5a9218eef0793.jpg
PDF
Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; maliciou...

5a90b8407e1d2.jpg
PDF
Learning iOS Penetration Testing

This book is for IT security professionals who want to conduct security testing of applications. This book will give you exposure to diverse tools to perform penetration testing. This book will also appeal to iOS developers who would like to secure their applications, as well as security professionals. It is easy to follow for anyone without experience of iOS pentesting.

5a90b83f432fa.jpg
PDF
Strategic Cyber Deterrence : The Active Cyber Defense Option

According to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Commi...

5a8f70766afb0.jpg
PDF
Data and Applications Security and Privacy XXXI

This book constitutes the refereed proceedings of the 31st Annual IFIPWG 11.3 International Working Conference on Data and ApplicationsSecurity and Privacy, DBSec 2017, held in Philadelphia, PA, USA, in July 2017. The 21 full papers and 9 short papers presented were carefully reviewedand selected from 59 submissions. The papers are organized in topical sections on access control, privacy, cloud security, secure storage in the cloud, ...

5a8f5f521a2d1.jpg
PDF
Plugged In: Cybersecurity in the Modern Age

The University of Florida has an ambitious goal: to harness the power of its faculty, staff, students, and alumni to solve some of society’s most pressing problems and to become a resource for the state of Florida, the nation, and the world. Cybersecurity is the most pressing issue of our increasingly interconnected and networked lives. Recent estimates predict that worldwide the number of connected devices―everything from computers ...

5a8cc8e6f0339.jpg
PDF
Practical Paranoia iOS 11 Security Essentials

New edition, completely updated for iOS 11, released September 23, 2017. The best-selling, easiest, step-by-step, most comprehensive guide to securing your home or business iPhones and iPads. Official workbook for the Practical Paranoia: Security Essentials Workshop, STEM and college cybersecurity courses. Designed for instructor-led and self-study. The entire course is contained within the book. Includes all instructor presentations...

5a8cc8e5b56bd.jpg
PDF
Asia-Pacific Security Challenges

This edited book examines the contemporary regional security concerns in the Asia-Pacific recognizing the ‘Butterfly effect’, the concept that small causes can have large effects: ‘the flap of a butterfly’s wings can cause a typhoon halfway around the world’. For many Asia-Pacific states, domestic security challenges are at least as important as external security considerations. Recent events (both natural disasters and man-made disa...

5a8c0f485b68d.jpg
PDF
Dynamic Networks and Cyber-Security

As an under-studied area of academic research, the analysis of computer network traffic data is still in its infancy. However, the challenge of detecting and mitigating malicious or unauthorised behaviour through the lens of such data is becoming an increasingly prominent issue.This collection of papers by leading researchers and practitioners synthesises cutting-edge work in the analysis of dynamic networks and statistical aspects o...

5a8c0f4712fdd.jpg
PDF
Passwords: The Key to Your Information Kingdom

This was created for busy IT Security folks, who have to juggle with daily operations, project advisories, incident response, audits AND IT security awareness. The slides (the link to the actual editable Powerpoint slides is in the PDF) come with suggested speaker’s note so it’s a ready-to-present material. This is the first part of a multi-part series for IT Security folks to conduct Security Awareness course. The content is also ma...

5a80cf9375758.jpg
PDF
Spring Security Essentials

A fast-paced guide for securing your Spring applications effectively with the Spring Security framework About This Book Explore various security concepts using real-time examples of the Spring Security framework Learn about the functionalities that implement industry standard authentication and authorization mechanisms to secure enterprise-level applications Design and develop advanced Spring Security layers by following a step-by-st...