Security Books



Bookstore > Books > Security

Exploring SE for Android

Exploring SE for Android

by William Confer, William Roberts

You will start by exploring the nature of the security mechanisms behind Linux and SELinux, and as you complete the chapters, you will integrate and enable SE for Android into a System on Chip (SoC), a process that, prior to this book, has never before been documented in its entirety! Discover Android's unique user space, from its use of the common UID and GID model to promote its security goals to its...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2015

Software Networks

Software Networks

by Guy Pujolle

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network equipment. This architecture deals with mechanisms capable of contr...

Price:  $89.26  |  Publisher:  Wiley  |  Release:  2015

Cyber Security

Cyber Security

by Martti Lehto, Pekka Neittaanmaki

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the...

Price:  $66.10  |  Publisher:  Springer  |  Release:  2015

Multiplayer Game Programming

Multiplayer Game Programming

by Josh Glazer, Sanjay Madhav

Networked multiplayer games are a multibillion dollar business: some games now attract tens of millions of players. In this practical, code-rich guide, Joshua Glazer and Sanjay Madhav guide you through every aspect of engineering them. Drawing on their immense experience as both game developers and instructors, the authors lead you through building a robust multiplayer architecture, and creating every engin...

Price:  $33.99  |  Publisher:  Addison-Wesley  |  Release:  2015

Risk Centric Threat Modeling

Risk Centric Threat Modeling

by Tony UcedaVelez, Marco M. Morana

This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and a...

Price:  $95.17  |  Publisher:  Wiley  |  Release:  2015

Illustrated Guide to Door Hardware

Illustrated Guide to Door Hardware

by Scott Tobias

Illustrated Guide to Door Hardware: Design, Specification, Selection is the only book of its kind to compile all the relevant information regarding design, specifications, crafting, and reviewing shop drawings for door openings in one easy-to-access place. Content is presented consistently across chapters so professionals can find what they need quickly and reliably, and the book is illustrated with charts,...

Price:  $81.99  |  Publisher:  Wiley  |  Release:  2015

Graph Analysis and Visualization

Graph Analysis and Visualization

by Richard Brath, David Jonker

Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the discovery of new business insights and opportunities. Published in full color, the book describes the process of creating powerful visualizations using a rich an...

Price:  $44.01  |  Publisher:  Wiley  |  Release:  2015

Network Attacks and Exploitation

Network Attacks and Exploitation

by Matthew Monte

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop d...

Price:  $26.66  |  Publisher:  Wiley  |  Release:  2015

WebSocket

WebSocket

by Andrew Lombardi

Until recently, creating desktop-like applications in the browser meant using inefficient Ajax or Comet technologies to communicate with the server. With this practical guide, you'll learn how to use WebSocket, a protocol that enables the client and server to communicate with each other on a single connection simultaneously. No more asynchronous communication or long polling!For developers with a good ...

Price:  $22.77  |  Publisher:  O'Reilly Media  |  Release:  2015

Apache Oozie

Apache Oozie

by Mohammad Kamrul Islam, Aravind Srinivasan

Get a solid grounding in Apache Oozie, the workflow scheduler system for managing Hadoop jobs. With this hands-on guide, two experienced Hadoop practitioners walk you through the intricacies of this powerful and flexible platform, with numerous examples and real-world use cases.Once you set up your Oozie server, you'll dive into techniques for writing and coordinating workflows, and learn how to write ...

Price:  $24.68  |  Publisher:  O'Reilly Media  |  Release:  2015

Pages: ←Previous | 1 ... 41, 42, 43, 44, 45 ... 74 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.