The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical...
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting...
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns...
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in...