Building a Home Security System with Raspberry Pi
by Matthew Poole
The Raspberry Pi is a powerful low-cost credit-card-sized computer, which lends itself perfectly as the controller for a sophisticated home security system. Using the on-board interfaces available, the Raspberry Pi can be expanded to allow the connection of a virtually infinite number of security sensors and devices. The Raspberry Pi has the processing power and interfaces available to build a sophisticated...
Price: $34.99 | Publisher: Packt Publishing | Release: 2015
by Allister Banks, Charles S. Edge
iOS has quickly become one of the most popular mobile operating systems, not only with users, but also with developers and companies. This also makes it a popular platform for malicious adversaries. iOS users and developers need to be constantly aware of their mobile security risks. Because of this, there is great demand for risk assessment specialists and security engineers.This book is a hands-on guide th...
Price: $24.99 | Publisher: Packt Publishing | Release: 2015
by Jason Slagle
As application and server environments become more complex, managing security and compliance becomes a challenging situation. By utilizing Puppet and the tools associated with it, you can simplify and automate many of the more repetitive security-related tasks.Beginning with the simplest cases, you will quickly get up and running by looking at an example Puppet manifest. Moving on, you will learn how to use...
Price: $39.99 | Publisher: Packt Publishing | Release: 2015
Pattern and Security Requirements
by Kristian Beckers
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary conce...
Price: $123.92 | Publisher: Springer | Release: 2015
Getting an Information Security Job For Dummies
by Peter H. Gregory
Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information Security Job For Dummies provides no-nonsense guidance on everything you need to get ahead of the competition...
Price: $23.32 | Publisher: Wiley | Release: 2015
FREE EBOOK - A Practical Guide to TPM 2.0
by Will Arthur, David Challener
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up qu...
Price: $43.30 | Publisher: Apress | Release: 2015
Network Security Assessment, 3rd Edition
by Chris McNab
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that professional security analysts use to identify and assess risks in government, military, and commercial networks. Armed with this book, you can work to create environments that are hardened and immune from unauthorized use and attack.Author Chris McNab demonstrate...
Price: $41.06 | Publisher: O'Reilly Media | Release: 2015
by John Paul Mueller
As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. You'll learn how to help protect your app no matter where it runs, from the latest smartphone to an older desktop, and every...
Price: $35.20 | Publisher: O'Reilly Media | Release: 2015
by Jeff Bollinger, Brandon Enright, Matthew Valites
Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own threat intelligence and incident detection strategy, rather than...
Price: $39.56 | Publisher: O'Reilly Media | Release: 2015
Mastering Wireless Penetration Testing for Highly Secured Environments
by Aaron Johns
Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary security patches to ensure that they are available.This book cove...
Price: $44.99 | Publisher: Packt Publishing | Release: 2015