Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Security


1. 

Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime and Cyber Terrorism Investigator's Handbook

By: Babak Akhgar; Andrew Staniforth; Francesca Bosco

Publisher: Syngress

Publication Date: 26-NOV-2014

Insert Date: 24-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and...

2. 

Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition

Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition

By: Michael Krausz

Publisher: IT Governance Ltd

Publication Date: 27-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

What if you suffer an information security breach? Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions.  Information Security Breaches - Avoidance and treatment based on ISO27001:2013  helps you to manage this threat by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive When your organisation’s security is compromised, you cannot afford to waste time deciding how to resolve the issue. You must be ready to take prompt and...

3. 

Penetration Testing Services Procurement Guide

Penetration Testing Services Procurement Guide

By: CREST

Publisher: IT Governance Ltd

Publication Date: 15-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities.It presents a useful overview of the key concepts you will need to understand to conduct a well-managed penetration test, explaining what a penetration test is (and is not), outlining its strengths and limitations, and describing why an organisation would typically choose to employ an external provider of penetration testing services. ...

4. 

Procuring Penetration Testing Services

Procuring Penetration Testing Services

By: CREST

Publisher: IT Governance Ltd

Publication Date: 15-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat to key systems is ever increasing and the probability of a security weakness being accidentally exposed or maliciously exploited needs to be continually assessed – such as via a penetration test – to ensure that the level of risk is at an acceptable level to the business. A penetration test involves the use of a variety of manual and automated techniques to simulate an attack on an organisation’s information security arrangements –...

5. 

CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition

CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition

By: Julie Mehan

Publisher: IT Governance Ltd

Publication Date: 08-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Successful cyberattacks can damage your organisation, no matter who is behind them The goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same – but the outcomes can be equally devastating. Each can cause serious challenges for your organisation, ranging from information theft and disruption of normal operations to loss of reputation or credibility. Cyber security is much more than technology Many books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and other...

6. 

Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

By: Robert W. Beggs

Publisher: Packt Publishing

Publication Date: 24-JUN-2014

Insert Date: 26-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers Conduct realistic and effective security tests on your network Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools In Detail Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security—from selecting the most effective...

7. 

Building Virtual Pentesting Labs for Advanced Penetration Testing

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Publisher: Packt Publishing

Publication Date: 20-JUN-2014

Insert Date: 24-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Build intricate virtual architecture to practice any penetration testing technique virtually Build and enhance your existing pentesting methods and skills Get a solid methodology and approach to testing Step-by-step tutorial helping you build complex virtual architecture In Detail A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or network from the outside world and internal threats. With the increase of advanced hackers and threats to our virtual world, pentesting is an...

8. 

Anti-Hacker Tool Kit, Fourth Edition, 4th Edition

Anti-Hacker Tool Kit, Fourth Edition

By: Mike Shema

Publisher: McGraw-Hill Osborne Media

Publication Date: 14-JAN-2014

Insert Date: 17-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to...

9. 

The Browser Hacker's Handbook

The Browser Hacker's Handbook

By: 

Publisher: John Wiley & Sons

Publication Date: 24-MAR-2014

Insert Date: 12-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates...

10. 

The Basics of Information Security, 2nd Edition

The Basics of Information Security, 2nd Edition

By: Jason Andress

Publisher: Syngress

Publication Date: 20-MAY-2014

Insert Date: 31-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply...

11. 

Multidisciplinary Perspectives in Cryptology and Information Security

Multidisciplinary Perspectives in Cryptology and Information Security

By: Sattar Sadkhan Al Maliky; Nidaa Abbas

Publisher: IGI Global

Publication Date: 31-MAR-2014

Insert Date: 30-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT...

12. 

Penetration Testing with the Bash shell

Penetration Testing with the Bash shell

By: Keith Makan

Publisher: Packt Publishing

Publication Date: 26-MAY-2014

Insert Date: 28-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools Utilize the command line to create, run, and execute tests Learn useful command line based information processing utilities and unlock the problem solving power of a Linux terminal Practical demonstrations using in-depth explanations and screenshots to help you use the Linux Bash terminal to tackle a collection of common security-related problems. In Detail This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and...

13. 

Mastering Metasploit

Mastering Metasploit

By: Nipun Jaswal

Publisher: Packt Publishing

Publication Date: 26-MAY-2014

Insert Date: 28-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

Write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach Develops Real World Approaches to Penetration testing using Metasploit Develop advanced skills to carry out effective Risk validation Develop skills to fabricate any kind of function within the Framework. In Detail The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services. This book is a hands-on guide to penetration testing using Metasploit and covers its complete...

14. 

International IT Governance

International IT Governance

By: Alan Calder

Publisher: Kogan Page

Publication Date: 03-AUG-2006

Insert Date: 15-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

The development of IT Governance, which recognizes the convergence between business and IT management, makes it essential for managers at all levels and in organizations of all sizes to understand how best to deal with information security risks. International IT Governance explores new legislation, including the launch of ISO/IEC 27001, which makes a single, global standard of information security best practice available....

15. 

Cases on Research and Knowledge Discovery

Cases on Research and Knowledge Discovery

By: Cecelia Brown; Kevin Peters; Kofi Nyarko

Publisher: IGI Global

Publication Date: 30-APR-2014

Insert Date: 09-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

To ensure its protection from enemies both foreign and domestic, a government must invest resources and personnel toward the goal of homeland security. It is through these endeavors that citizens are able to live out their lives in peace. Cases on Research and Knowledge Discovery: Homeland Security Centers of Excellence presents a series of studies and descriptive examples on the US Department of Homeland Security and related research. Through its investigation of interesting challenges and thought-provoking ideas, this volume offers professionals, researchers, and academics in the fields of...

16. 

Ninja Hacking

Ninja Hacking

By: Thomas Wilhelm; Jason Andress

Publisher: Syngress

Publication Date: 02-NOV-2010

Insert Date: 03-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today’s ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company’s assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has:...

17. 

Security Risks in Social Media Technologies

Security Risks in Social Media Technologies

By: Alan Oxley

Publisher: Chandos Publishing

Publication Date: 31-JUL-2013

Insert Date: 01-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The...

18. 

Network Security Technologies

Network Security Technologies

By: Abdelmalek Amine; Otmane Mohamed; Boualem Benatallah

Publisher: IGI Global

Publication Date: 30-NOV-2013

Insert Date: 01-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested...

19. 

Safeguarding Cultural Properties

Safeguarding Cultural Properties

By: Stevan P. Layne

Publisher: Butterworth-Heinemann

Publication Date: 01-APR-2014

Insert Date: 01-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate...

20. 

Workplace Security Essentials

Workplace Security Essentials

By: Eric N. Smith

Publisher: Butterworth-Heinemann

Publication Date: 18-MAR-2014

Insert Date: 01-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

Whether you are a business owner, department manager, or even a concerned employee, Workplace Security Essentials will show you how to improve workplace safety and security using real-life examples and step-by-step instructions. Every organization, be it large or small, needs to be prepared to protect its facilities, inventory, and, most importantly, its staff. Workplace Security Essentials is the perfect training resource to help businesses implement successful security measures, boost employee morale and reduce turnover, protect the company’s reputation and public profile, and...