Security Books



Bookstore > Books > Security

Threat Modeling

Threat Modeling

by Adam Shostack

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat...

Price:  $48.99  |  Publisher:  Wiley  |  Release:  2014

Building the Infrastructure for Cloud Security

FREE EBOOK - Building the Infrastructure for Cloud Security

by Raghuram Yeluri, Enrique Castro-Leon

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an ex...

Price:  $9.97  |  Publisher:  Apress  |  Release:  2014

The InfoSec Handbook

FREE EBOOK - The InfoSec Handbook

by Umesh Hodeghatta Rao, Umesha Nayak

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detaile...

Price:  $44.99  |  Publisher:  Apress  |  Release:  2014

Advanced API Security

Advanced API Security

by Prabath Siriwardena

Advanced API Security is a complete reference to the next wave of challenges in enterprise security - securing public and private APIs.API adoption in both consumer and enterprises has gone beyond predictions. It has become the 'coolest' way of exposing business functionalities to the outside world. Both your public and private APIs, need to be protected, monitored and managed. Security is not an ...

Price:  $53.56  |  Publisher:  Apress  |  Release:  2014

Network Security Through Data Analysis

Network Security Through Data Analysis

by Michael Collins

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to protect and improve it.Divided into three sections, this...

Price:  $47.55  |  Publisher:  O'Reilly Media  |  Release:  2014

The Manager's Guide to Web Application Security

The Manager's Guide to Web Application Security

by Ron Lepofsky

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the result of intricate programming deficiencies and highly technical iss...

Price:  $57.12  |  Publisher:  Apress  |  Release:  2014

Hyper-V Security

Hyper-V Security

by Eric Siron, Andy Syrewicze

Keeping systems safe and secure is a new challenge for Hyper-V Administrators. As critical data and systems are transitioned from traditional hardware installations into hypervisor guests, it becomes essential to know how to defend your virtual operating systems from intruders and hackers.Hyper-V Security is a rapid guide on how to defend your virtual environment from attack.This book takes you step by step...

Price:  $29.99  |  Publisher:  Packt Publishing  |  Release:  2014

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing

by Himanshu Kumar

IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed security activities across organizations today. The Nessus tool gives the end user the ability to perform these kinds of security tests quickly and effectively.Nessus is a widely used tool for vulnerability assessment, and Learning Nessus for Penetration Testing gi...

Price:  $20.99  |  Publisher:  Packt Publishing  |  Release:  2014

RESTful Java Web Services Security

RESTful Java Web Services Security

by Rene Enriquez, Andres Salazar C.

This book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use to implement and test security on your applications. It will cover the fine details of setting up RESTful services such as implementing RESTEasy and securing transmission protocols such as the OAuth protocol and...

Price:  $32.99  |  Publisher:  Packt Publishing  |  Release:  2014

Penetration Testing with the Bash shell

Penetration Testing with the Bash shell

by Keith Makan

This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux.The book begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize y...

Price:  $13.99  |  Publisher:  Packt Publishing  |  Release:  2014

Pages: ←Previous | 1 ... 47, 48, 49, 50, 51 ... 74 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.