LoveReading

Becoming a member of the LoveReading community is free.

No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.

New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…

Find out more

Computer security

See below for a selection of the latest books from Computer security category. Presented with a red border are the Computer security books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Computer security books and those from many more genres to read that will keep you inspired and entertained. And it's all free!

Handbook of Computer Networks and Cyber Security Principles and Paradigms

Handbook of Computer Networks and Cyber Security Principles and Paradigms

Author: Brij B. Gupta Format: Hardback Release Date: 04/02/2020

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Practical Data Security

Practical Data Security

Author: John Gordon Format: Paperback / softback Release Date: 01/02/2020

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Applied Approach to Privacy and Security for the Internet of Things

Applied Approach to Privacy and Security for the Internet of Things

Author: Parag Chatterjee Format: Hardback Release Date: 30/01/2020

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

Quantum Cryptography and the Future of Cyber Security

Quantum Cryptography and the Future of Cyber Security

Author: Nirbhay Kumar Chaubey Format: Hardback Release Date: 30/01/2020

The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.

Building an Effective Security Program

Building an Effective Security Program

Author: Chris Williams, Scott Donaldson, Stanley Siegel Format: Paperback / softback Release Date: 30/01/2020

This book establishes the business case for setting up an enduring IT security awareness program for use in training IT professionals and IT security professionals. This book details an IT security process for establishing and maintaining common security protections for the confidentiality, availability, and integrity of company information. The IT security process is applied to a series of real-world scenarios in terms of common security controls to protect company information. IT security involves understanding the challenges and managing the corresponding risks. Risk management involves asset management, security vulnerabilities, security threats, risk identification, risk mitigation, and security controls. The authors provide a pragmatic approach to balancing affordable IT security protection and risk. Readers will learn: IT Security Awareness-Exemplified in five IT security scenarios describing how to protect information at home, while traveling, at work, as an executive, and internationally IT Security Mindset-Thinking like an IT security professional IT Risk Management Process-Identifying assets, risk management process that involves asset management, security vulnerabilities, security threats, risk identification, risk mitigation, and security controls Enduring IT Security-Implementing, measuring, and continually improve IT security program

Information Security Management Principles

Information Security Management Principles

Author: David Alexander, Amanda Finch, David Sutton Format: Paperback / softback Release Date: 15/01/2020

In today's technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports.

Application Software Security

Application Software Security

Author: Richardson Format: Paperback / softback Release Date: 15/01/2020

Cyber Security Practitioner's Guide

Cyber Security Practitioner's Guide

Author: Hamid (Northumbria Univ London, Uk & Qahe, Uk) Jahankhani Format: Hardback Release Date: 13/01/2020

In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber crime. The debate over how to plan for the cyber security of the future has focused the minds of developers and scientists alike. This book aims to provide a reference on current and emerging issues on systems security from the lens of autonomy, artificial intelligence and ethics as the race to fight and prevent cyber crime becomes increasingly pressing.

Security Fundamentals

Security Fundamentals

Author: Crystal Panek Format: Paperback / softback Release Date: 10/01/2020

A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company's computer network. That's why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top problem in today's businesses, so this certification could be your first step toward a stable and lucrative IT career. Security Fundamentals is your guide to developing a strong foundational understanding of Windows security, so you can take your IT career to the next level and feel confident going into the certification exam. Security Fundamentals features approachable discussion of core security concepts and topics, and includes additional learning tutorials and tools. This book covers everything you need to know about security layers, authentication, authorization, security policies, and protecting your server and client. Each chapter closes with a quiz so you can test your knowledge before moving to the next section. Learn everything you need for the Security Fundamentals MTA Certification Understand core security principles, including security layers and network security Learn essential concepts in physical security, internet security, and wireless security Identify the different types of hardware firewalls and their characteristics Test your knowledge and practice for the exam with quiz questions in every chapter IT professionals looking to understand more about networking will gain the knowledge to effectively secure a client and server, and to confidently explain basic security concepts. Thanks to the tools and tips in this Sybex title, you will be able to apply your new IT security skills in real world situations and on exam day.

Security Operations in Practice Building effective blue and red teams

Security Operations in Practice Building effective blue and red teams

Author: Mike Sheward Format: Paperback / softback Release Date: 10/01/2020

Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and grow a strong security operations team, including hiring the right people, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.

CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition

CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition

Author: Daniel Carter Format: Paperback / softback Release Date: 10/01/2020

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP exam Thoroughly revised for the 2019 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge, as established both by CSA and the (ISC)2. The book offers clear explanations of every subject on the brand-new CCSP exam and features accurate practice questions and real-world examples. Written by a respected computer security expert, CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition is both a powerful study tool and a valuable reference that will serve professionals long after the test. To aid in self-study, each chapter includes exam tips that highlight key information, a summary that serves as a quick review of salient points, and practice questions that allow you to test your comprehension. Notes, Tips, and Cautions throughout provide insight and call out potentially harmful situations. *All practice questions match the tone, content, and format of those on the actual exam*Electronic content includes 300+ practice questions *Written by an IT security expert with 20 years of experience

The Privacy Engineer's Companion A Workbook of Guidance, Tools, Methodologies, and Templates

The Privacy Engineer's Companion A Workbook of Guidance, Tools, Methodologies, and Templates

Author: Michelle Finneran Dennedy, Jonathan Fox, Thomas Finneran, Lisa Bobbitt Format: Paperback / softback Release Date: 02/01/2020

Engineer privacy into software, systems, and applications. This book is a resource for developers, engineers, architects, and coders. It provides tools, methodologies, templates, worksheets, and guidance on engineering privacy into software-from ideation to release and beyond-for technologies, products, systems, solutions, and applications. This book can be used in conjunction with the ApressOpen bestseller, The Privacy Engineer's Manifesto. This book trains and equips users to engage in their own privacy scoping requirements workshops, write privacy use cases or stories for agile development, document UI privacy patterns, conduct assessments, and align with product and information security teams. And, perhaps most importantly, the book brings clarity to a vitally important need-the protection of personal information-that is often shrouded in mystery during the engineering process. Go from policy to code to QA to value, all within these pages. What You Will Learn Think of the Fair Information Principles as actionable, normative statements Decode privacy into functional requirements that can be designed and coded Prepare and conduct a privacy scoping requirements workshop Translate privacy requirements into usable stories for agile development Guide user interface designers in creating privacy controls and interfaces Access software, systems, applications, and apps to see if the necessary privacy controls are in place Create privacy engineering documentation (such as data flow diagrams and privacy impact assessments) so that tribal lore is translated into institutional knowledge Access and ready the enterprise to support privacy engineering Who This Book Is For Serves multiple stakeholders, including those involved in architecting, designing, developing, deploying, and reviewing systems, products, processes, applications, and apps that process personal information. This workbook will appeal to software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals.