Selasa, 18 November 2014

BookDL - 25 new Books


BookDL - 25 new Books

Link to BookDL

Security and the Networked Society

Posted: 17 Nov 2014 06:24 PM PST

This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces […]

This book was posted on BookDL. Download free at Security and the Networked Society.

Computer and Information Security Handbook, 2nd Edition

Posted: 17 Nov 2014 06:21 PM PST

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading […]

This book was posted on BookDL. Download free at Computer and Information Security Handbook, 2nd Edition.

Security and Loss Prevention: An Introduction, 6th Edition

Posted: 17 Nov 2014 06:13 PM PST

The sixth edition of Security and Loss Prevention continues the tradition of providing introductory and advanced coverage of the body of knowledge of the security profession. To bridge theory to practice is the book’s backbone, and Philip Purpura continues this strong effort with new sidebars and text boxes presenting actual security challenges from real-life situations. […]

This book was posted on BookDL. Download free at Security and Loss Prevention: An Introduction, 6th Edition.

Managing Cisco Network Security

Posted: 17 Nov 2014 06:09 PM PST

Developed for IT professionals, this text details the strategies, tactics, and methods for designing, configuring, and maintaining Cisco Secure networks. It includes discussions on topics ranging from secure VPNs and intranets, to protected LANs and WANs. It also covers the full range of Cisco Secure hardware and software solutions, including PIX Firewall, Intrusion Detection System, […]

This book was posted on BookDL. Download free at Managing Cisco Network Security.

Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Posted: 17 Nov 2014 06:05 PM PST

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book will give a detailed analysis of modern threats and their solutions along with […]

This book was posted on BookDL. Download free at Extreme Exploits: Advanced Defenses Against Hardcore Hacks.

Web Applications (Hacking Exposed)

Posted: 17 Nov 2014 05:59 PM PST

Get in-depth coverage of Web application platforms and their vulnerabilities, presented the same popular format as the international bestseller, Hacking Exposed. Covering hacking scenarios across different programming languages and depicting various types of attacks and countermeasures, this book offers you up-to-date and highly valuable insight into Web application security. “Required reading for Web architects and […]

This book was posted on BookDL. Download free at Web Applications (Hacking Exposed).

ISSE 2013 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2013 Conference

Posted: 17 Nov 2014 05:49 PM PST

This book presents the most interesting talks given at ISSE 2013 ‘the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:- Cloud Security, Trust Services, eId & Access Management- Human Factors, Awareness & Privacy, Regulations and Policies- Security Management- Cyber Security, Cybercrime, Critical Infrastructures- Mobile Security & ApplicationsAdequate […]

This book was posted on BookDL. Download free at ISSE 2013 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2013 Conference.

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks

Posted: 17 Nov 2014 05:46 PM PST

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. […]

This book was posted on BookDL. Download free at The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks.

Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!

Posted: 17 Nov 2014 05:41 PM PST

Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes–which include client and network hub devices–up from about 4 million last year. This third book […]

This book was posted on BookDL. Download free at Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!.

Network Science and Cybersecurity

Posted: 17 Nov 2014 05:37 PM PST

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of  Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of […]

This book was posted on BookDL. Download free at Network Science and Cybersecurity.

Network Security

Posted: 17 Nov 2014 05:34 PM PST

This book provides a reference tool for the increasing number of scientists whose research is more or less involved in network security. Coverage includes network design and modeling, network management, data management, security and applications.

This book was posted on BookDL. Download free at Network Security.

Security and Privacy in Smart Grids

Posted: 17 Nov 2014 05:30 PM PST

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the […]

This book was posted on BookDL. Download free at Security and Privacy in Smart Grids.

Automated Security Management

Posted: 17 Nov 2014 05:27 PM PST

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices […]

This book was posted on BookDL. Download free at Automated Security Management.

Security for Wireless Sensor Networks using Identity-Based Cryptography

Posted: 17 Nov 2014 05:14 PM PST

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents […]

This book was posted on BookDL. Download free at Security for Wireless Sensor Networks using Identity-Based Cryptography.

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods

Posted: 17 Nov 2014 05:11 PM PST

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes: Pre-developed nonfunctional requirements that can be […]

This book was posted on BookDL. Download free at Secure and Resilient Software: Requirements, Test Cases, and Testing Methods.

Security for Cloud Storage Systems

Posted: 17 Nov 2014 05:08 PM PST

Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and […]

This book was posted on BookDL. Download free at Security for Cloud Storage Systems.

Securing Cloud and Mobility: A Practitioner’s Guide

Posted: 17 Nov 2014 05:05 PM PST

Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securing Cloud and Mobility: A Practitioner’s Guide explains how to secure the multifaceted layers of private and public cloud deployments as well as mobility infrastructures. With comprehensive coverage that includes network, server, and endpoint security, it […]

This book was posted on BookDL. Download free at Securing Cloud and Mobility: A Practitioner’s Guide.

Security and Privacy in Mobile Social Networks

Posted: 17 Nov 2014 05:03 PM PST

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative […]

This book was posted on BookDL. Download free at Security and Privacy in Mobile Social Networks.

IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing

Posted: 17 Nov 2014 04:59 PM PST

This book provides a comprehensive conceptualization of perceived IT security risk in the Cloud Computing context that is based on six distinct risk dimensions grounded on a structured literature review, Q-sorting, expert interviews, and analysis of data collected from 356 organizations. Additionally, the effects of security risks on negative and positive attitudinal evaluations in IT […]

This book was posted on BookDL. Download free at IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing.

Penetration Testing: Setting Up a Test Lab How-to

Posted: 17 Nov 2014 04:57 PM PST

In Detail Penetration testing is notoriously difficult to execute. With many different real-world scenarios to consider, and an ever growing number software and hardware to manage, testers need to be highly qualified in many fields. A controlled lab environment is crucial to the success of penetration testing and testers. “Instant Penetration Testing : Setting Up […]

This book was posted on BookDL. Download free at Penetration Testing: Setting Up a Test Lab How-to.

Privacy and Security for Cloud Computing

Posted: 17 Nov 2014 04:54 PM PST

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic challenges for legal […]

This book was posted on BookDL. Download free at Privacy and Security for Cloud Computing.

Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

Posted: 17 Nov 2014 04:48 PM PST

Comprehensive coverage is given in this up-to-date and practical guide to Web services security–the first to cover the final release of new standards SAML 1.1 and WS-Security. Rosenberg and Remy are security experts who co-founded GeoTrust, the #2 Web site certificate authority.

This book was posted on BookDL. Download free at Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption.

Hands-On Oracle Application Express Security: Building Secure Apex Applications

Posted: 17 Nov 2014 04:45 PM PST

An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications that are both fast and secure. However, as with any website, there […]

This book was posted on BookDL. Download free at Hands-On Oracle Application Express Security: Building Secure Apex Applications.

Pro Spring Security

Posted: 17 Nov 2014 04:13 PM PST

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security […]

This book was posted on BookDL. Download free at Pro Spring Security.

Foundations of Security Analysis and Design VII: FOSAD 2012 / 2013 Tutorial Lectures (Lecture Notes in Computer Science / Security and Cryptology)

Posted: 17 Nov 2014 04:10 PM PST

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to […]

This book was posted on BookDL. Download free at Foundations of Security Analysis and Design VII: FOSAD 2012 / 2013 Tutorial Lectures (Lecture Notes in Computer Science / Security and Cryptology).

Tidak ada komentar:

Posting Komentar