Best Damn Cisco Internetworking Book Period
by Michael E Flannagan, Ron Fuller, Umer Khan, and Martin Walshaw
Ccsp Snpa Official Exam Certification Guide, 3/E (642-522)
by Bastien
Developing Secure Applications is targeted towards all developers and security programmers. Mobile apps, website applications, and enterprise applications developers would especially benefit from dedicated tools and case studies covered in the book. Written for the reader with no prior knowledge of how to build secure mobile and web-based applications and to test for their security, the book explains all the necessary concepts, tips and tricks, and practical real-life security threats. The book...
Federal Information Processing Standards Publications
by National Institute of Standards and Tech
Computational Number Theory (Discrete Mathematics and Its Applications)
by Abhijit Das
Developed from the author's popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning graduate students in engineering. It is also suitable for researchers new to the field and pract
Electronic Government (Lecture Notes in Computer Science, #3591)
by Maria A Wimmer
The International Handbook of Computer Security
by Dr. Jae K. Shim, Anique Qureshi, and Joel Siegel
This SpringerBrief mainly focuses on effective big data analytics for CPS, and addresses the privacy issues that arise on various CPS applications. The authors develop a series of privacy preserving data analytic and processing methodologies through data driven optimization based on applied cryptographic techniques and differential privacy in this brief. This brief also focuses on effectively integrating the data analysis and data privacy preservation techniques to provide the most desirable sol...
Strategic Approaches to Digital Platform Security Assurance
by Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves Vanderbeken, and Dennis Verslegers
Nowadays it is impossible to imagine a business without technology as most industries are becoming ""smarter"" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and ""platform""-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human auton...
Cognitive Radio
The scarcity of radio spectrum is one of the most urgent issues at the forefront of future network research that is yet to be addressed. To address the problem of spectrum usage efficiency, the cognitive radio (CR) concept was proposed. The challenges of employing CRs include ensuring secure device operations and data transmission with advanced computing techniques. Successful development of CR systems will involve attainment of the following key objectives: Increasing the rate and capacity of...
Attack and Defend Computer Security Set
by Dafydd Stuttard, Marcus Pinto, Michael Hale Ligh, Steven Adair, Blake Hartstein, and Ozh Richard
Defend your networks and data from attack with this unique two-book security set The Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker s Handbook and Malware Analyst s Cookbook. This special security bundle combines coverage of the two most crucial tactics used to defend networks, applications, and data from attack while giving security professionals insight into the underlying details of these attacks themselves. The...
CCNA Security 210-260 Certification Guide
by Glen D. Singh, Michael Vinod, and Vijay Anandh
Become a Cisco security specialist by developing your skills in network security and explore advanced security technologies About This Book • Enhance your skills in network security by learning about Cisco's device configuration and installation • Unlock the practical aspects of CCNA security to secure your devices • Explore tips and tricks to help you achieve the CCNA Security 210-260 Certification Who This Book Is For CCNA Security 210-260 Certification Guide can help you become a network...
Ace your preparation for the CompTIA A+ Exams 220-801 and 220-802 with this 2-in-1 Training Kit from Microsoft Press. Work at your own pace through a series of lessons and practical exercises, and then assess your computing technology skills with the online practice test-featuring multiple, customizable testing options to meet your specific needs. Your Training Kit includes: In-depth coverage of all 10 CompTIA domains in Exams 220-801 and 220-802 Instructive case studies to enhance your perform...
Certification & Accreditation of Federal Information Systems Volume V
by National Institute of Standards & Techno
This book offers critical and practical insight into one of the most important yet overlooked areas of systems management. Many corporations are in the process of changing their closed and proprietary information processing infrastructures to open, standards-based, integrated environments. The ability to maintain and extend security during this transition is of paramount importance to such organizations. Network Security is a practical guide to designing and implementing a variety of fundamental...
Data and Applications Security XXIII (Lecture Notes in Computer Science)
Russian Disinformation Efforts on Social Media
by Elina Treyger, Joe Cheravitch, and Raphael S Cohen
Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation
by Bruce Dang, Alexandre Gazet, and Elias Bachaalany
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practicesKey FeaturesExplore useful recipes for implementing robust cloud security solutions on AWSMonitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and MaciePrepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offeringsBook DescriptionAs a sec...
Practical Hive
by Scott Shaw, Andreas Francois Vermeulen, Ankur Gupta, and David Kjerrumgaard
Dive into the world of SQL on Hadoop and get the most out of your Hive data warehouses. This book is your go-to resource for using Hive: authors Scott Shaw, Ankur Gupta, David Kjerrumgaard, and Andreas Francois Vermeulen take you through learning HiveQL, the SQL-like language specific to Hive, to analyze, export, and massage the data stored across your Hadoop environment. From deploying Hive on your hardware or virtual machine and setting up its initial configuration to learning how Hive interac...