PGP & GPG

PGP & GPG

OpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Privacy) as originally developed by Phil Zimmermann. The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys. PGP & GPG is an easy-to…

Network Security Bible

Network Security Bible

* A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security * Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the…

Computer Viruses For Dummies

Computer Viruses For Dummies

Computer viruses – just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Remember, if you…

Crackproof Your Software

Crackproof Your Software

This essential resource for software developers highlights the weak points in “well-protected” software, shows how crackers break common protection schemes, and how to defend against crackers. Includes in-depth discussions of anti-debugging and anti-disassembling.

Network Security with OpenSSL

Network Security with OpenSSL

OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet…

The Fundamentals of Network Security

The Fundamentals of Network Security

Here’s a practical book that introduces fundamental network security concepts, principles, and terms. It helps you identify the best type of intrusion detection system, develop organizational guidelines for passwords, set computer security policies, and perform a security review and risk assessment.

555ebee55e1b9.jpg

Database Nation

As the 21st century begins, advances in technology endanger our privacy in ways never before imagined. This newly revised update of the popular hardcover edition, Database Nation: The Death of Privacy in the 21st Century, is the compelling account of how invasive technologies will affect our lives in…

Applied Cryptography, 2nd Edition

Applied Cryptography, 2nd Edition

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical…