Fundamentals of Communications and Networking, Solomon Michael G.
Автор: Stuttard Dafydd Название: Web Application Hacker`s Handbook ISBN: 1118026470 ISBN-13(EAN): 9781118026472 Издательство: Wiley Рейтинг: Цена: 48570.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users.
Автор: Christopher Hadnagy Название: Social Engineering: The Science of Human Hacking, 2 ed. ISBN: 111943338X ISBN-13(EAN): 9781119433385 Издательство: Wiley Рейтинг: Цена: 30630.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание:
Harden the human firewall against the most current threats
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.
Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks.
Examine the most common social engineering tricks used to gain access
Discover which popular techniques generally don't work in the real world
Examine how our understanding of the science behind emotions and decisions can be used by social engineers
Learn how social engineering factors into some of the biggest recent headlines
Learn how to use these skills as a professional social engineer and secure your company
Adopt effective counter-measures to keep hackers at bay
By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.
Автор: Joshi Название: Fundamentals of Network Forensics ISBN: 1447172973 ISBN-13(EAN): 9781447172970 Издательство: Springer Рейтинг: Цена: 88500.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: provides learning objectives in every chapter, and review questions throughout the book to test understanding; introduces the basic concepts of network process models, network forensics frameworks and network forensics tools; discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics; examines a range of advanced topics, including botnet, smartphone, and cloud forensics; reviews a number of freely available tools for performing forensic activities.
Автор: Wiem Tounsi Название: Cyber–Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and IoT ISBN: 1786304481 ISBN-13(EAN): 9781786304483 Издательство: Wiley Рейтинг: Цена: 146730.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today's landscape, organizations need to acquire and develop effective security tools and mechanisms - not only to keep up with cyber criminals, but also to stay one step ahead.
Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems
Автор: Jovan Pehcevski Название: Security of Cloud-Based Systems ISBN: 1774077779 ISBN-13(EAN): 9781774077771 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 156150.00 T Наличие на складе: Нет в наличии. Описание: Covers different topics from security of cloud-based systems, including threat detection in cloud environments, frameworks for cloud security, enhancing the security in the cloud systems, and case studies.
Автор: Kewei Sha, Aaron Striegel, Min Song Название: Security, Privacy and Reliability in Computer Communications and Networks ISBN: 8793379897 ISBN-13(EAN): 9788793379893 Издательство: Taylor&Francis Рейтинг: Цена: 83690.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols. Technical topics discussed include vulnerabilities and intrusion detection; cryptographic algorithms and evaluation; and reliable routing protocols.
Автор: Blahut Название: Cryptography and Secure Communication ISBN: 1107014271 ISBN-13(EAN): 9781107014275 Издательство: Cambridge Academ Рейтинг: Цена: 99270.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This fascinating book presents the timeless mathematical theory underpinning cryptosystems both old and new, written specifically with engineers in mind. Ideal for graduate students and researchers in engineering and computer science, and practitioners involved in the design of security systems for communications networks.
Автор: Vimal Kumar, Amartya Sen, Sanjay Madria Название: Secure Sensor Cloud ISBN: 1681734702 ISBN-13(EAN): 9781681734705 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 82230.00 T Наличие на складе: Невозможна поставка. Описание: The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned.The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.
Автор: Quan Название: Emerging Networking Architecture and Technologies ISBN: 9811996962 ISBN-13(EAN): 9789811996962 Издательство: Springer Рейтинг: Цена: 102480.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book constitutes refereed proceedings of the First International Conference on Emerging Networking Architecture and Technologies, ICENAT 2022, held in Shenzhen, China, in October 2022. The 50 papers presented were thoroughly reviewed and selected from the 106 submissions. The volume focuses on the latest achievements in the field of emerging network technologies, covering the topics of emerging networking architecture, network frontier technologies, industry network applications and so on.
Автор: Abbadi Imad M Название: Cloud Management and Security ISBN: 1118817095 ISBN-13(EAN): 9781118817094 Издательство: Wiley Рейтинг: Цена: 82310.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Establishes the foundations of Cloud computing, building a diverse understanding of the technologies behind Cloud computing. This book begins with an introduction to Cloud computing, presenting fundamental concepts such as analysing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types, and highlights the main challenges.
Автор: Chell Dominic Название: Mobile Application Hacker`s Handbook ISBN: 1118958500 ISBN-13(EAN): 9781118958506 Издательство: Wiley Рейтинг: Цена: 52800.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: See your app through a hacker`s eyes to find the real sources of vulnerability The Mobile Application Hacker`s Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker`s point of view.
Автор: Monte Matt Название: Network Attacks and Exploitation: A Framework ISBN: 1118987128 ISBN-13(EAN): 9781118987124 Издательство: Wiley Рейтинг: Цена: 38010.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz