Categories Unlimited Books

Computer Security: Principles and Practice, Global Edition

Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer/Network Security.   In recent years, the need for education in computer security and related topics has grown dramatically—and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the […]

Read More
Categories Unlimited Books

Outlier Analysis

With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions– […]

Read More
Categories Unlimited Books

Seven Deadliest Social Network Attacks (Seven Deadliest Attacks)

Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children. […]

Read More
Categories Unlimited Books

Mastering Python Forensics

Master the art of digital forensics and analysis with Python About This Book Learn to perform forensic analysis and investigations with the help of Python, and gain an advanced understanding of the various Python libraries and frameworks Analyze Python scripts to extract metadata and investigate forensic artifacts The writers, Dr. Michael Spreitzenbarth and Dr. Johann […]

Read More
Categories Unlimited Books

Elliptic Curve Public Key Cryptosystems (The Springer International Series …

Elliptic Curve Public Key Cryptosystems Elliptic curve cryptosystems provide equivalent security to the existing public key schemes, but with shorter key lengths. This book examines various issues which arise in the secure and implementation of elliptic curve systems. It is for researchers in academia, government and industry who are concerned with issues of data security.

Read More
Categories Unlimited Books

Spycraft Rebooted: How Technology is Changing Espionage (Kindle Single)

Technology is turning spycraft upside down. Once, intelligence operations could employ James Bond-style forgeries and disguises to infiltrate a target, but modern-day spies must succeed at the seemingly impossible: to hide in plain sight in a world where everything is visible. Our technology-reliant lives are a trail of electronic interactions; from card payments to CCTV, […]

Read More