5ae9a415cebd8.jpg
PDF
CISSP in 100 Pages: A Study Companion (Last Minute Exam Cram)

The CISSP is a global measure of excellence in the world of cybersecurity. This 100-page study review summarizes what you need to know to be successful with the CISSP certification exam. CISSP in 100 Pages is intended to supplement your other CISSP study materials and act as a review or a refresher for the large content areas the certification exam covers.

5ae9a4145dd18.jpg
PDF
Understanding the New European Data Protection Rules

Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply with them. Where US organizations and businesses who collect or receive EU personal data fail to comply with the rule, the bottom line c...

5ae7d06e232db.jpg
PDF
Mastering Kali Linux for Advanced Penetration Testing - Second Edition

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book Employ advanced pentesting techniques with Kali Linux to build highly-secured systems Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches Select and configure the most effective tools from Kali Linux to test network secu...

5ae6a20dd543c.jpg
PDF
Spy the Lie: Former CIA Officers Teach You How to Detect Deception

THE NEW YORK TIMES BESTSELLER Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie Imagine how different your life would be if you could tell whether someone was lying or telling you the truth. Be it hiring a new employee, investing in a financial interest, speaking with your child about drugs, confronting your significant other about s...

5ae14071954f1.jpg
PDF
Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext

In June 2016 the National Academies of Sciences, Engineering, and Medicine convened the Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext. Participants at this workshop discussed potential encryption strategies that would enable access to plaintext information by law enforcement or national security agencies with appropriate authority. Although the focus of the workshop was on technical issues, there...

5ae1407037ecd.jpg
PDF
Cybersecurity and Cyber-Information Sharing : Legal and Economic Analyses

Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting Ame...

5adfc9db17f3f.jpg
PDF
Online Health and Safety: From Cyberbullying to Internet Addiction

This book explores 10 unique facets of Internet health and safety, including physical safety, information security, and the responsible use of technology, offering takeaways from interviews with experts in the field and suggestions for proactively improving users' Internet safety. • Addresses a wide range of topics related to Internet health and safety, all of which are highly relevant to students and young adults • Includes a subjec...

5adfc9d9c0e79.jpg
PDF
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms

By Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, and Edgar Weippl Abstract The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very diverse and amongst others include: technical enthusiasts, activist groups, researchers from various disciplines, start ups, large enterprises, public au...

5ade7a7d47d4b.jpg
PDF
The Kish Cypher : The Story Of KLJN For Unconditional Security

Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself. This book clarifies the misinformation behind heated debates on the "Ki...

5aa0876cc0370.jpg
PDF
Zabbix Network Monitoring - Second Edition

Gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0 About This Book Monitor your network and deploy impressive business solutions with Zabbix 3.0 Manage hosts and system maintenance to keep your network performing for the people who use it A step-by-step guide to smarter network monitoring Who This Book Is For If you're new to Zabbix lo...