Categories Unlimited Books

Security of Block Ciphers: From Algorithm Design to Hardware Implementation…

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis * Written by authors known within the academic cryptography community, this book presents the latest developments in current research * Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach – algorithm to implementation covers security […]

Read More
Categories Unlimited Books

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Soft…

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software More than 100 malicious computer attacks (malware) occur every second. The skills required to analyze and assess these attacks quickly are in high demand. The authors’ extensive real-world experience provides a rapid introduction to the tools and methods used to discover, debug, and disassemble malicious […]

Read More
Categories Unlimited Books

Implementing Information Security in Healthcare: Building a Security Progra…

Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspectives from more than two dozen security experts, the book explores the tools and policies healthcare organizations need […]

Read More
Categories Unlimited Books

Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes […]

Read More