FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
- Title: Security Concepts
- Author(s) Travis H.
- Publisher: Subspacefield; eBook (Creative Commons Licensed)
- License(s): Creative Commons License (CC)
- Hardcover/Paperback: N/A
- eBook: PDF
- Language: English
- ISBN-10: N/A
- ISBN-13: N/A
- ASIN: N/A
- Share This:
This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.
It provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.
For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it.
About the Authors- N/A
- Computer, Networks, and Information Security
- Cloud Computing, Distributed Systems, Grid Computing, etc.
- Computer Networks and Communications
- Parallel and Distributed Computing and Programming
-
CompTIA Security+ Study Guide (Netwrix)
This book is designed for IT and security professionals who aim to obtain CompTIA Security+ certification. It covers all the certification exam objectives (domains) of the latest version of the exam, Sy0-501.
-
Security in Distributed, Grid, Mobile, and Pervasive Computing
A rich and useful presentation of strategies for security issues, this book focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems.
-
Information Security Governance Simplified (Todd Fitzgerald)
This book lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.
-
Computer Security Handbook (Seymour Bosworth, et al.)
This handbook has compiled advice about how to minimize the possibility of computer security breaches in your systems. It provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more.
-
Security as Code: DevSecOps Patterns with AWS (BK Das, et al.)
It demonstrates how to use this methodology to secure any application and infrastructure you want to deploy. You'll learn how to create a secure containerized application with Kubernetes using CI/CD tooling from AWS and open source providers.
-
Security of Ubiquitous Computing Systems (Gildas Avoine, et al)
It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.
-
Building Secure and Reliable Systems: Best Practices
Security is crucial to the design and operation of scalable systems in production. Experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.
-
Rational Cybersecurity for Business (Daniel Blum)
This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.
-
Security Engineering: Building Dependable Distributed Systems
It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.
-
Web Application Security: Exploitation and Countermeasures
This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. It introduces three pillars of web application security: recon, offense, and defense.
-
Handbook of Digital Face Manipulation and Detection
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the both biometrics and media forensics fields.
-
Demystifying Internet of Things Security (Sunil Cheruvu, et al)
This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. It provides clarity to industry professionals and provides and overview of different security solutions.
-
Next-Generation Firewalls For Dummies (Palo Alto Networks)
This book will show you how to rethink your security strategy to counter and block even the most sophisticated attacks, help you understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one.
:
|
|