Skip to main content

Books in Security

41-50 of 613 results in All results

Data Hiding Techniques in Windows OS

  • 1st Edition
  • September 8, 2016
  • Nihad Ahmad Hassan + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 4 9 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 4 9 6 - 4
"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist   Featured in Digital Forensics Magazine, February 2017   In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.

Coding for Penetration Testers

  • 2nd Edition
  • September 3, 2016
  • Jason Andress + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 4 7 2 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 4 7 3 - 4
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.

Eleventh Hour CISSP®

  • 3rd Edition
  • September 3, 2016
  • Joshua Feldman + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 1 2 4 8 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 1 3 7 7 - 6
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.

The Basics of Cyber Safety

  • 1st Edition
  • August 20, 2016
  • John Sammons + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 6 6 5 0 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 6 3 9 - 4
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

Practical Aviation Security

  • 3rd Edition
  • July 20, 2016
  • Jeffrey Price + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 2 9 3 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 3 5 9 - 2
Practical Aviation Security: Predicting and Preventing Future Threats, Third Edition is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today, as well as the cutting edge technologies that are shaping the future. This text equips readers working in airport security or other aviation management roles with the knowledge to implement effective security programs, meet international guidelines, and responsibly protect facilities or organizations of any size. Using case studies and practical security measures now in use at airports worldwide, readers learn the effective methods and the fundamental principles involved in designing and implementing a security system. The aviation security system is comprehensive and requires continual focus and attention to stay a step ahead of the next attack. Practical Aviation Security, Third Edition, helps prepare practitioners to enter the industry and helps seasoned professionals prepare for new threats and prevent new tragedies.

Audio Content Security

  • 1st Edition
  • July 16, 2016
  • Sogand Ghorbani + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 1 3 8 4 - 4
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.

Information Security Science

  • 1st Edition
  • June 21, 2016
  • Carl Young
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 6 4 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 6 4 6 - 8
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

Cyber Guerilla

  • 1st Edition
  • June 13, 2016
  • Jelle Van Haaster + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 1 9 7 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 2 8 4 - 6
Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.

Executing Windows Command Line Investigations

  • 1st Edition
  • June 11, 2016
  • Chet Hosmer + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 2 6 8 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 2 7 1 - 2
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.

DNS Security

  • 1st Edition
  • June 10, 2016
  • Allan Liska + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 3 0 6 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 3 3 9 - 5
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.