Categories Unlimited Books

Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots […]

Read More
Categories Unlimited Books

The Manager’s Guide to Web Application Security: A Concise Guide to the Wea…

The Manager’s Guide to Web Application Security is a concise, information packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the result of intricate programming deficiencies and […]

Read More
Categories Unlimited Books

Attribute-Based Access Control (Artech House Information Security and Priva…

This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well […]

Read More
Categories Unlimited Books

IBM i Security Administration and Compliance

In this long-awaited update to IBM i Security Administration and Compliance, security expert Carol Woodbury tells you everything you need to know about IBM i security. Written in a clear, jargon-free style, this book explains the importance of developing a security policy and gives detailed guidance on how to implement and maintain such a system.

Read More
Categories Unlimited Books

Instant Penetration Testing: Setting Up a Test Lab How-to

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich screenshots for easy comprehension.This is a How-to guide, written with practicality in mind. Theory is downplayed, and we get you started doing […]

Read More
Categories Unlimited Books

Official (ISC)2® Guide to the ISSMP® CBK® (ISC2 Press)

Official (ISC)2 Guide to the CISSP(R)-ISSMP(R) CBK Offers an overview of management topics related to information security. This resource promotes an understanding of Enterprise Security Management Practices, Enterprise-Wide System Development Security, Law, Investigations, Forensics and Ethics, Overseeing Compliance of Operations Security, and Business Continuity and Disaster Recovery Planning. Full description

Read More