Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Security


1. 

Kali Linux – Assuring Security by Penetration Testing

Kali Linux – Assuring Security by Penetration Testing

By: Tedi Heriyanto; Lee Allen; Shakeel Ali

Publisher: Packt Publishing

Publication Date: 07-APR-2014

Insert Date: 10-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Master the art of penetration testing Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution Explore the insights and importance of testing your corporate network systems before the hackers strike Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing...

2. 

Cyberwar and Information Warfare

Cyberwar and Information Warfare

By: Daniel Ventre

Publisher: John Wiley & Sons

Publication Date: 15-AUG-2011

Insert Date: 28-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations,...

3. 

Rough Cuts
Information Security: Principles and Practices, Second Edition

Information Security: Principles and Practices, Second Edition

By: Mark S. Merkow; Jim Breithaupt

Publisher: Pearson Certification

Publication Date: 05-JUN-2014

Insert Date: 28-MAR-2014

Table of Contents • Start Reading

This is the Rough Cut version of the printed book. Fully updated for today's technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Authored by two of the world's most experienced IT security practitioners, it brings together foundational knowledge that prepares readers for real-world environments, making it ideal for introductory courses in information security, and for anyone interested in entering the field. This edition addresses today's newest trends,...

4. 

Analyzing Security, Trust, and Crime in the Digital World

Analyzing Security, Trust, and Crime in the Digital World

By: Hamid Nemati

Publisher: IGI Global

Publication Date: 31-DEC-2013

Insert Date: 26-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein....

5. 

Cyber Conflict: Competing National Perspectives

Cyber Conflict: Competing National Perspectives

By: Daniel Ventre

Publisher: John Wiley & Sons

Publication Date: 14-MAY-2012

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power. Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational...

6. 

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

By: 

Publisher: John Wiley & Sons

Publication Date: 17-FEB-2014

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems...

7. 

Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their...

8. 

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

By: 

Publisher: John Wiley & Sons

Publication Date: 04-NOV-2013

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a...

9. 

Unmasking the Social Engineer: The Human Element of Security

Unmasking the Social Engineer: The Human Element of Security

By: 

Publisher: John Wiley & Sons

Publication Date: 17-FEB-2014

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals...

10. 

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

By: 

Publisher: John Wiley & Sons

Publication Date: 17-FEB-2014

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it's packed with practical...

11. 

Data-Driven Security: Analysis, Visualization and Dashboards

Data-Driven Security: Analysis, Visualization and Dashboards

By: 

Publisher: John Wiley & Sons

Publication Date: 24-FEB-2014

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and...

12. 

Carry On: Sound Advice from Schneier on Security

Carry On: Sound Advice from Schneier on Security

By: 

Publisher: John Wiley & Sons

Publication Date: 16-DEC-2013

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events that...

13. 

Hack Proofing Your Network 2E, 2nd Edition

Hack Proofing Your Network, 2nd Edition

By: Syngress

Publisher: Syngress

Publication Date: 26-MAR-2002

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: · The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is...

14. 

Stealing the Network

Stealing the Network

By: Johnny Long; Timothy Mullen; Ryan Russell

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the...

15. 

Cyber Security Policy Guidebook

Cyber Security Policy Guidebook

By: 

Publisher: John Wiley & Sons

Publication Date: 24-APR-2012

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips...

16. 

Auditing Cloud Computing: A Security and Privacy Guide

Auditing Cloud Computing: A Security and Privacy Guide

By: 

Publisher: John Wiley & Sons

Publication Date: 09-AUG-2011

Insert Date: 11-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection,...

17. 

Mobile Device Security For Dummies

Mobile Device Security For Dummies

By: 

Publisher: For Dummies

Publication Date: 09-AUG-2011

Insert Date: 11-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate...

18. 

Information Security: Principles and Practice, 2nd Edition

Information Security: Principles and Practice, 2nd Edition

By: 

Publisher: John Wiley & Sons

Publication Date: 03-MAY-2011

Insert Date: 07-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a...

19. 

Penetration Testing with BackBox

Penetration Testing with BackBox

By: Stefan Umit Uygur

Publisher: Packt Publishing

Publication Date: 20-FEB-2014

Insert Date: 25-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

An introductory guide to performing crucial penetration testing operations using Backbox Experience the real world of penetration testing with Backbox Linux using live, practical examples Gain an insight into auditing and penetration testing processes by reading though live sessions Learn how to carry out your own testing using the latest techniques and methodologies In Detail BackBox is an amazing Linux security distribution designed to keep in mind the needs of security and system administration specialists. It has been developed to perform penetration tests and...

20. 

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

By: David Maynor

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 18-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code. This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter...