Sign up for offers & news
Enter your email address to receive news and special offers.
By Thomas Rid
Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways.
By Mark Button
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach...
By Matt Walker
By Ira Winkler
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how...
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication NFC technology continue to multiply, with athletic shoes, heart rate monitors, fitness...
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at...
Fully up-to-date coverage of every topic on the CEH v9 certification exam
By Stephen Hilt
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks with the tried-and-true Hacking Exposed way
Charlie Mitchell reveals the innovative and too-often hapless government and industry responses to growing cybersecurity threats. He examines internal government power struggles, the paralysis on Capitol Hill, and the industry's desperate effort to stay ahead of both the bad guys and the government.