Best Damn Cisco Internetworking Book Period
by Michael E Flannagan, Ron Fuller, Umer Khan, and Martin Walshaw
Ccsp Snpa Official Exam Certification Guide, 3/E (642-522)
by Bastien
Developing Secure Applications is targeted towards all developers and security programmers. Mobile apps, website applications, and enterprise applications developers would especially benefit from dedicated tools and case studies covered in the book. Written for the reader with no prior knowledge of how to build secure mobile and web-based applications and to test for their security, the book explains all the necessary concepts, tips and tricks, and practical real-life security threats. The book...
Federal Information Processing Standards Publications
by National Institute of Standards and Tech
Computational Number Theory (Discrete Mathematics and Its Applications)
by Abhijit Das
Developed from the author's popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning graduate students in engineering. It is also suitable for researchers new to the field and pract
Electronic Government (Lecture Notes in Computer Science, #3591)
by Maria A Wimmer
The International Handbook of Computer Security
by Dr. Jae K. Shim, Anique Qureshi, and Joel Siegel
This SpringerBrief mainly focuses on effective big data analytics for CPS, and addresses the privacy issues that arise on various CPS applications. The authors develop a series of privacy preserving data analytic and processing methodologies through data driven optimization based on applied cryptographic techniques and differential privacy in this brief. This brief also focuses on effectively integrating the data analysis and data privacy preservation techniques to provide the most desirable sol...
Cognitive Radio
The scarcity of radio spectrum is one of the most urgent issues at the forefront of future network research that is yet to be addressed. To address the problem of spectrum usage efficiency, the cognitive radio (CR) concept was proposed. The challenges of employing CRs include ensuring secure device operations and data transmission with advanced computing techniques. Successful development of CR systems will involve attainment of the following key objectives: Increasing the rate and capacity of...
Attack and Defend Computer Security Set
by Dafydd Stuttard, Marcus Pinto, Michael Hale Ligh, Steven Adair, Blake Hartstein, and Ozh Richard
Defend your networks and data from attack with this unique two-book security set The Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker s Handbook and Malware Analyst s Cookbook. This special security bundle combines coverage of the two most crucial tactics used to defend networks, applications, and data from attack while giving security professionals insight into the underlying details of these attacks themselves. The...
Ace your preparation for the CompTIA A+ Exams 220-801 and 220-802 with this 2-in-1 Training Kit from Microsoft Press. Work at your own pace through a series of lessons and practical exercises, and then assess your computing technology skills with the online practice test-featuring multiple, customizable testing options to meet your specific needs. Your Training Kit includes: In-depth coverage of all 10 CompTIA domains in Exams 220-801 and 220-802 Instructive case studies to enhance your perform...
Data and Applications Security XXIII (Lecture Notes in Computer Science)
Russian Disinformation Efforts on Social Media
by Elina Treyger, Joe Cheravitch, and Raphael S Cohen
Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation
by Bruce Dang, Alexandre Gazet, and Elias Bachaalany
Cybersecurity Framework Smart Grid Profile
by National Institute of Standards and Tech
If you want to learn to write your own scripts for the Nmap Scripting Engine, this is the book for you. It is perfect for network administrators, information security professionals, and even Internet enthusiasts who are familiar with Nmap.
Das Lehrbuch uber Codierungstheorie fur Mathematik- und Informatik-Studenten setzt ausser elementarem Grundwissen keine besonderen Kenntnisse voraus. Angesprochen werden Themen aus den Gebieten: Quellencodierung, Prufzeichenverfahren, fehlerkorrigierende Codes und Kryptosysteme. Begriffe, Methoden und Satze sind bis ins Detail ausfuhrlich dargestellt und durch viele einfache Beispiele erlautert. Erganzend zur 1. Auflage sind als Themen u.a. hinzugekommen: DVD-Datentrager, MDS-Codes und Bogen, Co...