Categories Unlimited Books

Unix, Solaris and Linux: A Practical Security Cookbook: Securing Unix Opera…

UNIX, Solaris and Linux Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, “out-of-the-box,” operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that […]

Read More
Categories Unlimited Books

Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasu…

Bluetooth technology has enjoyed tremendous success, and it’s now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, […]

Read More
Categories Unlimited Books

Building an Information Security Awareness Program: Defending Against Socia…

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization’s staff of the risk and educate them on how to protect your organization’s data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to […]

Read More
Categories Unlimited Books

Adversarial Machine Learning

Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to manipulate statistical inference, learn the latest practical techniques for investigating system security and performing robust data analysis, and […]

Read More
Categories Unlimited Books

Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft…

Are you in danger of being cyberstalked? Have you been cyberbullied? Outwit your cyberattacker with these clever strategies from former cyberstalking victim, Alexis Moore. As the founder of Survivors in Action, Moore explains how to identify potential cyberattackers and how to recover from a cybercrime if you’ve been attacked. Her indispensable book can help you […]

Read More
Categories Unlimited Books

Running IT Like A Business: A step-by-step guide to Accenture’s internal IT

Learn the secrets of an award-winning IT function Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten years and significantly decreased its IT spending despite an increase in workforce of nearly 300%, and its number of satisfied customers is […]

Read More