- Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information.
- release December 3, 2013
Archives ""
Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information
- Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset-its proprietary information-safe from cyber and physical compromise.
- release October 6, 2014
Honeypots: A New Paradigm to Information Security
- The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics.
- release February 3, 2011
Unauthorized Access: The Crisis in Online Privacy and Security
- The authors—two renowned experts on computer security and law—explore the well-established connection between social norms, privacy, security, and technological structure.
- release July 15, 2013
Protection of Information and the Right to Privacy – A New Equilibrium?
- This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy.
- release May 19, 2014
Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century
- Challenged by rapidly developing privacy-invading technologies (PITs), this book provides a convincing set of potential policy recommendations and practical solutions for safeguarding both privacy and security. It shows that benefits such as public security do not necessarily come at the expense of privacy and liberty overall.
- release July 6, 2014
The Browser Hacker’s Handbook
- Gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
- release March 24, 2014
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (2nd Ed.)
- Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed.
- release August 15, 2013
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense
- This book gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment.
- release May 9, 2014
Mastering Metasploit
- With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
- release May 11, 2014