574907225c998.jpg

Security and Privacy in Internet of Things (IoTs)

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world…

Information Security, 2nd Edition

Information Security, 2nd Edition

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new…

Intermediate Security Testing with Kali Linux 2

Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security…

Kali Linux CTF Blueprints

Kali Linux CTF Blueprints

As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting…

The Architecture of Privacy

The Architecture of Privacy

Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of…

Big Data Forensics - Learning Hadoop Investigations

Big Data Forensics – Learning Hadoop Investigations

Big Data forensics is an important type of digital investigation that involves the identification, collection, and analysis of large-scale Big Data systems. Hadoop is one of the most popular Big Data solutions, and forensically investigating a Hadoop cluster requires specialized tools and techniques. With the explosion of Big…

IBM WebSphere Application Server v7.0 Security

IBM WebSphere Application Server v7.0 Security

For IBM WebSphere users, this is the complete guide to securing your applications with Java EE and JAAS security standards. From a far-ranging overview to the fundamentals of data encryption, all the essentials are here. Overview Discover the salient and new security features offered by WebSphere Application Server…

Bitcoin Essentials

Bitcoin Essentials

Blockchain is being billed as the technology of the future. Bitcoin is the first application of that technology. Mining is what makes it all possible. Exploring mining from a practical perspective will help you make informed decisions about your mining setup. Understanding what the future may hold for…

Hacking For Dummies, 5th Edition

Hacking For Dummies, 5th Edition

Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! “Hacking For Dummies, 5th Edition” is a fully updated resource that guides you in hacking your system to better protect your network against malicious…

BeagleBone for Secret Agents

BeagleBone for Secret Agents

The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create…