Security Books



Bookstore > Books > Security

A Treatise on Systems (volume 1)

FREE EBOOK - A Treatise on Systems (volume 1)

by Mark Burgess

Network and System Administration usually refers only to the traditional skills and recipes for keeping computers and networks running properly. But, in truth, this view omits the most important part of the system: humans. The skill needed to comprehend and tame systems comprising both humans and machines is that of managing complexity. In this book, first written in 2002 and updated now, Mark Burgess summa...

Publisher:  Self-publishing  |  Release:  2017

Hacking Exposed Malware & Rootkits, 2nd Edition

Hacking Exposed Malware & Rootkits, 2nd Edition

by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate...

Price:  $6.00  |  Publisher:  McGraw-Hill  |  Release:  2016

Hacking Exposed Industrial Control Systems

Hacking Exposed Industrial Control Systems

by Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effec...

Price:  $35.87  |  Publisher:  McGraw-Hill  |  Release:  2016

Managing Risk and Information Security, 2nd Edition

FREE EBOOK - Managing Risk and Information Security, 2nd Edition

by Malcolm Harkins

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience.Managing Risk and Information Security provides thought leadership ...

Price:  $22.68  |  Publisher:  Apress  |  Release:  2016

Dynamic SQL

Dynamic SQL

by Ed Pollack

This book is an introduction and deep-dive into the many uses of dynamic SQL in Microsoft SQL Server. Dynamic SQL is key to large-scale searching based upon user-entered criteria. It's also useful in generating value-lists, in dynamic pivoting of data for business intelligence reporting, and for customizing database objects and querying their structure.Executing dynamic SQL is at the heart of applicati...

Price:  $29.99  |  Publisher:  Apress  |  Release:  2016

Building a Comprehensive IT Security Program

Building a Comprehensive IT Security Program

by Jeremy Wittkop

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing ...

Price:  $39.99  |  Publisher:  Apress  |  Release:  2016

Identity and Data Security for Web Development

Identity and Data Security for Web Development

by Jonathan LeBlanc, Tim Messerschmidt

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are p...

Price:  $33.33  |  Publisher:  O'Reilly Media  |  Release:  2016

Mastering Kali Linux Wireless Pentesting

Mastering Kali Linux Wireless Pentesting

by Brian Sak, Jilumudi Raghu Ram

Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit.This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration te...

Price:  $49.99  |  Publisher:  Packt Publishing  |  Release:  2016

Hacking Android

Hacking Android

by Srinivasa Rao Kotipalli, Mohammed A. Imran

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security.Hacking Android...

Price:  $30.99  |  Publisher:  Packt Publishing  |  Release:  2016

Professional Hadoop

Professional Hadoop

by Benoy Antony, Konstantin Boudnik, Cheryl Adams, Branky Shao, Cazen Lee, Kai Sasaki

Professional Hadoop is the complete reference and resource for experienced developers looking to employ Apache Hadoop in real-world settings. Written by an expert team of certified Hadoop developers, committers, and Summit speakers, this book details every key aspect of Hadoop technology to enable optimal processing of large data sets. Designed expressly for the professional developer, this book skips over ...

Price:  $34.32  |  Publisher:  Wrox  |  Release:  2016

Pages: ←Previous | 1 ... 37, 38, 39, 40, 41 ... 74 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.