Information Security

The process of protecting data from unauthorized access, use, disclosure, destruction, modification, or disruption.

All categories

Books under this sub-category (10 books)

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Publication date: 01 Dec 2006
Document Type: Book
 
An Introduction to Computer Security: The NIST Handbook

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Publication date: 01 Dec 2006
Document Type: Book


Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
 
Basic Internet Security

Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Publication date: 09 May 2011
License: GNU General Public License Version 2 Document Type: Book


Computer Science & Information Technology

Post date: 17 Apr 2017
Proceeding from the Fourth International Conference on Computer Science and Information Technology (CoSIT 2017) Geneva, Switzerland, March 25-26, 2017.
Publisher: AIRCC Publishing Corporation
Publication date: 01 Apr 2017
License: Creative Commons Attribution 4.0 International
Document Type: Proceeding
 
Computer Science & Information Technology

Computer Science & Information Technology

Post date: 17 Apr 2017
Proceeding from the Fourth International Conference on Computer Science and Information Technology (CoSIT 2017) Geneva, Switzerland, March 25-26, 2017.
Publisher: AIRCC Publishing Corporation
Publication date: 01 Apr 2017
License: Creative Commons Attribution 4.0 International Document Type: Proceeding


Cracking Codes with Python

Post date: 19 Mar 2018
Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers.
Publisher: No Starch Press
Publication date: 23 Jan 2018
Document Type: Book
 
Cracking Codes with Python

Cracking Codes with Python

Post date: 19 Mar 2018
Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers.
Publisher: No Starch Press
Publication date: 23 Jan 2018
Document Type: Book


Engineering Security

Post date: 28 Jun 2016
This book is an overview of how security actually works in practice, and details the success and failures of security implementations. It also focuses on usability, and the different mental models of security between end users and cryptographers.
Publication date: 01 Apr 2014
Document Type: Book
 
Engineering Security

Engineering Security

Post date: 28 Jun 2016
This book is an overview of how security actually works in practice, and details the success and failures of security implementations. It also focuses on usability, and the different mental models of security between end users and cryptographers.
Publication date: 01 Apr 2014
Document Type: Book


Handbook for Bloggers and Cyber-Dissidents

Post date: 28 May 2007
A handbook from Reporters Without Borders with handy tips and technical advice on how to to remain anonymous and to get around censorship, and how to establish credibility through observing basic ethical and journalistic principles.
Publication date: 01 Sep 2005
Document Type: Book
 
Handbook for Bloggers and Cyber-Dissidents

Handbook for Bloggers and Cyber-Dissidents

Post date: 28 May 2007
A handbook from Reporters Without Borders with handy tips and technical advice on how to to remain anonymous and to get around censorship, and how to establish credibility through observing basic ethical and journalistic principles.
Publication date: 01 Sep 2005
Document Type: Book


Information Security for Journalists

Post date: 20 Nov 2016
A practical handbook for journalists and investigative reporters in particular. It lays out the most effective means of keeping your work private and safe from spying.
Publisher: Centre for Investigative Journalism (CIJ)
Publication date: 01 May 2016
License: Creative Commons Attribution 4.0 International
Document Type: Book
 
Information Security for Journalists

Information Security for Journalists

Post date: 20 Nov 2016
A practical handbook for journalists and investigative reporters in particular. It lays out the most effective means of keeping your work private and safe from spying.
Publisher: Centre for Investigative Journalism (CIJ)
Publication date: 01 May 2016
License: Creative Commons Attribution 4.0 International Document Type: Book


Managing Risk and Information Security: Protect to Enable

Post date: 25 Oct 2016
This book describes the changing risk environment and why a fresh approach to information security is needed. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.
Publisher: APress
Publication date: 24 Dec 2012
License: Open Access
Document Type: Book
 
Managing Risk and Information Security: Protect to Enable

Managing Risk and Information Security: Protect to Enable

Post date: 25 Oct 2016
This book describes the changing risk environment and why a fresh approach to information security is needed. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.
Publisher: APress
Publication date: 24 Dec 2012
License: Open Access Document Type: Book


Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Publisher: Caxton Business & Legal Inc.
Publication date: 01 Oct 2015
Document Type: Book
 
Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Publisher: Caxton Business & Legal Inc.
Publication date: 01 Oct 2015
Document Type: Book


The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.
Publisher: SysSec
Publication date: 01 Sep 2013
License: Standard Copyright License
Document Type: Book
 
The SysSec Red Book: A Roadmap for Systems Security Research

The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.
Publisher: SysSec
Publication date: 01 Sep 2013
License: Standard Copyright License Document Type: Book


Book Categories
Sponsors