Practical Cloud Security [Early Release]
PDF
Practical Cloud Security

With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-sp...

Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying
PDF
Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying

Cyber Self-Defense educates readers about how the Internet can be used by stalkers, predators, and other criminals. By combining psychological profiles, technological information, and interesting case studies, Moore and Edwards make a complicated topic both accessible and fascinating. Quick tips, action steps, and an extensive index are included for those looking to avoid a cyber-attack or for those in need of further assistance.

Solving Cyber Risk: Protecting Your Company and Society
PDF
Solving Cyber Risk: Protecting Your Company and Society

The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action pl...

Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
PDF
Practical Binary Analysis

This book is the perfect find for anyone wanting to get into binary analysis that really just needs a methodical and well written text with accompanying exercises to mess around with. Awesome job on this one. It's pretty tough but take your time if you're just starting out and really digest what he's telling you.

Access Contested: Security, Identity, and Resistance in Asian Cyberspace
PDF
Access Contested: Security, Identity, and Resistance in Asian Cyberspace

"This team has consistently produced the most important research on how and why technology matters in contemporary politics. With unique investigative tools, policy savvy, and a normative commitment to exposing the ways that tough regimes use digital media to control civil society, Access Contested demonstrates that in many ways, information technology is politics." -- Philip N. Howard, Director, Project on Information Technology and...

Privacy and Security Policies in Big Data
PDF
Privacy and Security Policies in Big Data

In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensiv...

Cybersecurity: Current Writings on Threats and Protection
PDF
Cybersecurity: Current Writings on Threats and Protection

Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk. This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of stat...

FISMA Principles and Best Practices: Beyond Compliance
PDF
FISMA Principles and Best Practices: Beyond Compliance

While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approach for establishing and implementing a comprehensive information security program, FISMA Pr...

A Year With Symfony: Writing healthy, reusable Symfony2 code
PDF
A Year With Symfony: Writing healthy, reusable Symfony2 code

I've written A Year With Symfony for you, a developer who will work with Symfony2 for more than a month (and probably more than a year). You may have started reading your way through the official documentation ("The Book"), the cookbook, some blogs, or an online tutorial. You know now how to create a Symfony2 application, with routing, controllers, entities or documents, Twig templates and maybe some unit tests. But after these basic...