Information Security

The process of protecting data from unauthorized access, use, disclosure, destruction, modification, or disruption.

All categories

Books under this sub-category (8 books)

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Author(s): National Institute of Standards and Technology
Publication date: 01 Dec 2006
Document Type: Book
Tags: Computer Security Cryptography Information Security
 
An Introduction to Computer Security: The NIST Handbook

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Author(s): National Institute of Standards and Technology
Publication date: 01 Dec 2006
Document Type: Book
Tags: Computer Security Cryptography Information Security


Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Editor(s): Adam Hyde
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
Tags: Computer Security Cryptography Information Security
 
Basic Internet Security

Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Editor(s): Adam Hyde
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
Tags: Computer Security Cryptography Information Security


Engineering Security

Post date: 28 Jun 2016
This book is an overview of how security actually works in practice, and details the success and failures of security implementations. It also focuses on usability, and the different mental models of security between end users and cryptographers.
Author(s): Peter Gutmann
Publication date: 01 Apr 2014
Document Type: Book
Tags: Computer Security Information Security
 
Engineering Security

Engineering Security

Post date: 28 Jun 2016
This book is an overview of how security actually works in practice, and details the success and failures of security implementations. It also focuses on usability, and the different mental models of security between end users and cryptographers.
Author(s): Peter Gutmann
Publication date: 01 Apr 2014
Document Type: Book
Tags: Computer Security Information Security


Handbook for Bloggers and Cyber-Dissidents

Post date: 28 May 2007
A handbook from Reporters Without Borders with handy tips and technical advice on how to to remain anonymous and to get around censorship, and how to establish credibility through observing basic ethical and journalistic principles.
Author(s): Reporters Without Borders
Publication date: 01 Sep 2005
Document Type: Book
Tags: Cryptography Hackers and Computer Philosophy Information Security
 
Handbook for Bloggers and Cyber-Dissidents

Handbook for Bloggers and Cyber-Dissidents

Post date: 28 May 2007
A handbook from Reporters Without Borders with handy tips and technical advice on how to to remain anonymous and to get around censorship, and how to establish credibility through observing basic ethical and journalistic principles.
Author(s): Reporters Without Borders
Publication date: 01 Sep 2005
Document Type: Book
Tags: Cryptography Hackers and Computer Philosophy Information Security


Information Security for Journalists

Post date: 20 Nov 2016
A practical handbook for journalists and investigative reporters in particular. It lays out the most effective means of keeping your work private and safe from spying.
Author(s): Silkie Carlo Arjen Kamphuis
Publication date: 01 May 2016
License: Creative Commons Attribution 4.0 International
Document Type: Book
Tags: Cryptography Information Security
 
Information Security for Journalists

Information Security for Journalists

Post date: 20 Nov 2016
A practical handbook for journalists and investigative reporters in particular. It lays out the most effective means of keeping your work private and safe from spying.
Author(s): Silkie Carlo Arjen Kamphuis
Publication date: 01 May 2016
License: Creative Commons Attribution 4.0 International
Document Type: Book
Tags: Cryptography Information Security


Managing Risk and Information Security: Protect to Enable

Post date: 25 Oct 2016
This book describes the changing risk environment and why a fresh approach to information security is needed. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.
Author(s): Malcolm Harkins
Publication date: 24 Dec 2012
License: Open Access
Document Type: Book
Tags: Information Security
 
Managing Risk and Information Security: Protect to Enable

Managing Risk and Information Security: Protect to Enable

Post date: 25 Oct 2016
This book describes the changing risk environment and why a fresh approach to information security is needed. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.
Author(s): Malcolm Harkins
Publication date: 24 Dec 2012
License: Open Access
Document Type: Book
Tags: Information Security


Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Editor(s): Matthew Rosenquist
Publication date: 01 Oct 2015
Document Type: Book
Tags: Computer Security Cryptography Information Security
 
Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Editor(s): Matthew Rosenquist
Publication date: 01 Oct 2015
Document Type: Book
Tags: Computer Security Cryptography Information Security


The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.
 
The SysSec Red Book: A Roadmap for Systems Security Research

The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.

Book Categories