Showing 1–24 of 40 results
Editors: Jajodia, S., Subrahmanian, V.S., Swarup, V., Wang, C. (Eds.)Features chapters written by leading experts in the fieldProposes new scientific methods to address many of the practical problems of cyber deceptionProvides a thorough scientific foundation for the field of cyber deceptionIncludes military and policy dimensions not typically covered in cyber-security booksThis edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more.
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
Learn the fundamentals behind commonly used scanning techniques
Deploy powerful scanning tools that are integrated into the Kali Linux testing platform
A step-by-step guide, full of recipes that will help you use integrated scanning tools in Kali Linux, and develop custom scripts for making new and unique tools of your own
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance.
The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks.
Authors: Statler, StephenThe book is primarily directed at those who will architect or implement a Beacon solutionIt discusses the significant standards that a developer will want to conform toCase studies pull the content earlier in the book so that the reader can see how Beacons are implementedProximity technology—in particular, Bluetooth beacons—is a major source of business opportunity, and this book provides everything you need to know to architect a solution to capitalize on that opportunity.
To secure Node.js applications, we’ll start by helping you delve into the building blocks that make up typical Node applications. By understanding all the layers that you are building on top of, you can write code defensively and securely.
Plan and execute penetration tests on wireless networks with the Kali Linux distribution
About This Book
Learn the fundamentals of wireless LAN security and penetration testing
Discover and attack wireless networks using specialized Kali Linux tools
A step-by-step, practical guide to wireless penetration testing with hands-on examples
Who This Book Is For
This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.
Key Features- Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic- Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect- A hands-on guide to help you solve your case with malware forensic methods and network behaviorsBook DescriptionWe live in a highly networked world. Every digital device―phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime.
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. Information Security Risk Analysis, Third Edition demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to your organization.
Authored by renowned security expert and certification instructor, Thomas Peltier, this authoritative reference provides you with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment in a matter of days.
Utilize Python scripting to execute effective and efficient penetration tests
About This Book
Understand how and where Python scripts meet the need for penetration testing
Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch critical data
Develop your Python and penetration testing skills with real-world examples
Who This Book Is For
If you are a security professional or researcher, with knowledge of different operating systems and a conceptual idea of penetration testing, and you would like to grow your knowledge in Python, then this book is ideal for you.
What You Will Learn
Familiarise yourself with the generation of Metasploit resource files
Use the Metasploit Remote Procedure Call (MSFRPC) to automate exploit generation and execution
Use Python’s Scrapy, network, socket, office, Nmap libraries, and custom modules
Parse Microsoft Office spreadsheets and eXtensible Markup Language (XML) data files
Write buffer overflows and reverse Metasploit modules to expand capabilities
Exploit Remote File Inclusion (RFI) to gain administrative access to systems with Python and other scripting languages
Crack an organization’s Internet perimeter
Chain exploits to gain deeper access to an organization’s resources
Interact with web services with Python
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks.
Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements — including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration.
A practical guide to testing your network’s security with Kali Linux – the preferred choice of penetration testers and hackersOverviewConduct realistic and effective security tests on your networkDemonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systemsUse hands-on techniques to take advantage of Kali Linux, the open source framework of security toolsIn DetailMastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security – from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.T
Passwords are not the problem. The management of passwords is the real security nightmare.User authentication is the most ignored risk to enterprise cybersecurity. When end users are allowed to generate, know, remember, type and manage their own passwords, IT has inadvertently surrendered the job title Network Security Manager to employees – the weakest link in the cybersecurity chain.Dovell Bonnett reveals the truth about the elephant in the room that no one wants to mention: Expensive backend security is worthless when the virtual front door has a lousy lock!Dovell proves that making passwords secure is not only possible, passwords can actually become an effective, cost efficient and user friendly feature of robust cybersecurity.
This is your ticket into the elusive underworld of the Internet, home to millions of elite computer hackers. 1337 h4x0r h4ndb00k will show you how to walk-the-walk and talk-the-talk of this exclusive community. Soon, you too will be able to go into a chat room and carry on conversations speaking the cryptic 1337 language. 1337 h4x0r h4ndb00k will also review the nature of computer viruses, different practical jokes to play on your desktop and tips on how to live the hacker lifestyle. Join the elite society of computer hackers with 1337 h4x0r h4ndb00k as your guide.
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST’s cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF’s identification, protection, defense, response, or recovery functions are being carried out properly.T
The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy.Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs.
The Privacy Engineer’s Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, detailing industry-proven solutions that go beyond mere theory on how to build privacy into products, processes, applications, and systems. The book offers lucid perspectives on the challenges and opportunities raised with the emerging “personal” information economy and how organizations can rise up to meet the organizational, asset management-related and innovation-related challenges ahead.
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues.
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web.
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you’ll be able to take action.
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name–to–address lookup process may fail.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®), this volume features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy.C
This book constitutes the refereed proceedings of the Cryptographer’s Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms and homomorphic encryption and its applications.
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks
Take a cooperative approach towards addressing the technology s challenges of security and privacy issues
Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique
Richly illustrated with detailed designs and results for all approaches used
Introduces standardization and industry activities, and government regulation in secure vehicular networking
Showing 1–24 of 40 results