51b7CjQ2jVL._SY291_BO1,204,203,200_QL40_
PDF
Security and Software for Cybercafes

Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure sm...

004cc7b7_medium
PDF
Bosnian Security after Dayton: New Perspectives

Featuring fresh contributions from leading scholars, this new volume considers a varied range of post-war, post-Dayton and post-9/11 problems and issues, reminding readers that Dayton is not the only challenge to the safety, stability, and long-term viability of the post-war Bosnian state. Drawing together all the latest research, this book covers new ground in its discussion of post-9/11 security concerns, and in its leading-edge an...

510u8ihxRpL._SY291_BO1,204,203,200_QL40_
PDF
Cyber Criminals on Trial

This book comprises an international study of the manner in which cyber criminals are currently handled by the judicial system. As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been prevented. Very little has been written about the capture, possible extradition, prosecution, sentencing and incarcera...

005c6188_medium
PDF
The Transparent Traveler: The Performance and Culture of Airport Security

"Rachel Hall describes a state of emergency that has probably been normal in the rest of the world since the inception of mass air travel, and to non-Americans, it has a whiff of naivety. Nevertheless, this is an excellent book. As Hall observes, the technological and cultural advances in the area of security have been so great and so rapid in recent years that they constitute a major part of our contemporary lives. Her argument cent...

51jgRUlKNgL._SY291_BO1,204,203,200_QL40_
PDF
Assessing and Managing Security Risk in IT Systems: A Structured Methodology

I had John as my Info Sec professor for two classes. His insight in class has given me such a passion for InfoSec! I undoubtedly believe his book will do the same! If you can hear him lecture it will only drive your passion even more for the need for and drive towards info security! Anyone who is truly in need of the 'ah-ha' effect should buy this book!

41nv-X5ZOpL._SY291_BO1,204,203,200_QL40_
PDF
Human Security and Natural Disasters

A very important book that sheds new light on questions of human security and natural disasters, especially with regard to gender-related issues, public health responses and human rights issues. A wide range of case studies ranging from the Haiti earthquake, Indian Ocean tsunami to Hurricane Katrina bring the reader close to cutting edge critical research on how natural disasters severely affect human security. The human security con...

51IqLl7OdZL._SY291_BO1,204,203,200_QL40_
PDF
Security and Privacy in Smart Sensor Networks

Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource that examines recent developments and emerging trends in smart sensor security and privacy by providin...

51qvr+iNtML._SX218_BO1,204,203,200_QL40_
PDF
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

I know quite a bit capturing and manipulating network traffic, but I never really learned how to do interception via mechanisms like ARP poisoning, etc-- this book has succinct coverage of many such techniques. It covers interception across all major platforms (Windows, Mac, Linux) and introduces the open-source Canape interception toolkit which makes many tasks simple. Beyond the "how" of using tools, the book covers practical techn...

005a437c_medium
PDF
EW 104 : EW Against a New Generation of Threats

Worth Every Cent If You Want to Know Electronic Warfare. I can't recommend this 442 page tome enough. Of course you will need the EW 101, 102 &103 EW books if you want to fully understand this latest volume by a master writer of engineering electronic warfare lecturer David L. Adamy who is one of the leaders of the 14,000 members of the Society of Old Crows. For EW 104 the chapters are laid out by the following categories: 1) Spe...

51eoLl3C--L._SY291_BO1,204,203,200_QL40_
PDF
Detecting and Mitigating Robotic Cyber Security Risks

Detecting and Mitigating Robotic Cyber Security Risks is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research ...