FREE
9781457167782 medium

Security Bibliography (eBook)

by (Author)

  • 15,171 Words

People are increasingly concerned by the security of the information they put online and worry about their privacy and their online profile. With new attacks, information leaks, vulnerabilities and exploits published every week, information security is a constant learning process. To be effective and stay up to date, you need the right resources to make sure you can quickly access any needed information. Obtaining the details you need is like trying to find a needle in a haystack. From general IT security knowledge and certifications to specialized content such as exploit writing, this bibliography brings together the right resources to help you get the information you need to solve any problem in IT security. We cover mobile and network security, cyber warfare and cyber crime and how to confront malware, including detection, development and forensics. And with more and more code written every day, secure coding is crucial, and we cover books on secure development, cryptography development, guidelines and best practices.

People are increasingly concerned by the security of the information they put online and worry about their privacy and their online profile. With new attacks, information leaks, vulnerabilities and exploits published every week, information security is a constant learning process. To be effective and stay up to date, you need the right resources to make sure you can quickly access any needed information. Obtaining the details you need is like trying to find a needle in a haystack. From general IT security knowledge and certifications to specialized content such as exploit writing, this bibliography brings together the right resources to help you get the information you need to solve any problem in IT security. We cover mobile and network security, cyber warfare and cyber crime and how to confront malware, including detection, development and forensics. And with more and more code written every day, secure coding is crucial, and we cover books on secure development, cryptography development, guidelines and best practices.


  • 0
    0
  • 1
    1
  • 2
    2
  • 3
    3
  • 4
    4
  • 5
    5
  • 6
    6
  • 7
    7
  • 8
    8
  • 9
    9
  • 0
    0
  • 1
    1
  • 2
    2
  • 3
    3
  • 4
    4
  • 5
    5
  • 6
    6
  • 7
    7
  • 8
    8
  • 9
    9
  • 0
    0
  • 1
    1
  • 2
    2
  • 3
    3
  • 4
    4
  • 5
    5
  • 6
    6
  • 7
    7
  • 8
    8
  • 9
    9
:
  • 0
    0
  • 1
    1
  • 2
    2
  • 3
    3
  • 4
    4
  • 5
    5
  • 6
    6
  • 7
    7
  • 8
    8
  • 9
    9
  • 0
    0
  • 1
    1
  • 2
    2
  • 3
    3
  • 4
    4
  • 5
    5
  • 6
    6
  • 7
    7
  • 8
    8
  • 9
    9
:
  • 0
    0
  • 1
    1
  • 2
    2
  • 3
    3
  • 4
    4
  • 5
    5
  • 6
    6
  • 7
    7
  • 8
    8
  • 9
    9
  • 0
    0
  • 1
    1
  • 2
    2
  • 3
    3
  • 4
    4
  • 5
    5
  • 6
    6
  • 7
    7
  • 8
    8
  • 9
    9
Average Reading Time Login to Personalize
Retail Price:
Free
BookShout Price:
Free


Item added to cart

9781457167782 bookshelf
Security Bibliography
Free
QTY: 1

9781457167782 bookshelf

Write a Review for Security Bibliography

by Safari Content Team

Average Rating:
×

Security Bibliography has been added

Security Bibliography has been added to your wish list.

Ok