Welcome to E-Books Directory
This page lists freely downloadable books.
Computer Security & Cryptography
E-Books for free online viewing and/or download
e-books in this category
Cryptography and Security in Computing
by Jaydip Sen (ed.) - InTech , 2012
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
Security Enhanced Applications for Information Systems
by Christos Kalloniatis - InTech , 2012
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
Security and Privacy for Microsoft Office 2010 Users
by Mitch Tulloch - Microsoft Press , 2012
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
Cyber Infrastructure Protection
by Tarek N. Saadawi, Louis H. Jordan Jr. - Strategic Studies Institute , 2011
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
Information Security in Education
- Wikibooks , 2010
This is an introduction to information security aimed primarily at K-12 administrators, educators, and technology staff. Security professionals have found that actions taken to increase security often have a minimal, or even opposite, effect.
Policing Cyber Crime
by Petter Gottschalk - BookBoon , 2010
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
What If Crime Were Impossible?
by N. Richard Wagner - Univ. of Texas San Antonio , 2002
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
Fundamentals of Media Security
by WeiQi Yan, Jonathan Weir - BookBoon , 2010
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
Selected Aspects of Computer Security in Open Systems
by Danny Smith - Australian Computer Emergency Response Team , 1993
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. An examination of common authentication techniques is provided, including X.509 Strong Authentication and Kerberos.
The Protection of Information in Computer Systems
by J.H. Saltzer, M.D. Schroeder - MIT , 1975
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
Safeguarding Your Technology
by Tom Szuba - NCES , 1998
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
by Travis H. - subspacefield.org , 2010
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.
A Guide to Claims-Based Identity and Access Control
by Dominick Baier, at al. - Microsoft Press , 2010
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
The Antivirus Defense-in-Depth Guide
- Microsoft Corporation , 2004
The Antivirus Defense-in-Depth Guide provides an overview of the types of malware and their risks, planning an effective antivirus strategy for your organization, and responding quickly and effectively to infections or incidents when they occur.
The Open-source PKI Book
by Symeon Xenitellis - OpenCA Team , 2000
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
Handbook of Information Security Management
by Micki Krause, Harold F. Tipton - Auerbach Publications , 1997
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. Learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
Cryptography and Data Security
by Dorothy Elizabeth Rob, ling Denning - Addison-Wesley , 1982
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
Rethinking Public Key Infrastructures and Digital Certificates
by Stefan A. Brands - The MIT Press , 2000
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
- Techotopia , 2008
This is an online book for people studying for the CompTIA Security+ exam and for those interested in designing and implementing secure IT environments. The concepts in this book apply equally to Windows, Linux, UNIX, and MacOS X.
IT Security Cookbook
by Sean Boran - Boran Consulting , 2003
This document defines a security policy, outlines structure of a security organization, presents current security mechanisms, and provides technical guidelines for operating systems, applications and networks used in client/server systems.
Forensic Analysis of Database Tampering
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona , 2008
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
The Developer Highway Code
by Paul Maher, Alex Mackman - Microsoft Press , 2006
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
Security Engineering: A Guide to Building Dependable Distributed Systems
by Ross J. Anderson, Ross Anderson - Wiley , 2001
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
by Dan Farmer, Wietse Venema - Addison-Wesley Professional , 2005
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
An Introduction to Computer Security: The NIST Handbook
by National Institute of Standards and Technology , 2006
The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.