Catalog Search Results
Author
Series
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Description
Viren, Würmer, Trojanische Pferde, das Arsenal der Hackerangriffe auf IT-Infrastrukturen scheint unerschöpflich. Nachdem Computerwurm Stuxnet 2010 das Steuerungssystem eines iranischen Atomkraftwerks befallen hatte und Computer durch die Malware Flame ferngesteuert und ausspioniert wurden, sorgte 2015 ein Virus namens Duqu 2.0 für Schlagzeilen, weil er die IT von Unternehmen in Europa, Asien und den USA infiziert hatte. Was aber wenn Computer grundsätzlich...
Author
Series
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Series
Description
Bei der heutigen Datenflut, die auf Speichermedien und im Internet kursiert, ist die Kompression digitaler Daten nach wie vor ein immens wichtiger Aspekt bei Datenübertragung und -speicherung. Dieses essential erläutert ohne theoretischen Überbau und mit elementaren mathematischen und informatischen Methoden die wichtigsten Kompressionsverfahren, so unter anderem die Entropiecodierungen von Shannon-Fano und von Huffman, sowie die Wörterbuchcodierungen...
Author
Description
In today's digital landscape, web apps evolve rapidly, demanding enhanced security. This “Ultimate Web Authentication Handbook” offers a comprehensive journey into this realm. Beginning with web authentication basics, it builds a strong foundation. You'll explore cryptography fundamentals, essential for secure authentication. The book delves into the connection between authentication and network security, mastering federated authentication via...
Author
Description
Build distributed applications that resolve data ownership issues when working with transactions between multiple parties
Blockchain applications provide a single-shared ledger to eliminate trust issues involving multiple stakeholders. With the help of Introduction to Blockchain and Ethereum, you'll learn how to create distributed Blockchain applications which do not depend on a central server or datacenter. The course begins by explaining Bitcoin,...
Author
Description
Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand...
Author
Description
Learn how real-life hackers and pentesters break into systems.
Key Features
● Dive deep into hands-on methodologies designed to fortify web security and penetration testing.
● Gain invaluable insights from real-world case studies that bridge theory with practice.
● Leverage the latest tools, frameworks, and methodologies to adapt to evolving cybersecurity landscapes and maintain robust web security posture.
Book Description
Discover...
Author
Description
Learn how real-life hackers and pentesters break into systems.
Book Description
Discover the essential tools and insights to safeguard your digital assets with the "Ultimate Pentesting for Web Applications". This essential resource comprehensively covers ethical hacking fundamentals to advanced testing methodologies, making it a one-stop resource for web application security knowledge.
Delve into the intricacies of security testing in web applications,...
Author
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Description
Empower Your Digital Shield with Splunk Expertise!
Book Description
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.
This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).
It...
Author
Description
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.
The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare – Truth, Tactics,...
Author
Description
Build Decentralized Applications Today for a Better Tomorrow
Book DescriptionUnlock the full potential of the Cardano blockchain for building decentralized Web 3.0 apps with Ultimate Cardano Smart Contracts.
This book takes you on a journey from the basics of blockchain evolution, cryptography, and Cardano's unique consensus algorithm, to the intricacies of transactions and smart contracts. You'll dive deep into Plutus, Cardano's native smart...
Author
Description
As the Ethereum platform has grown, so has the ecosystem of tools that support it. In this book, we'll examine some of the most popular Ethereum tools, and walk you through how to use them when building your own Ethereum-based apps. It contains:
• Remix: Develop Smart Contracts for the Ethereum Blockchain by Ahmed Bouchefra
• An Introduction to Geth and Running Ethereum Nodes by Mislav Javor
• Introducing Mist, a Human-friendly Geth Interface...
Author
Description
���� Unveil the Secrets of Digital Security with "Cryptography and Computer Science" Bundle! ����
Are you ready to explore the thrilling world of cryptography and computer science? Dive into the depths of digital secrecy, protection, and innovation with our comprehensive book bundle, the "Cryptography and Computer Science: Design Manual for Algorithms, Codes, and Ciphers."
���� Book 1 - Introduction to Cryptography: A Beginner's...
Author
Description
Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden. Der Leser kann die damaligen Methoden und Ergebnisse mit den aktuellen Möglichkeiten einer kryptologischen Analyse vergleichen – insbesondere unter dem Aspekt der heute zur Verfügung stehenden Computertechnik.
Es wird herausgearbeitet,...
Author
Description
Build Decentralized Applications Today for a Better Tomorrow
Key Features
● Build secure, scalable, and resilient Web3 Cardano Blockchain applications.
● Project-based learning connects blockchain concepts to project architecture and source code.
● Discover new employment opportunities, business models, and markets.
Book Description
Unlock the full potential of the Cardano blockchain for building decentralized Web 3.0 apps with...
Author
Description
Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to.
KEY FEATURES ? Dive into real-world practical hands-on experience with authentication protocols through sample code.? Gain a programmer's perspective on cryptography, certificates, and their role in securing authentication processes.? Explore a wide array of authentication protocols, including TLS, SAML, OAuth, OIDC, WebAuthn, and Digital Identity.?...
Author
Description
Master Blockchain, Cryptography, and Smart Contracts
Book Description
Unlock the true potential of blockchain technology with this essential guide, crafted for students and professionals looking to stay ahead in the fast-evolving digital landscape.
Beginning with the foundations of Blockchain, the book moves on to explain the basics of decentralized, distributed ledgers that secure digital assets. You will then explore the role of Cryptographic...
Author
Description
We've reached a point where all organizational data is connected through some network. With advancements and connectivity comes ever-evolving cyber threats - compromising sensitive data and access to vulnerable systems. Cybersecurity Blue Team Strategies is a comprehensive guide that will help you extend your cybersecurity knowledge and teach you to implement blue teams in your organization from scratch. Through the course of this book, you'll learn...
Didn't find it?
Can't find what you are looking for?
Search Hurst Public LibraryOr request an item not in the catalog. Submit Request