subcategories
Cryptography (25)
e-books in Computer Security & Cryptography category
Security and Privacy in Wireless and Mobile Networksby Georgios Kambourakis, et al. - MDPI AG , 2018
Dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. The focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.
(8857 views)
Passwords: Guised Indispensable's or Liabilities?by Kelvin Karanja , 2017
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
(7393 views)
Software Update as a Mechanism for Resilience and Security- The National Academies Press , 2017
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.
(7188 views)
The Security Development Lifecycleby Michael Howard, Steve Lipner - Microsoft Press , 2006
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). Security experts guide you through each stage of the SDL -- from design to testing and post-release.
(8996 views)
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaarby Lillian Ablon, Martin C. Libicki, Andrea A. Golay - RAND Corporation , 2014
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(9288 views)
Good Digital Hygiene: A guide to staying secure in cyberspaceby Ed Gelbstein - Bookboon , 2013
The explosive growth in the adoption of electronic devices by the general population is creating and environment where some measures of digital hygiene are needed to protect the devices and the data they contain as well as their owners.
(11320 views)
Provable Security of Networksby Angsheng Li, Yicheng Pan, Wei Zhang - arXiv , 2013
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
(11017 views)
Cryptography and Security in Computingby Jaydip Sen (ed.) - InTech , 2012
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
(22187 views)
Security Enhanced Applications for Information Systemsby Christos Kalloniatis - InTech , 2012
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(11068 views)
Security and Privacy for Microsoft Office 2010 Usersby Mitch Tulloch - Microsoft Press , 2012
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
(10862 views)
Cyber Infrastructure Protectionby Tarek N. Saadawi, Louis H. Jordan Jr. - Strategic Studies Institute , 2011
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(13031 views)
Information Security in Education- Wikibooks , 2010
This is an introduction to information security aimed primarily at K-12 administrators, educators, and technology staff. Security professionals have found that actions taken to increase security often have a minimal, or even opposite, effect.
(12232 views)
Policing Cyber Crimeby Petter Gottschalk - BookBoon , 2010
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
(16036 views)
What If Crime Were Impossible?by N. Richard Wagner - Univ. of Texas San Antonio , 2002
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(11046 views)
Fundamentals of Media Securityby WeiQi Yan, Jonathan Weir - BookBoon , 2010
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
(10976 views)
The Protection of Information in Computer Systemsby J.H. Saltzer, M.D. Schroeder - MIT , 1975
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(12375 views)
Safeguarding Your Technologyby Tom Szuba - NCES , 1998
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
(11914 views)
Security Conceptsby Travis H. - subspacefield.org , 2010
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.
(13509 views)
A Guide to Claims-Based Identity and Access Controlby Dominick Baier, at al. - Microsoft Press , 2010
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(14331 views)
The Antivirus Defense-in-Depth Guide- Microsoft Corporation , 2004
The Antivirus Defense-in-Depth Guide provides an overview of the types of malware and their risks, planning an effective antivirus strategy for your organization, and responding quickly and effectively to infections or incidents when they occur.
(16812 views)
The Open-source PKI Bookby Symeon Xenitellis - OpenCA Team , 2000
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
(12268 views)
Handbook of Information Security Managementby Micki Krause, Harold F. Tipton - Auerbach Publications , 1997
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. Learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
(15633 views)
Cryptography and Data Securityby Dorothy Elizabeth Robling Denning - Addison-Wesley , 1982
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(19642 views)
Rethinking Public Key Infrastructures and Digital Certificatesby Stefan A. Brands - The MIT Press , 2000
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(13130 views)
Security+ Essentials- Techotopia , 2008
This is an online book for people studying for the CompTIA Security+ exam and for those interested in designing and implementing secure IT environments. The concepts in this book apply equally to Windows, Linux, UNIX, and MacOS X.
(17679 views)
IT Security Cookbookby Sean Boran - Boran Consulting , 2003
This document defines a security policy, outlines structure of a security organization, presents current security mechanisms, and provides technical guidelines for operating systems, applications and networks used in client/server systems.
(17889 views)
Forensic Analysis of Database Tamperingby Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona , 2008
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(23190 views)
The Developer Highway Codeby Paul Maher, Alex Mackman - Microsoft Press , 2006
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(20830 views)
Security Engineering: A Guide to Building Dependable Distributed Systemsby Ross J. Anderson, Ross Anderson - Wiley , 2001
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(20406 views)
Forensic Discoveryby Dan Farmer, Wietse Venema - Addison-Wesley Professional , 2005
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(20499 views)
An Introduction to Computer Security: The NIST Handbookby National Institute of Standards and Technology , 2006
The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.
(20867 views)