Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
PDF
Practical Binary Analysis

This book is the perfect find for anyone wanting to get into binary analysis that really just needs a methodical and well written text with accompanying exercises to mess around with. Awesome job on this one. It's pretty tough but take your time if you're just starting out and really digest what he's telling you.

Computer Security: Art and Science, 2nd Edition
PDF
Computer Security: Art and Science, 2nd Edition

In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition’s publication.

Access Contested: Security, Identity, and Resistance in Asian Cyberspace
PDF
Access Contested: Security, Identity, and Resistance in Asian Cyberspace

"This team has consistently produced the most important research on how and why technology matters in contemporary politics. With unique investigative tools, policy savvy, and a normative commitment to exposing the ways that tough regimes use digital media to control civil society, Access Contested demonstrates that in many ways, information technology is politics." -- Philip N. Howard, Director, Project on Information Technology and...

Privacy and Security Policies in Big Data
PDF
Privacy and Security Policies in Big Data

In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensiv...

Cybersecurity: Current Writings on Threats and Protection
PDF
Cybersecurity: Current Writings on Threats and Protection

Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk. This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of stat...

FISMA Principles and Best Practices: Beyond Compliance
PDF
FISMA Principles and Best Practices: Beyond Compliance

While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approach for establishing and implementing a comprehensive information security program, FISMA Pr...

A Year With Symfony: Writing healthy, reusable Symfony2 code
PDF
A Year With Symfony: Writing healthy, reusable Symfony2 code

I've written A Year With Symfony for you, a developer who will work with Symfony2 for more than a month (and probably more than a year). You may have started reading your way through the official documentation ("The Book"), the cookbook, some blogs, or an online tutorial. You know now how to create a Symfony2 application, with routing, controllers, entities or documents, Twig templates and maybe some unit tests. But after these basic...

Complete Guide to CISM Certification
PDF
Complete Guide to CISM Certification

The Certified Information Security Manager®(CISM®) certification program was developed by the Information Systems Audit and Controls Association (ISACA®). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM® Certification examines five functional areas―security governance, risk management, information security p...

The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence
PDF
The Threat Intelligence Handbook

It's easy to find descriptions of what threat intelligence is. But it's harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This book answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challe...