Cognitive Radio
The scarcity of radio spectrum is one of the most urgent issues at the forefront of future network research that is yet to be addressed. To address the problem of spectrum usage efficiency, the cognitive radio (CR) concept was proposed. The challenges of employing CRs include ensuring secure device operations and data transmission with advanced computing techniques. Successful development of CR systems will involve attainment of the following key objectives: Increasing the rate and capacity of...
Attack and Defend Computer Security Set
by Dafydd Stuttard, Marcus Pinto, Michael Hale Ligh, Steven Adair, Blake Hartstein, and Ozh Richard
Defend your networks and data from attack with this unique two-book security set The Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker s Handbook and Malware Analyst s Cookbook. This special security bundle combines coverage of the two most crucial tactics used to defend networks, applications, and data from attack while giving security professionals insight into the underlying details of these attacks themselves. The...
Russian Disinformation Efforts on Social Media
by Elina Treyger, Joe Cheravitch, and Raphael S Cohen
Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation
by Bruce Dang, Alexandre Gazet, and Elias Bachaalany
For Internet and Network Security courses.This up-to-date examination of computer and corporate security in the business setting fills the critical need for security education. Its comprehensive, balanced, and well-organized presentation emphasizes implementing security within corporations using existing commercial software and provides coverage of all major security issues.
Recent Innovations in Computing (Lecture Notes in Electrical Engineering, #701)
This book features selected papers presented at the 3rd International Conference on Recent Innovations in Computing (ICRIC 2020), held on 20-21 March 2020 at the Central University of Jammu, India, and organized by the university's Department of Computer Science & Information Technology. It includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computi...
Security Solutions for AWS (Argent Software Simply Safe, #1)
by Argent University
Competition in the Gray Zone
by Bonny Lin, Cristina L Garafola, Bruce McClintock, Jonah Blank, Jeffrey W Hornung, Karen Schwindt, Jennifer D P Moroney, Paul Orner, Dennis Borrman, and Sarah W Denton
Principles of Computer Security Lab Manual, Fourth Edition
by Vincent J Nestler, Keith Harrison, Matthew P Hirsch, and Wm Arthur Conklin
Your one-stop guide to learning and implementing Red Team tactics effectivelyKey FeaturesTarget a complex enterprise environment in a Red Team activityDetect threats and respond to them with a real-world cyber-attack simulationExplore advanced penetration testing tools and techniquesBook DescriptionRed Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities. Hands-On Red Team Tactics starts with an overview of p...
Comptia Network+ Certification Practice Exams (Exam N10-005)
by Robb H Tracy
Chfi Computer Hacking Forensic Investigator Certification All-In-One Exam Guide
by Charles L Brooks
Eccws 2016 - Proceedings of the 15th European Conference on Cyber Warfare and Security
5G for the Connected World
Comprehensive Handbook Demystifies 5G for Technical and Business Professionals in Mobile Telecommunication Fields Much is being said regarding the possibilities and capabilities of the emerging 5G technology, as the evolution towards 5G promises to transform entire industries and many aspects of our society. 5G for the Connected World offers a comprehensive technical overview that telecommunication professionals need to understand and take advantage of these developments. The book offers a wide...
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
Deploying Biometrics for Customers, Employees and Citizens
by Samir Nanavati
Computer Science, Technology and Application - Proceedings of the 2016 International Conference (Csta 2016)