Categories Unlimited Books

Disappearing Cryptography: Information Hiding: Steganography and Watermarki…

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. This book on cryptography and information hiding delineates a number of different methods to hide information in various types of digital media files which include encryption, compression, and data embedding and watermarking.NewMint ConditionDispatch same day for order received before […]

Read More
Categories Unlimited Books

Hacking the Human: Social Engineering Techniques and Security Countermeasur…

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of social engineering into an information security […]

Read More
Categories Unlimited Books

Proactive Botnet Detection: Through Characterization of Distributed Denial …

In this quantitative quasi-experimental study two distributed denial of service attacks were captured and the characteristics of the attacks were used to detect botnets by identifying egressing distributed denial of service attack packets at the source of the attack. A sample Dark DDoSer botnet was constructed and used to launch a distributed denial of service […]

Read More
Categories Unlimited Books

Surveillance or Security?: The Risks Posed by New Wiretapping Technologies …

Digital communications are the lifeblood of modern society. We “meet up” online, tweet our reactions millions of times a day, connect through social networking rather than in person. Large portions of business and commerce have moved to the Web, and much of our critical infrastructure, including the electric power grid, is controlled online. This reliance […]

Read More
Categories Unlimited Books

IBM Mainframe Security: Beyond the Basics-A Practical Guide from a z/OS and…

Rather than rehashing basic information—such as command syntax—already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance, discussing the important issues in IBM mainframe security. Mainframes are the backbone of most large IT organizations; security cannot be left to chance. With very little training available to […]

Read More
Categories Unlimited Books

Hiding from the Internet: Eliminating Personal Online Information

New 2016 Third Edition Take control of your privacy by removing your personal information from the internet with this second edition. Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the […]

Read More
Categories Unlimited Books

Internet Security Dictionary

The explosive growth of the Internet has spawned a new era of security concerns. This dictionary provides reliable definitions and descriptions of Internet security terms in clear and precise English. The dictionary covers five main areas: authentication; network- level security; firewall design and implementation, and remote management; Internet security policies, risk analysis, integration across platforms, […]

Read More