Categories Unlimited Books

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether you’re evaluating corporate security systems, testing your own security […]

Read More
Categories Unlimited Books

Risk Management Framework: A Lab-Based Approach to Securing Information Sys…

Risk Management Framework explains the application of the Risk Management Framework (RMF) to both the experienced and novice reader. James Broad presents the process by implementing the steps on a fictitious organization from initiation to decommission and disposal. The Risk Management Framework allows an organization to develop an organization-wide risk framework that reduces the resources […]

Read More
Categories Unlimited Books

Privacy for Me and Not for Thee: The Movement for Invincible Personal Encr…

Edward Snowden, a 29-year-old computer systems administrator who worked as a contractor for the CIA and NSA, perpetrated the greatest assault on American intelligence in US history. Yet the select brotherhood of adversarial journalists, radical activists and anarchist hackers who have been admitted into his close confidence have succeeded in keeping the attention away not […]

Read More