Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The...
Online Social Networks: Human Cognitive Constraints in Facebook and Twitter provides new insights into the structural properties of personal online...
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according...
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure...
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy...
Data Analysis in the Cloud introduces and discusses models, methods, techniques, and systems to analyze the large number of digital data sources...
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every...
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise...
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that...
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three...