Skip to main content

Books in Computer security

81-90 of 403 results in All results

Information Hiding in Speech Signals for Secure Communication

  • 1st Edition
  • August 27, 2014
  • Zhijun Wu
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 3 2 8 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 4 8 1 - 3
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.

Online Security for the Business Traveler

  • 1st Edition
  • August 23, 2014
  • Deborah Gonzalez
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 0 6 9 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 2 0 1 - 8
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today’s high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Each of these devices offers new levels of productivity and efficiency, but they also become the weak link in the security chain: if a device is lost or stolen during travel, the resulting data breach can put the business in danger of physical, financial, and reputational loss. Online Security for the Business Traveler provides an overview of this often overlooked problem, explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity. It is an essential reference guide for any travelling business person or security professional.

Measuring and Managing Information Risk

  • 1st Edition
  • August 22, 2014
  • Jack Freund + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 2 3 1 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 7 9 9 9 3 2 - 6
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity. Intended for organizations that need to either build a risk management program from the ground up or strengthen an existing one, this book provides a unique and fresh perspective on how to do a basic quantitative risk analysis. Covering such key areas as risk theory, risk calculation, scenario modeling, and communicating risk within the organization, Measuring and Managing Information Risk helps managers make better business decisions by understanding their organizational risk.

Windows Performance Analysis Field Guide

  • 1st Edition
  • August 12, 2014
  • Clint Huffman
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 6 7 0 1 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 7 0 4 - 9
Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems.

Building an Information Security Awareness Program

  • 1st Edition
  • August 7, 2014
  • Bill Gardner + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 9 9 6 7 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 9 9 8 1 - 1
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data. Forewords written by Dave Kennedy and Kevin Mitnick!

Cyber Crime and Cyber Terrorism Investigator's Handbook

  • 1st Edition
  • July 16, 2014
  • Babak Akhgar + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 7 4 3 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 8 1 1 - 9
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator’s Handbook will serve as your best reference to the modern world of cyber crime.

The Basics of Information Security

  • 2nd Edition
  • May 20, 2014
  • Jason Andress
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 7 4 4 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 8 1 2 - 6
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.

Computer Security

  • 2nd Edition
  • May 20, 2014
  • John M. Carroll
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 1 - 0 3 0 1 - 3
Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and case histories of computer-related crimes. Part II discusses the organizations and models for the protection of information. Part III talks about the physical security involved and access control involved in data protection. Part IV deals with the different measures employed to promote security in the communication between computers. Part V explains systems security, its access control, and integrity. The text is recommended for people involved in the promotion of computer security, especially programmers and IT practitioners, in institutions where computer-processed information is crucial and must be protected.

Python Forensics

  • 1st Edition
  • May 19, 2014
  • Chet Hosmer
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 8 6 7 6 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 8 6 8 3 - 5
Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps. Drawing upon years of practical experience and using numerous examples and illustrative code samples, author Chet Hosmer discusses how to: Develop new forensic solutions independent of large vendor software release schedules Participate in an open-source workbench that facilitates direct involvement in the design and implementation of new methods that augment or replace existing tools Advance your career by creating new solutions along with the construction of cutting-edge automation solutions to solve old problems

Security for Small Computer Systems

  • 1st Edition
  • May 16, 2014
  • Tricia Saddington
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 1 - 0 3 0 5 - 1
Security for Small Computer Systems: A Practical Guide for Users is a guidebook for security concerns for small computers. The book provides security advice for the end-users of small computers in different aspects of computing security. Chapter 1 discusses the security and threats, and Chapter 2 covers the physical aspect of computer security. The text also talks about the protection of data, and then deals with the defenses against fraud. Survival planning and risk assessment are also encompassed. The last chapter tackles security management from an organizational perspective. The book will be of great use to users of a small computer system.