Information Security

Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)(Repost)

Botnet Detection: Countering the Largest Security Threat (Advances in Information Security) by Wenke Lee
English | 2007 | ISBN: 0387687661, 9780387687667 | 168 Pages | PDF | 1.48 MB

Information Security Management Handbook, Volume 7 (6th edition) [Repost]  eBooks & eLearning

Posted by ChrisRedfield at April 14, 2017
Information Security Management Handbook, Volume 7 (6th edition) [Repost]

Richard O'Hanley, James S. Tiller - Information Security Management Handbook, Volume 7 (6th edition)
Published: 2013-08-29 | ISBN: 146656749X | PDF | 434 pages | 27.3 MB
Information Security Practice and Experience: 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015(Repost)

Information Security Practice and Experience: 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings by Javier Lopez
English | 2015 | ISBN: 3319175327 | 576 Pages | PDF | 14.70 MB
Progress in Cryptology - LATINCRYPT 2014: Third International Conference on Cryptology and Information Security(Repost)

Progress in Cryptology - LATINCRYPT 2014: Third International Conference on Cryptology and Information Security in Latin America Florianópolis, … Papers by Diego F. Aranha
English | 2015 | ISBN: 3319162942 | 387 Pages | PDF | 19.43 MB
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance, 2nd edition

Stuart Jacobs, "Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance, 2nd edition"
English | ISBN: 1119101603 | 2016 | 784 pages | PDF | 15 MB
Practical Information Security Management: A Complete Guide to Planning and Implementation

Practical Information Security Management: A Complete Guide to Planning and Implementation by TONY CAMPBELL
English | 19 Dec. 2016 | ISBN: 1484216849 | 268 Pages | EPUB | 1.39 MB

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information security practice, hire the right people, and strike the best balance between security controls, costs, and risks.

CyberForensics: Understanding Information Security Investigations (repost)  eBooks & eLearning

Posted by interes at March 31, 2017
CyberForensics: Understanding Information Security Investigations (repost)

CyberForensics: Understanding Information Security Investigations by Jennifer Bayuk
English | 2010 | ISBN: 1607617714, 1617797030 | 200 pages | PDF | 6,2 MB

Information Security Applications  eBooks & eLearning

Posted by AvaxGenius at March 29, 2017
Information Security Applications

Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers By Choi Dooho Guilley Sylvain
English | PDF | 2017 | 409 Pages | ISBN : 3319565486 | 27.32 MB

This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016.
The Psychology of Information Security : Resolving Conflicts Between Security Compliance and Human Behaviour

The Psychology of Information Security :
Resolving Conflicts Between Security Compliance and Human Behaviour

by Leron Zinatullin
English | 2016 | ISBN: 1849287899 | 120 Pages | PDF | 0.9 MB

No approach to security can ever succeed without considering people – and as a profession we need to look beyond our computers to understand the business, the culture of the organisation, and, most of all, how we can create a security environment which helps people feel free to actually do their job.

Information Security and Cryptology -- ICISC 2013  eBooks & eLearning

Posted by DZ123 at March 16, 2017
Information Security and Cryptology -- ICISC 2013

Hyang-Sook Lee, Dong-Guk Han, "Information Security and Cryptology – ICISC 2013"
English | 2014 | ISBN: 3319121596 | PDF | pages: 536 | 18.5 mb