Designing and Building Security Operations Center

  • 1st Edition
  • November 6, 2014
  • David Nathans
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 8 9 9 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 0 9 6 - 9
Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers’ information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.

PCI Compliance

  • 4th Edition
  • October 29, 2014
  • Branden R. Williams + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 5 7 9 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 6 5 1 - 0
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information.

Cyber Reconnaissance, Surveillance and Defense

  • 1st Edition
  • October 16, 2014
  • Robert Shimonski
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 3 0 8 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 4 6 8 - 4
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.

Managing Online Risk

  • 1st Edition
  • September 25, 2014
  • Deborah Gonzalez
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 0 5 5 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 0 6 0 - 9
In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book.

CSA Guide to Cloud Computing

  • 1st Edition
  • September 22, 2014
  • Raj Samani + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 1 2 5 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 1 8 5 - 9
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents. The authors of CSA Guide to Cloud Computing provide a wealth of industry expertise you won't find anywhere else. Author Raj Samani is the Chief Technical Officer for McAfee EMEA; author Jim Reavis is the Executive Director of CSA; and author Brian Honan is recognized as an industry leader in the ISO27001 standard. They will walk you through everything you need to understand to implement a secure cloud computing structure for your enterprise or organization.

Information Governance and Security

  • 1st Edition
  • September 9, 2014
  • John G. Iannarelli + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 2 4 7 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 4 0 6 - 7
Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset—its proprietary information—safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of.

Integrated Security Systems Design

  • 2nd Edition
  • September 3, 2014
  • Thomas L. Norman
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 0 0 2 2 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 1 9 3 - 6
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible.The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program’s overall effectiveness while avoiding pitfalls and potential lawsuits.

Hacking and Penetration Testing with Low Power Devices

  • 1st Edition
  • August 29, 2014
  • Philip Polstra
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 7 5 1 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 8 2 4 - 9
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!