Measuring and Managing Information Risk
by Jack Freund and Jack Jones
Privacy Protection Measures and Technologies in Business Organizations
Socially Engineered will help readers in information security and in other professions become world-class social hacking chameleons. This book demonstrates the step-by-step methods used by social hackers to develop on-the-spot lie detection, active listening, reading social cues and body language and how to hack situations to accomplish their goals. Infosec professionals need to understand and master these techniques to be able to navigate the myriad human interactions that are crucial to missio...
This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format. Cuckoo Malware Analysis is great for anyone who wants to analyze malware through programming, networking, disassembling, forensics, and virtualization. Whether you are new to malware analysis or have some experience, this book will help you get started with Cuckoo Sandbox so you can start analysing...
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mo...
This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography. Moreover, this book covers cryptography primitives and its usage and applications and focuses on the fundamental principles of modern cryptography such as Stream Ciphers, block ciphers, public key algorithms and digital signatures. Readers will gain a solid foundation in cryptography and security. This book pre...
WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021 The instant New York Times bestseller A Financial Times and The Times Book of the Year 'A terrifying expose' The Times 'Part John le Carre . . . Spellbinding' New Yorker We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world's largest attack su...
For Internet and Network Security courses.This up-to-date examination of computer and corporate security in the business setting fills the critical need for security education. Its comprehensive, balanced, and well-organized presentation emphasizes implementing security within corporations using existing commercial software and provides coverage of all major security issues.
This book contains the refereed proceedings of the 10th International Conference on Knowledge Management in Organizations, KMO 2015, held in Maribor, Slovenia, in August 2015. The theme of the conference was "Knowledge Management and Internet of Things." The KMO conference brings together researchers and developers from industry and academia to discuss how knowledge management using big data can improve innovation and competitiveness. The 59 contributions accepted for KMO 2015 were selected fr...
Recent Innovations in Computing (Lecture Notes in Electrical Engineering, #701)
This book features selected papers presented at the 3rd International Conference on Recent Innovations in Computing (ICRIC 2020), held on 20-21 March 2020 at the Central University of Jammu, India, and organized by the university's Department of Computer Science & Information Technology. It includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computi...
Blockchain, Big Data and Machine Learning
Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and...
Security Solutions for AWS (Argent Software Simply Safe, #1)
by Argent University
Competition in the Gray Zone
by Bonny Lin, Cristina L Garafola, Bruce McClintock, Jonah Blank, Jeffrey W Hornung, Karen Schwindt, Jennifer D P Moroney, Paul Orner, Dennis Borrman, and Sarah W Denton
Web Application Attacks and Defences (Web Security Topics)
by Nigel Chapman and Jenny Chapman
Certified Ethical Hacker Exam Prep by Michael Gregg with MyITCertificationlab by Shon Harris Bundle
by Michael Gregg
The Certified Ethical Hacker Exam Prep is targeted specifically for CEH exam candidates, matching the CEH exam objectives with the effective and popular Exam Prep method of study. The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The Certified Ethical Hacker Exam Prep is the perfect solution for this challenge, giving readers the solid, in-depth coverage t...
Progress in Applications of Boolean Functions (Synthesis Lectures on Digital Circuits and Systems)
by Tsutomu Sasao and Jon Butler
This book brings together five topics on the application of Boolean functions. They are:1. Equivalence classes of Boolean functions: The number of n-variable functions is large, even for values as small as n = 6, and there has been much research on classifying functions. There are many classifications, each with their own distinct merit.2. Boolean functions for cryptography: The process of encrypting/decrypting plaintext messages often depends on Boolean functions with specific properties. For e...
IoT and AI Technologies for Sustainable Living
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in the sustainable living. The applications include areas such as agriculture, smart farming, healthcare, bioinformatics, self-diagnosis system, body sensor network, multimedia mining, multimedia in forensics and security. It provides a comprehensive discussion of modeling and implementation in water resourc...
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management....