5a94c6ff44466.jpg
PDF
Complexity, Security and Civil Society in East Asia

Complexity, Security and Civil Society in East Asia offers the latest understanding of complex global problems in the region, including nuclear weapons, urban insecurity, energy, and climate change. Detailed case studies of China, North and South Korea, and Japan demonstrate the importance of civil society and 'civic diplomacy' in reaching shared solutions to these problems in East Asia and beyond. Each chapter describes regional civ...

5a94b2565a2b6.jpg
PDF
CompTIA Security+ Guide to Network Security Fundamentals (5th Edition)

This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional certification and career success. The text covers the essentials of network security, including compli...

5a94b255008ea.jpg
PDF
Software Quality Assurance : Integrating Testing, Security, and Audit

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and contribute quality to projects and applications. The practical synopsis on common testing tools helps readers who are in testing jobs or thos...

5a90b8407e1d2.jpg
PDF
Learning iOS Penetration Testing

This book is for IT security professionals who want to conduct security testing of applications. This book will give you exposure to diverse tools to perform penetration testing. This book will also appeal to iOS developers who would like to secure their applications, as well as security professionals. It is easy to follow for anyone without experience of iOS pentesting.

5a90b83f432fa.jpg
PDF
Strategic Cyber Deterrence : The Active Cyber Defense Option

According to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Commi...

5a8f5f521a2d1.jpg
PDF
Plugged In: Cybersecurity in the Modern Age

The University of Florida has an ambitious goal: to harness the power of its faculty, staff, students, and alumni to solve some of society’s most pressing problems and to become a resource for the state of Florida, the nation, and the world. Cybersecurity is the most pressing issue of our increasingly interconnected and networked lives. Recent estimates predict that worldwide the number of connected devices―everything from computers ...

5a8cc8e6f0339.jpg
PDF
Practical Paranoia iOS 11 Security Essentials

New edition, completely updated for iOS 11, released September 23, 2017. The best-selling, easiest, step-by-step, most comprehensive guide to securing your home or business iPhones and iPads. Official workbook for the Practical Paranoia: Security Essentials Workshop, STEM and college cybersecurity courses. Designed for instructor-led and self-study. The entire course is contained within the book. Includes all instructor presentations...

5a8c0f485b68d.jpg
PDF
Dynamic Networks and Cyber-Security

As an under-studied area of academic research, the analysis of computer network traffic data is still in its infancy. However, the challenge of detecting and mitigating malicious or unauthorised behaviour through the lens of such data is becoming an increasingly prominent issue.This collection of papers by leading researchers and practitioners synthesises cutting-edge work in the analysis of dynamic networks and statistical aspects o...

5a8c0f4712fdd.jpg
PDF
Passwords: The Key to Your Information Kingdom

This was created for busy IT Security folks, who have to juggle with daily operations, project advisories, incident response, audits AND IT security awareness. The slides (the link to the actual editable Powerpoint slides is in the PDF) come with suggested speaker’s note so it’s a ready-to-present material. This is the first part of a multi-part series for IT Security folks to conduct Security Awareness course. The content is also ma...

5a80cf9375758.jpg
PDF
Spring Security Essentials

A fast-paced guide for securing your Spring applications effectively with the Spring Security framework About This Book Explore various security concepts using real-time examples of the Spring Security framework Learn about the functionalities that implement industry standard authentication and authorization mechanisms to secure enterprise-level applications Design and develop advanced Spring Security layers by following a step-by-st...