Processing ......
processing
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
Computer, Networks, and Information Security. Cybersecurity
Related Book Categories:
  • Security of Ubiquitous Computing Systems (Gildas Avoine, et al)

    It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.

  • Security Concepts (Subspacefield)

    This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.

  • Rational Cybersecurity for Business (Daniel Blum)

    This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.

  • Security Engineering: Building Dependable Distributed Systems

    It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.

  • Web Application Security: Exploitation and Countermeasures

    This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. It introduces three pillars of web application security: recon, offense, and defense.

  • Handbook of Digital Face Manipulation and Detection

    This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the both biometrics and media forensics fields.

  • Demystifying Internet of Things Security (Sunil Cheruvu, et al)

    This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. It provides clarity to industry professionals and provides and overview of different security solutions.

  • Next-Generation Firewalls For Dummies (Palo Alto Networks)

    This book will show you how to rethink your security strategy to counter and block even the most sophisticated attacks, help you understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one.

  • Advances in Security in Computing and Communications

    This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It covers cryptography, network security, and security and privacy issues in the Internet of Things (IoT).

  • Cryptography and Computer Security (Chris Bourke, et al)

    This book introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security.

  • Beautiful Security: Leading Security Experts Explain How They Think

    This book features a collection of essays and insightful analyses by leaders who have found unusual solutions for writing secure code, designing secure applications, addressing modern challenges such as wireless security, and much more.

  • Security+ Essentials (Neil Smyth)

    This book is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ examination. It is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.

  • Building the Infrastructure for Cloud Security: A Solutions View

    This book provides a comprehensive look at the various facets of cloud security - infrastructure, network, services, Compliance and users. It highlights the fundamental technology components necessary to build and enable trusted clouds.

  • The Security Development Lifecycle: More Secure Software

    This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). It guides you through each stage of the SDL-from education and design to testing and post-release.

  • Open Source Security Tools: A Practical Guide to Security Apps

    This book is a practical, hands-on introduction to open source security tools. It reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the "best of breed" for all major areas of information security.

  • Forensic Discovery (Dan Farmer, et al)

    This book covers both theory and hands-on practice of computer forensics, introducing a powerful approach that can often recover evidence considered lost forever. It covers everything from file systems, to memory and kernel hacks, to malware.

  • Hacking Exposed Computer Forensics (Aaron Philipp, et al)

    This book explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents.

  • Vulnerability Management for Dummies (Wolfgang Kandek)

    This book is all about what you can do to automatically manage vulnerabilities and keep your network safe from attack. It arms you with the facts and shows you how to implement a successful Vulnerability Management program.

  • Security Enhanced Applications for Information Systems

    this book aims to present a number of innovative security enhanced applications. It is also a quality guide for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems.

  • Unmanned Aircraft Systems in the Cyber Domain

    It will fully immerse and engage the readers in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). It brings a breadth and quality of information that is unparalleled in the unclassified sphere.

  • Intrusion Detection Systems with Snort, Apache, MySQL, PHP, ACID

    This book provides information about how to use free Open Source tools to build and manage an Intrusion Detection System. Provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.

  • Identity Management on a Shoestring (Ganesh Prasad, et al)

    This book is aimed at Security and IT practitioners (especially architects) in end-user organisations who are responsible for implementing an enterprise-wide Identity and Access Management (IAM) system.

  • Survive The Deep End: PHP Security (Padraic Brady)

    This book will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, etc.

  • Kali Linux: Assuring Security by Penetration Testing

    This book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing to detailed coverage.

  • Web Application Security Guide (Jan Schejbal)

    This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

  • Web Application Security for Dummies (Mike Shema)

    This book is a quick guide to understanding how to make your website secure. It surveys the best steps for establishing a regular program to quickly find vulnerabilities in your site with a web application scanner.

  • Web Servers Succinctly (Marc Clifton)

    This book provides great insights on the benefits of building your own web server, and covers different options available for threading, work processes, session management, routing, and security.

  • Theory and Practice of Cryptography and Network Security Protocols

    This book discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges.

  • Nmap Cookbook: The Fat-Free Guide to Network Security Scanning

    This book provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.

  • The Coming Swarm: DDOS Actions, Hacktivism, and Internet

    This book examines the history, development, theory, and practice of Distributed Denial of Service (DDoS) actions as a tactic of political activism, with a historically grounded analysis, and a focus on early deployments of activist DDOS.

  • Juniper SRX Series: A Comprehensive Guide to Security Services

    This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper's SRX Series networking device.

  • Handbook of Information Security Management (Micki Krause)

    Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

  • UNIX System Security: A Guide for Users and System Administrators

    This book begins by examining four high-profile breaches of UNIX security as illustrations of how a UNIX system can be attacked. It then provides the information necessary to protect against these forms of attack, and offers the tools.

