an international guide to data security and ISO 27001/ISO 27002
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be...
Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the mos...
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing informatio...
Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication. The technological background of these applications have been presented in...
Part I: PrimerChapter 1. Welcome to the Wide World of Web Application SecurityChapter 2. Security FundamentalsPart II: Web Application Security PrinciplesChapter 3. AuthenticationChapter 4. AuthorizationChap...
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes
About This Book
Know how to set up yo...
Enter your address and we will specify the offer for your area.