LoveReading

Becoming a member of the LoveReading community is free.

No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.

New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…

Find out more

Computer security

See below for a selection of the latest books from Computer security category. Presented with a red border are the Computer security books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Computer security books and those from many more genres to read that will keep you inspired and entertained. And it's all free!

Container Security Fundamental Technology Concepts that Protect Containerized Applications

Container Security Fundamental Technology Concepts that Protect Containerized Applications

Author: Liz Rice Format: Paperback / softback Release Date: 31/05/2020

Many organizations are running applications in cloud native environments, using containers and orchestration to facilitate scalability and resilience. But how do you know whether your deployment is secure? To fully grasp the security implications of containers and their operation, you need an understanding of what they are and how they work. This practical book dives into the underlying technologies and components that these systems rely on to leave you better equipped to assess the security risks and potential solutions applicable to your environment. Author Liz Rice explores the building blocks and security boundaries commonly used in container-based systems and how they're constructed in Linux.

Distributed Denial of Service Attacks Real-world Detection and Mitigation

Distributed Denial of Service Attacks Real-world Detection and Mitigation

Author: Ilker OEzcelik, Richard Brooks Format: Hardback Release Date: 26/05/2020

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: * A history of DDoS attacks that includes attacker motivations; * Discussion of cyber-war, censorship, and Internet black-outs; * SDN based DDoS laboratory assignments; * Up-to-date review of current DDoS attack techniques and tools; * Review of the current laws that globally relate to DDoS; * Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks; * Mathematics of Internet traffic measurement; * Game theory for DDoS resilience; and * Construction of content distribution systems that absorb DDoS attacks. This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Cybersecurity Fundamentals A Real-World Perspective

Cybersecurity Fundamentals A Real-World Perspective

Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cyber security and different types of cyber attacks that hackers choose to unleash on cyber environments. The book then goes on to cover the types of major computer malwares and cyber security attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on the networks are described fully. It then covers high-tech cyber security programs, devices and mechanism that are extensively adopted in the modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. The book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step by step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with the book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of the book.

Cybersecurity Fundamentals A Real-World Perspective

Cybersecurity Fundamentals A Real-World Perspective

Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cyber security and different types of cyber attacks that hackers choose to unleash on cyber environments. The book then goes on to cover the types of major computer malwares and cyber security attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on the networks are described fully. It then covers high-tech cyber security programs, devices and mechanism that are extensively adopted in the modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. The book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step by step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with the book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of the book.

Building an Effective Security Program

Building an Effective Security Program

Author: Chris Williams, Scott Donaldson Format: Paperback / softback Release Date: 30/04/2020

This book establishes the business case for setting up an enduring IT security awareness program for use in training IT professionals and IT security professionals. This book details an IT security process for establishing and maintaining common security protections for the confidentiality, availability, and integrity of company information. The IT security process is applied to a series of real-world scenarios in terms of common security controls to protect company information. IT security involves understanding the challenges and managing the corresponding risks. Risk management involves asset management, security vulnerabilities, security threats, risk identification, risk mitigation, and security controls. The authors provide a pragmatic approach to balancing affordable IT security protection and risk. Readers will learn: IT Security Awareness-Exemplified in five IT security scenarios describing how to protect information at home, while traveling, at work, as an executive, and internationally IT Security Mindset-Thinking like an IT security professional IT Risk Management Process-Identifying assets, risk management process that involves asset management, security vulnerabilities, security threats, risk identification, risk mitigation, and security controls Enduring IT Security-Implementing, measuring, and continually improve IT security program

Computer Security and the Internet Tools and Jewels

Computer Security and the Internet Tools and Jewels

Author: Paul C. van Oorschot Format: Hardback Release Date: 22/04/2020

This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security - including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is elementary in that it assumes no background in security, but unlike soft high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.

Cyber Strategy Risk-Driven Security and Resiliency

Cyber Strategy Risk-Driven Security and Resiliency

Author: Carol Siegel, Mark Sweeney Format: Hardback Release Date: 13/04/2020

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from pre-planning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all the inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for a Cyber Steering Committee and Governance Boards Swim lanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management A comprehensive final Table of Contents for the Strategy deliverable The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company's cybersecurity and cyber resiliency strategic plan.

Cyber Strategy Risk-Driven Security and Resiliency

Cyber Strategy Risk-Driven Security and Resiliency

Author: Carol Siegel, Mark Sweeney Format: Paperback / softback Release Date: 13/04/2020

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from pre-planning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all the inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for a Cyber Steering Committee and Governance Boards Swim lanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management A comprehensive final Table of Contents for the Strategy deliverable The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company's cybersecurity and cyber resiliency strategic plan.

Political Decision-Making and Security Intelligence Recent Techniques and Technological Developments

Political Decision-Making and Security Intelligence Recent Techniques and Technological Developments

Author: Luisa Dall'Acqua, Irene M. Gironacci Format: Paperback / softback Release Date: 06/04/2020

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

Practical Data Security

Practical Data Security

Author: John Gordon Format: Paperback / softback Release Date: 31/03/2020

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Security and Privacy Applications for Smart City Development

Security and Privacy Applications for Smart City Development

Author: Sharvari C. Tamane Format: Hardback Release Date: 30/03/2020

The integration of big data and interconnected technology along with the increasing population will lead to the necessary creation of smart cities. To continue providing people with safe, comfortable, and affordable places to live, cities must incorporate techniques and technologies to bring them into the future. Security and Privacy Applications for Smart City Development is a pivotal reference source that covers the fundamental concepts of smart city, its privacy and security, along with recent research developments in the field of computer technology related with smart city infrastructure and cybersecurity community. While highlighting topics such as cloud computing, data security, and sustainable development, this publication explores interconnected technology applications and the methods of data protection. This book is ideally designed for computer analysts, policymakers, researchers, academicians, students, and industry professionals.

Cyber Warfare and Terrorism Concepts, Methodologies, Tools, and Applications

Cyber Warfare and Terrorism Concepts, Methodologies, Tools, and Applications

Author: Information Resources Management Association Format: Hardback Release Date: 30/03/2020

Through the rise of big data and the internet of things, terrorist organizations have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare, which grants great advantage to the attacker, has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. Examining cyber warfare and terrorism through a critical and academic perspective can lead to a better understanding of its foundations and implications. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats. Highlighting a range of topics such as cyber threats, digital intelligence, and counterterrorism, this multi-volume book is ideally designed for law enforcement, government officials, lawmakers, security analysts, IT specialists, software developers, intelligence and security practitioners, students, educators, and researchers.