  • BIOS Disassembly Ninjutsu Uncovered (Darmawan Salihun)

    Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs.

  • The SELinux Notebook, 4th Edition (Richard Haines)

    If you want an effective means of securing your Linux system (and who doesn't?), this book provides the means. This best-known and most respected security-related extension to Linux embodies the key advances of the security field.

  • Cryptography and Security in Computing (Jaydip Sen)

    The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography mechanisms.

  • Applied Cryptography and Network Security (Jaydip Sen)

    This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks.

  • Visual Cryptography and Its Applications (Jonathan Weir, et al)

    In this book, one of the data security methods known as visual cryptography (VC) is presented. Many types of visual cryptography are examined. From the very first type of traditional visual cryptography right up to the latest developments.

  • Public-Key Cryptography: Theory and Practice (Bodo Moeller)

    This book examines multiple aspects of public-key cryptography. It covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.

  • Rethinking Public Key Infrastructures and Digital Certificates

    In this book, the author proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Potential applications include electronic cash, electronic postage, digital rights management, etc.

  • Firewalls and Internet Security: Repelling the Wily Hacker

    This book gives invaluable advice and practical tools for protecting our computers. Learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your easy access to Internet services.

  • Firewalls Complete (Marcus Goncalves)

    This info-packed book covers virtually all firewall techniques, technologies, and brands - and even includes a blueprint for designing your own. It gives you 100% of what you need to deliver fully functional applications quickly.

  • Building Internet Firewalls, 2nd Edition (E. Zwicky, et al)

    Without firewalls, network security problems can rage out of control. This book is is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall.

  • A Guide to Claims-Based Identity and Access Control (D. Baier, et al)

    This book explains what claims-based identity is and how to use it in the context of some commonly occurring scenarios. It deals with the fundamental issues, but it is practical and concise.

  • Ruby on Rails Security Guide (OWASP Foundation)

    This is the one and only source of information about Rails security topics, and I keep the community up-to-date with blog posts and conference talks in Europe. The Guide and the Project has been mentioned in several Rails books and web-sites.

  • Nmap Network Scanning: The Official Nmap Guide

    This book is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing.

  • Improving Web Services Security: Scenarios and Implementation

    Using end-to-end application scenarios, this free book shows you how to design and implement authentication and authorization in WCF (Windows Communication Foundation).

  • Hacking the Xbox: An Introduction to Reverse Engineering

    This book shows Xbox owners how to increase the value and utility of their system, Hacking the Xbox features step-by-step tutorials on hardware modification that teach basic hacking techniques as well as essential reverse engineering skills.

  • Mastering Ethereum: Building Smart Contracts and DApps

    The book is intended to serve both as a reference manual and as a cover-to-cover exploration of Ethereum. If you're looking to get started with the Ethereum protocol (open source developers, integrators, etc.), this is the definitive book on the topic.

  • Mastering Bitcoin: Programming the Open Blockchain

    This book is your guide through the seemingly complex world of Bitcoin, providing the knowledge you need to participate in the internet of money. It will help you engineer money. You're about to unlock the API to a new economy. This book is your key.

  • O'Reilly® SpamAssassin (Alan Schwartz )

    This book is the only published resource devoted to SpamAssassin and how to integrate it effectively into your networks.

  • Secrets of Network Cartography: A Comprehensive Guide to Nmap

    In this book, thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis!

  • Network Security Tools: Writing, Hacking, and Modifying Security

    This concise, high-end free book discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment.

  • O'Reilly® Snort Cookbook (Angela Orebaugh, Simon Biles, et al)

    This book offers far more than quick cut-and-paste solutions to frustrating security issues using Snort, the defacto open source standard of intrusion detection tools

  • The .NET Developer's Guide to Windows Security (Keith Brown)

    This book is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems.

  • O'Reilly® Practical UNIX and Internet Security, Second Edition

    This book is a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection.

  • Computer Security Handbook (Seymour Bosworth, et al.)

    This handbook has compiled advice about how to minimize the possibility of computer security breaches in your systems. It provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more.

  • Own Your Space: Keep Yourself and Your Stuff Safe Online

    Defensive Computing Techniques to Help You Avoid Malware and Data Loss. This handbook is designed to help you find ways to protect your Windows XP/Vista/7 PC and ensure your data is safe.

  • Internet Safety: Keeping your Computer Safe on the Internet

    It covers the basics - the things you must do, the software you must run and the concepts you need to be aware of - to keep your computer and your data safe as you use the internet.

  • Cryptography's Role in Securing the Information Society

    This book addresses the need for a strong national policy on cryptography that protects the information interests of individuals and businesses while respecting the needs of law enforcement and intelligence for national security and foreign policy purposes.

Book Categories
:
Other Categories
Resources and Links