Categories Unlimited Books

Innocent Code: A Security wake-up call for web Programmers

Innocent Code This concise and practical book will show where code vulnerabilities lie and how best to fix them. Its value is in showing where most coding errors lie, without needing to delve into the specifics of each system architecture, programming or scripting language or application and it provides illustrations with real code. Full descriptionNewMint […]

Read More
Categories Unlimited Books

Cognitive Hack: The New Battleground in Cybersecurity … the Human Mind (I…

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and […]

Read More
Categories Unlimited Books

Introduction to Computer Security

Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). Unlike most other computer security textbooks available today, Introduction […]

Read More
Categories Unlimited Books

Cyber Defense and Situational Awareness (Advances in Information Security)

This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, […]

Read More
Categories Unlimited Books

Chechnya’s Terrorist Network: The Evolution of Terrorism in Russia’s North …

This expert’s view into the strategic directions, tactics, leaders, and significant attacks connected to Chechen and North Caucasus terrorists examines the network’s operations as well as the success of Russia’s counterterrorist responses. • Discusses different strands of terrorist movements that emerged over time in the North Caucasus • Includes tables, maps, and charts to help […]

Read More
Categories Unlimited Books

SOFSEM 2016: Theory and Practice of Computer Science: 42nd International Co…

This bookconstitutes the proceedings of the 42nd International Conference on CurrentTrends in Theory and Practice of Computer Science, SOFSEM 2016, held inHarrachov, Czech Republic, in January 2016.The 43 fullpapers presented in this volume were carefully reviewed and selected from 116submissions. They are organized in topical sections named: foundations ofcomputer science; software engineering: methods, tools, applications; […]

Read More
Categories Unlimited Books

Distributed Denial of Service Attack and Defense (SpringerBriefs in Compute…

This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, […]

Read More