Research Methods for Cyber Security teaches the needed scientific methods for generating impactful theories, adding critical rigor to the cyber security field. Research Methods for Cyber Security be
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet
Today’s high-caliber cybercriminals conduct extremely well-planned and executed attacks on organizations throughout the globe. This "new normal" requires a sophisticated security program to both proac
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigati
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world
Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition,is a great reference to the open source tools available today and teaches yo
Cloud storage services and applications have become part of everyday life in both developed and developing countries. As with most evolving technologies, cloud services and apps can be used for crimin
In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication chan
Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to ext
Eleventh Hour CISSP® provides you with a study guide keyed directly to the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include onl
Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes pra
Mobile Security and Privacy: Advances, Challenges and Future Research Directionsprovides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—
Digital Forensics Trial Graphics: Teaching the Jury through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to lay people (i.e., juries, judges, etc).T
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are "safe" while surfin
Audio watermarking is used to add related information to the audio content to protect copyright and content security. Audio watermarking has been relatively overlooked in comparison to other types of
DNS Security: Hacking and Defending the Domain Name System provides tactics on how to secure a Domain Name System (DNS) framework by exploring common DNS vulnerabilities using real-world examples of D
Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961,Cyber Guerilla will help define the new types of threats and f
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information
Executing Windows Command Line Investigations targets cyber security practitioners that focus on digital forensics and incident response. These are the individuals that are ultimately responsible for
Data Breach Response and Investigations is the first book to provide holistic and detailed guidance on managing a data breach, from preparing for a breach through proactive breach detection, to restor
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cyber security research and practice, taking an applied approach for practitioners, as well for student
Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses the dangers associated with relying on historical data, security incident reports, and network analysis to predict future secu
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, an
Over 1,000 healthcare organizations have been plagued by data breaches in recent years, causing massive exposure of protected health data at Anthem, Premara Blue Cross and many other major organizatio
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition provides the most in-depth guide to forensic investigations using Windows Registry. This book is
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost to
Implementing Digital Forensics Readiness: From Reactive to Proactive Process shows information security professionals how to increase operational efficiencies by implementing a pro-active approach to
The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations.Preserving Electronic Evidence for Trial p
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashi
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particular
With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technolog
The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practi
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unl
Intended for students and new computer professionals, or those new to open source applications, this guide to digital forensics provides practical instructions for many common tasks in data recovery a