Books in category Computers – Security

  • Cyberspace Security and Defense Research Issues

    Cyberspace Security and Defense: Research Issues
    Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko

    This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense.

  • Physical Unclonable Functions in Theory and Practice

    Physical Unclonable Functions in Theory and Practice
    Christoph Böhm, Maximilian Hofer

    This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits. Additionally, the authors discuss the whole process of circuit design, layout and chip verification.

  • Viruses and Spam

    Viruses and Spam
    Deirdre Day-MacLeod

    Offers a practical guide on learning about spam and viruses that can help students become safe, smart cyber citizens.

  • Security Strategies in Windows Platforms and Applications

    Security Strategies in Windows Platforms and Applications
    Michael G. Solomon

    The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management.

  • Computer and Network Security Essentials

    Computer and Network Security Essentials
    Kevin Daimi

    This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem.

  • Penetration Testing with Raspberry Pi

    Penetration Testing with Raspberry Pi
    Joseph Muniz, Aamir Lakhani

    You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book.

  • Invisible Threats Financial and Information Technology Crimes and National Security

    Invisible Threats: Financial and Information Technology Crimes and National Security
    U. Gori, I. Paparela

    As has been said, cybercriminals and terrorists have already “crossed into the spectrum of information warfare”. This simply means that the same bases of sovereignty and state legitimacy are in jeopardy.

  • Preserving Electronic Evidence for Trial

    Preserving Electronic Evidence for Trial
    Ann D. Zeigler, Ernesto F. Rojas

    This practice handbook by an internationally known digital forensics expert and an experienced litigator focuses on what corporate and litigation counsel as well as IT managers and forensic consultants need to know to communicate …

  • Python Forensics

    Python Forensics
    Chet Hosmer

    Drawing upon years of practical experience and using numerous examples and illustrative code samples, author Chet Hosmer discusses how to: Develop new forensic solutions independent of large vendor software release schedules Participate in …

  • Public Administration as a Developing Discipline

    Public Administration as a Developing Discipline
    Golembiewski

    "The most comprehensive volume available on this topic, Public Adminstration as a Developing Discipline, in two parts, provides past, present and future perspectives on the development of public administration.

1 2 3 4 5 Next >