Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Security


21. 

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

By: 

Publisher: John Wiley & Sons

Publication Date: 17-FEB-2014

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it's packed with practical...

22. 

Data-Driven Security: Analysis, Visualization and Dashboards

Data-Driven Security: Analysis, Visualization and Dashboards

By: 

Publisher: John Wiley & Sons

Publication Date: 24-FEB-2014

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and...

23. 

Carry On: Sound Advice from Schneier on Security

Carry On: Sound Advice from Schneier on Security

By: 

Publisher: John Wiley & Sons

Publication Date: 16-DEC-2013

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events that...

24. 

Hack Proofing Your Network 2E, 2nd Edition

Hack Proofing Your Network, 2nd Edition

By: Syngress

Publisher: Syngress

Publication Date: 26-MAR-2002

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: · The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is...

25. 

Stealing the Network

Stealing the Network

By: Johnny Long; Timothy Mullen; Ryan Russell

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the...

26. 

Cyber Security Policy Guidebook

Cyber Security Policy Guidebook

By: 

Publisher: John Wiley & Sons

Publication Date: 24-APR-2012

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips...

27. 

Auditing Cloud Computing: A Security and Privacy Guide

Auditing Cloud Computing: A Security and Privacy Guide

By: 

Publisher: John Wiley & Sons

Publication Date: 09-AUG-2011

Insert Date: 11-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection,...

28. 

Mobile Device Security For Dummies

Mobile Device Security For Dummies

By: 

Publisher: For Dummies

Publication Date: 09-AUG-2011

Insert Date: 11-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate...

29. 

Information Security: Principles and Practice, 2nd Edition

Information Security: Principles and Practice, 2nd Edition

By: 

Publisher: John Wiley & Sons

Publication Date: 03-MAY-2011

Insert Date: 07-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a...

30. 

Penetration Testing with BackBox

Penetration Testing with BackBox

By: Stefan Umit Uygur

Publisher: Packt Publishing

Publication Date: 20-FEB-2014

Insert Date: 25-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

An introductory guide to performing crucial penetration testing operations using Backbox Experience the real world of penetration testing with Backbox Linux using live, practical examples Gain an insight into auditing and penetration testing processes by reading though live sessions Learn how to carry out your own testing using the latest techniques and methodologies In Detail BackBox is an amazing Linux security distribution designed to keep in mind the needs of security and system administration specialists. It has been developed to perform penetration tests and...

31. 

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

By: David Maynor

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 18-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code. This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter...

32. 

Network Security Through Data Analysis

Network Security Through Data Analysis

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 21-FEB-2014

Insert Date: 14-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques....

33. 

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

By: Michael Howard; David LeBlanc; John Viega

Publisher: McGraw-Hill Osborne Media

Publication Date: 03-SEP-2009

Insert Date: 05-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities Fully updated to cover...

34. 

Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures

By: Antonio Ruiz-Martinez; Rafael Marin-Lopez; Fernando Pereniguez-Garcia

Publisher: IGI Global

Publication Date: 30-SEP-2013

Insert Date: 30-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for...

35. 

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing

By: Himanshu Kumar

Publisher: Packt Publishing

Publication Date: 24-JAN-2014

Insert Date: 29-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing Successfully install Nessus and configure scanning options Learn useful tips based on real-world issues faced during scanning Use Nessus for compliance checks In Detail IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most...

36. 

Advances in Secure Computing, Internet Services, and Applications

Advances in Secure Computing, Internet Services, and Applications

By: B.K. Tripathy; D.P. Acharjya

Publisher: IGI Global

Publication Date: 31-DEC-2013

Insert Date: 24-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evoked intelligent solutions that have been utilized in efforts to secure this data and avoid potential complex problems. Advances in Secure Computing, Internet Services, and Applications presents current research on the applications of computational intelligence in order to focus on the challenge humans face when securing knowledge and data. This book is a vital reference source for researchers, lecturers, professors, students, and developers, who...

37. 

Security Program and Policies: Principles and Practices, Second Edition

Security Program and Policies: Principles and Practices, Second Edition

By: Sari Greene

Publisher: Pearson Certification

Publication Date: 19-MAR-2014

Insert Date: 24-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today’s challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information security management career In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you...

38. 

Security and Trust in Online Social Networks

Security and Trust in Online Social Networks

By: Barbara Carminati; Elena Ferrari; Marco Viviani

Publisher: Morgan & Claypool Publishers

Publication Date: 01-DEC-2013

Insert Date: 18-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to...

39. 

Mobile Platform Security

Mobile Platform Security

By: N. Asokan; Lucas Davi; Alexandra Dmitrienko; Stephan Heuser

Publisher: Morgan & Claypool Publishers

Publication Date: 01-DEC-2013

Insert Date: 18-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model...

40. 

Kali Linux Social Engineering

Kali Linux Social Engineering

By: Rahul Singh Patel

Publisher: Packt Publishing

Publication Date: 24-DEC-2013

Insert Date: 27-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Effectively perform efficient and organized social engineering tests and penetration testing using Kali Learn about various attacks and tips and tricks to avoid them Get a grip on efficient ways to perform penetration testing. Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing In Detail Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social...