- Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information.
- release December 3, 2013
Archives ""
Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information
- Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset-its proprietary information-safe from cyber and physical compromise.
- release October 6, 2014
Honeypots: A New Paradigm to Information Security
- The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics.
- release February 3, 2011
Unauthorized Access: The Crisis in Online Privacy and Security
- The authors—two renowned experts on computer security and law—explore the well-established connection between social norms, privacy, security, and technological structure.
- release July 15, 2013
The Browser Hacker’s Handbook
- Gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
- release March 24, 2014
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense
- This book gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment.
- release May 9, 2014
Dissecting the Hack: The F0rb1dd3n Network
- The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons.
- release July 15, 2010
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices
- The book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.
- release September 30, 2011
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (2nd Ed.)
- The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists.
- release October 30, 2013
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
- This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.
- release December 3, 2013