• 4,842,513 books for free!
logo

Security

Handbook of Biometric Anti-Spoofing: Presentation Attack Detection (2nd Edition)

This authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) – also known as Biometric Anti-Spoofing. Building on the success of the previous, pioneering edition, this thoroughly updated second edition has been considerably expanded to provi...

Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings (1st Edition)

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.An important distinguishing characteristic of this book is its inclusion of student e...

Security for Software Engineers

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.The book explores the key areas of attack vectors, code hardening, privacy, ...

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software (1st Edition)

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.The most common culprit of the largest hacks ha...

Linux Basics for Hackers

Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit (1st Edition)

Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences...

Practical Mobile Forensics: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms (3rd Edition)

Investigate, analyze, and report iOS, Android, and Windows devicesKey Features• Get hands-on experience in performing simple to complex mobile forensics techniques• Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected mediums• A practical guide to leveraging the power of mobi...

Ethereum for Architects and Developers: With Case Studies and Code Samples in Solidity (1st Edition)

Explore the Ethereum ecosystem step by step with extensive theory, labs, and live use cases. This book takes you through BlockChain concepts; decentralized applications; Ethereum’s architecture; Solidity smart contract programming with examples; and testing, debugging, and deploying smart contracts on your local machine and on t...

Hardening Azure Applications: Techniques and Principles for Building Large-Scale, Mission-Critical Applications (2nd Edition)

Build large-scale, mission-critical hardened applications on the Azure cloud platform. This 2nd edition provides information on the newer features in Azure, such as Linux extensions and supporting Azure Services such as HDInsight and SQL Server on Linux. Updated with new applications Hardening Azure Applications also discusses S...

Metasploit Penetration Testing Cookbook: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework (3rd Edition)

Over 100 recipes for penetration testing using Metasploit and virtual machinesKey Features• Special focus on the latest operating systems, exploits, and penetration testing techniques• Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures• Automate post exploitation with AutoRunScript• Exploit Andro...