Filter
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the …
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and …
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues …
Become a cyber-hero - know the common wireless weaknesses "e;Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security …
This book gives a detailed overview of SIP specific security issues and how to solve them While the standards and products for VoIP and SIP services have reached market maturity, …
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the …
During the Global Financial Crisis in 2008, our financial infrastructure failed. Governments bailed out the very institutions that let the economy down. This episode spurred a …
Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of …
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography …
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with …