Amazon Price: $44.99 $36.81 You save: $8.18 (18%). (as of January 22, 2019 12:06 –
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.
Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.
Continue reading “SSH, The Secure Shell: The Definitive Guide”
Amazon Price: N/A (as of January 22, 2019 12:47 –
Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. The key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do?
Amazon Price: N/A (as of January 22, 2019 12:18 –
In 2010, the anti-secrecy organization known as WikiLeaks made headlines around the world when it released thousands of classified U.S. government diplomatic cables and battlefield reports. The New York Times played a crucial role in breaking the WikiLeaks story, and “Open Secrets” is the definitive chronicle of the documents’ release and the controversy that ensued. It includes detailed analyses of the documents by Times correspondents; opinion essays by Frank Rich, Maureen Dowd and others; and the full text of all the cables and war logs posted on The Times's Web site, along with 27 new cables selected for this volume. It also includes an essay in which the executive editor of The Times, Bill Keller, explains how the newspaper came to publish documents obtained by WikiLeaks, and why it did; expanded profiles of Julian Assange, WikiLeaks's founder, and Bradley Manning, the Army private suspected of being his source; and original essays on what the fracas has revealed about American diplomacy and government secrecy. A legal and technological thriller and a primer on world politics, "Open Secrets" is also a field guide to how information and power are wielded today, and why it matters.
Amazon Price: $78.98 $65.51 You save: $13.47 (17%). (as of January 23, 2019 10:00 –
Enterprise Cyber Security presents the basic knowledge of cyber security in a succinct manner. Both theoretical and practical aspects are covered. Topic areas in the book provide knowledge needed to understand how confidentiality, integrity and availability of information can be assured. Key features: *Cyber security concepts introduced without technical jargon *Both theoretical and practical aspects are covered *Provides a balanced view of cyber security *Appeals to students, professionals and enthusiasts
Amazon Price: $119.20 $110.29 You save: $8.91 (7%). (as of January 22, 2019 21:14 –
This text uses a conversational tone to the writing designed to convey complex technical issues as understandable concepts.
Digital Crime and Digital Terrorism, 3e, is written in a user-friendly fashion, designed to be understandable by even the most technologically challenged reader. Issues addressed in the book include descriptions of the types of crimes and terrorist acts committed using computer technology, theories addressing hackers and other types of digital criminals, an overview of the legal strategies and tactics targeting this type of crime, and in-depth coverage of investigating and researching digital crime, digital terrorism, and information warfare. Additionally, upon completion of the text, readers should find themselves better prepared for further study into the growing problems of crime, terrorism and information warfare being committed using computer technology.
Continue reading “Digital Crime and Digital Terrorism (3rd Edition)”