This encyclopedia provides a comprehensive reference to topics in biometrics including concepts, modalities, algorithms, devices, systems, security, performance testing, applications and standardization.
Develop a comprehensive understanding of the evolving landscape of digital trade and finance, including the historical context and the transformative impact of technological innovations on traditional practices.
Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades.
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more.
Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware.
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, Second Edition, discusses not only how to apply PCI in a practical and cost-effective way but more importantly why.
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques.
The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters.
Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes.
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection.
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity.
With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is brought into view, in real-time, through augmented reality.
Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing.
Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files.
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications.
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems.
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management.
Detailing a comprehensive set of requirements for secure and resilient software development and operation, this book supplies documented test cases for those requirements and best practices for testing nonfunctional requirements.
Implement decentralized blockchain applications to build scalable DappsKey FeaturesUnderstand the blockchain ecosystem and its terminologiesImplement smart contracts, wallets, and consensus protocolsDesign and develop decentralized applications using Bitcoin, Ethereum, and HyperledgerBook DescriptionThe Blockchain is a revolution promising a new world without middlemen.
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.
Learn the art of preventing digital extortion and securing confidential dataKey FeaturesGet acquainted with multiple cyber extortion attacks and techniques to mitigate themLearn how DDOS, Crypto Virus, and other cyber extortion techniques can infect your computers, smartphones, servers, and cloudA concise, fast-paced guide that develops your skills in protecting confidential data by leveraging widely used toolsBook DescriptionMore and more cyber threats keep emerging every day, affecting organizations across the board, targeting the entire spectrum of the Internet.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.
Fintech veteran and venture capitalist, Arunkumar Krishnakumar, cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together could redefine industries and life as we know it.
Get hands-on experience in using Burp Suite to execute attacks and perform web assessmentsKey FeaturesExplore the tools in Burp Suite to meet your web infrastructure security demandsConfigure Burp to fine-tune the suite of tools specific to the targetUse Burp extensions to assist with different technologies commonly found in application stacksBook DescriptionBurp Suite is a Java-based platform for testing the security of your web applications, and has been adopted widely by professional enterprise testers.