Faster previews. Personalized experience. Get started with a FREE account.
Data-Driven Security

Data-Driven Security

by Bob Rudis
352 Pages · 2014 · 11.6 MB · 2,756 Downloads · New!
" Happiness doesn't result from what we get, but from what we give. ” ― Ben Carson
Database Nation
by Simson Garfinkel
336 Pages · 2000 · 6.1 MB · 4,537 Downloads · New!
As the 21st century begins, advances in technology endanger our privacy in ways never before imagined. This newly revised update of the popular hardcover edition, Database Nation: The Death of Privacy in the 21st Century, is the compelling account of how invasive technologies will affect our lives in the coming years. It’s a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today.
Applied Cryptography, 2nd Edition
by Bruce Schneier
662 Pages · 1996 · 2.8 MB · 2,013 Downloads · New!
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
Security Metrics
by Andrew Jaquith
336 Pages · 2007 · 4.1 MB · 4,620 Downloads · New!
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.
Security Power Tools
by Bryan Burns
864 Pages · 2007 · 12.1 MB · 2,323 Downloads · New!
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks’ Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.
Disassembling Code: IDA Pro and SoftICE
by Vlad Pirogov
365 Pages · 2006 · 3.4 MB · 3,387 Downloads · New!
This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level languages and recognize different elements of disassembled code in order to debug applications in less time. Also described are the basics of Assembly language programming (MASM) and the system and format of commands for the Intel microprocessor. Aspects of disassembling, analyzing, and debugging software code are considered in detail, and an overview of contemporary disassemblers and debuggers used when analyzing executable code is provided. The basics of working with these tools and their operating principles are also included, and emphasis is placed on analyzing software code and identifying the main structure of those languages in which they were written.
Network Security Hacks, 2nd Edition
by Andrew Lockhart
480 Pages · 2006 · 7.6 MB · 1,993 Downloads · New!
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The 2nd edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.