Books tagged: network security

These results show books which have been specifically tagged with this keyword. You can also try doing a general search for the term "network security" .
You may also limit results to books that contain two tags.
Try one of these commonly-used combinations:
Some content may be filtered out. To view such content, change your filtering option.

Found 27 results

Python Cryptography
Price: $9.99 USD. Words: 7,650. Language: English. Published: December 18, 2018. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Programming
Cryptography for Python Developer
Recruiting the Cyber Leader: An Evaluation of the Human Resource Model Used for Recruiting the Army's Cyber Operations Officer - Recommendations for This Fast-Paced Operational Environment
Price: $7.99 USD. Words: 52,070. Language: English. Published: August 2, 2018. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
For the first time since the creation of the Special Forces branch in 1987, the Army authorized the creation of a new branch, the Cyber branch. With this, the Army joined the ranks of other organizations in this rapidly expanding arena. The Army found itself in a situation where it needed to quickly fill the positions required of this new branch.
Time Sensitivity in Cyberweapon Reusability - Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching
Price: $8.99 USD. Words: 28,320. Language: English. Published: June 24, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Computers & Internet » Security / viruses
A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched.
Deterring Cyberattacks on U.S. Critical Infrastructure - Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services
Price: $7.99 USD. Words: 28,480. Language: English. Published: June 24, 2018. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public.
National Cyber Incident Response Plan - Cybersecurity Federal Roles and Responsibilities - Response To, and Recovery From, Significant Cyber Attacks Posing Risks to Critical Infrastructure Systems
Price: $8.99 USD. Words: 35,370. Language: English. Published: June 3, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Politics & Current Affairs » Current affairs
Networked technologies touch every corner of the globe and every facet of human life. They have driven innovation, nurtured freedoms, and spurred economic prosperity. Even so, the very technologies that enable these benefits offer new opportunities for malicious and unwanted cyber activities.
IT Infrastructure Risk & Vulnerability Library: A Consolidated Register of Operational and Technology Infrastructure Vulnerabilities for IT Assurance Professionals
Price: $65.95 USD. Words: 22,630. Language: English. Published: May 9, 2018. Categories: Nonfiction » Business & Economics » Insurance / risk assessment & management, Nonfiction » Computers & Internet » Security
This book is a consolidated register of known risk/vulnerabilities in IT systems and infrastructure that are commonly deployed in today’s enterprise for delivery of technology driven services. Information risk assurance and cybersecurity practitioners can used this book to perform audit, risk/security/gap assessment of their most critical IT infrastructures and processes for remedial action.
Auditing your Payment Cards Processes, Systems and Applications: A Step By Step PCIDSS Compliant Audit Program (A Practical Guide for Payment Card Brand, Issuers, Acquirers, Processors and Switches)
Price: $45.95 USD. Words: 10,090. Language: English. Published: May 7, 2018. Categories: Nonfiction » Business & Economics » E-commerce / general, Nonfiction » Computers & Internet » Security
This book is a do-it-yourself guide that provide Information Risk Assurance & Cybersecurity professionals a step by step details on how to perform audit or risk/security assessment of their payment card infrastructure & environment in line with PCIDSS requirement. Would-be Internal Security Assessor (ISA) and QSA can use this book to prepare for or assess their organization for PCIDSS compliance.
Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program
Price: $7.99 USD. Words: 60,940. Language: English. Published: October 9, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Hardware / handheld devices
The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features.
Flying and Fighting in Cyberspace - Implications for Command and Control, Network Operations, and ISR, Threat Agent Profiles, Mapping of Enemy Systems and Data, Cyber Attack and Defense, Funding
Price: $5.99 USD. Words: 126,850. Language: English. Published: April 9, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
This research paper develops the foundation for a new military operating concept to "fight the net" in support of 8th Air Force requirements and stand-up as the new Cyber Command. It applies the Air Force Concept Development framework to examine cyberspace as a newly designated warfare domain.
Cyber War: The Next Frontier for NATO - Distributed Denial of Service (DDOS) Website Internet Attacks, Hacktivists, Hackers, Cyber Attacks, Cyber Terrorism, Tallinn Manual, Possible Responses
Price: $5.99 USD. Words: 118,440. Language: English. Published: March 27, 2016. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
Professionally converted for accurate flowing-text e-book format reproduction, this unique study analyzes and explores the unique position that NATO operates in and the duty of NATO to protect its alliance members, and member states to protect each other.
Also check out some similar keyword tags authors have used: