Good Digital Hygiene: A guide to staying secure in cyberspace
by Ed Gelbstein
Publisher: Bookboon 2013
Number of pages: 86
The explosive growth in the adoption of electronic devices by the general population (computers in various forms, smartphones and tablets) is creating and environment where some measures of digital hygiene (such as maintaining strong passwords, carrying out backups, not becoming a victim to phishing, etc.) are needed to protect the devices and the data they contain as well as their owners. This book presents 39 such measures.
Home page url
Download or read it online for free here:
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
by Christos Kalloniatis - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
by Michael Howard, Steve Lipner - Microsoft Press
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). Security experts guide you through each stage of the SDL -- from design to testing and post-release.
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.