paypal before the fall books of the month win prizes twitter
Search our site
The Treatment by C. L. Taylor Read the opening extract of the brand new C. L. Taylor book before its publication on 19/10/2017

Network security books

See below for a selection of the latest books from Network security category. Presented with a red border are the Network security books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Network security books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

Protecting Your Children Online What You Need to Know About Online Threats to Your Children by Kimberly Ann McCabe Protecting Your Children Online What You Need to Know About Online Threats to Your Children

Children are very vulnerable and perfect targets to internet crimes, with that new technology presents complex challenges for law enforcement agencies and victim service providers. This book provides parents with practical advice to combat internet crimes by identifying the types,...
Format: Hardback - Released: 16/09/2017

Intrusion Detection and Prevention for Mobile Ecosystems by George Kambourakis Intrusion Detection and Prevention for Mobile Ecosystems

The objective of this edited book is to solicit state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It will include chapters dealing with fundamental theory, techniques, applications, as well...
Format: Hardback - Released: 12/09/2017

Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings by Jacek Rak Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. The 12 revised full papers, 13 revised short presentations, and...
Format: Paperback - Released: 08/09/2017

Network Security Through Data Analysis by Michael S. Collins Network Security Through Data Analysis

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the second edition of this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets.
Format: Paperback - Released: 25/08/2017

DNS Security Management by Michael Dooley, Timothy Rooney DNS Security Management
,
An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name...
Format: Hardback - Released: 14/08/2017

The Virtual Weapon and International Order by Lucas Kello The Virtual Weapon and International Order

An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international order
Format: Hardback - Released: 01/08/2017

Network Forensics by Ric Messier Network Forensics

Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity.
Format: Paperback - Released: 28/07/2017

Linux Hardening in Hostile Networks Server Security from TLS to TOR by Kyle Rankin Linux Hardening in Hostile Networks Server Security from TLS to TOR

Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. In Linux(R) Hardening in...
Format: Mixed media product - Released: 26/07/2017

Coming Soon

Mobile Payment Systems Secure Network Architectures and Protocols by Jesus R. Tellez, Sherali Zeadally Mobile Payment Systems Secure Network Architectures and Protocols
,
This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. Topics and features: introduces the fundamental concepts...
Format: Hardback - Released: 28/09/2017

Arista Warrior, 2e by Gary A. Donahue Arista Warrior, 2e

In the updated, second edition of this book, renowned consultant and technical author Gary Donahue (Network Warrior) provides an in-depth, objective guide to Arista Network's lineup of hardware, and explains why its network switches and Extensible Operating System (EOS) are...
Format: Paperback - Released: 25/10/2017

Networks Functions Virtualization Security by Zonghua (Professor, Institut Mines Telecom/Telecom Lille, France) Zhang, Ahmed (Professor, Institut Mines Telecom/Tele Meddahi Networks Functions Virtualization Security
, , , ,
Networks Functions Virtualization Security investigates and explores the potential security issues for NFV, containing three major ingredients: (1) A comprehensive survey on the NFV framework and architecture, highlighting the significant advancements of NFV in both industry and academia; (2) A...
Format: Hardback - Released: 01/12/2017

Other books in this genre

Strategic Cyber Deterrence The Active Cyber Defense Option by Scott Jasper Strategic Cyber Deterrence The Active Cyber Defense Option

This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces active cyber defense as a technically capable and legally viable alternative strategy for the deterrence of cyber attacks. It examines the array of malicious...
Format: Hardback - Released: 15/07/2017

Zero Trust Networks by Evan Gilman, Doug Barth Zero Trust Networks
,
With this practical book, you'll learn the principles behind zero trust architecture, along with details necessary to implement it.
Format: Paperback - Released: 30/06/2017

Strategic Cyber Deterrence The Active Cyber Defense Option by Scott Jasper Strategic Cyber Deterrence The Active Cyber Defense Option

This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces active cyber defense as a technically capable and legally viable alternative strategy for the deterrence of cyber attacks. It examines the array of malicious...
Format: Paperback - Released: 22/06/2017

Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13 by Remi Badonnel Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13

? This book is open access under a CC BY 4.0 license.This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.The...
Format: Paperback - Released: 17/06/2017

Cisco ISE for BYOD and Secure Unified Access by Aaron Woland, Jamey Heary Cisco ISE for BYOD and Secure Unified Access
,
Fully updated: The complete guide to Cisco Identity Services Engine solutions Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your Own Device (BYOD) world....
Format: Paperback - Released: 16/06/2017

Nmap Network Exploration and Security Auditing Cookbook by Paulino Calderon Nmap Network Exploration and Security Auditing Cookbook

Over 100 practical recipes related to network and application security auditing using the powerful Nmap About This Book * Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers. *...
Format: Paperback - Released: 26/05/2017

Cybersecurity and Privacy - bridging the gap by Samant Khajuria Cybersecurity and Privacy - bridging the gap

Addresses the issue of cybersecurity and privacy. Technical topics discussed include cybersecurity; encryption; privacy policy; trust; security and the Internet of Things; Botnets; data risks; cloudbased services; and visualization.
Format: Hardback - Released: 02/05/2017

Kali Linux Intrusion and Exploitation Cookbook by Dhruv Shah, Ishan Girdhar Kali Linux Intrusion and Exploitation Cookbook
,
Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments About This Book * Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits *...
Format: Paperback - Released: 21/04/2017

Datenschutz Einfuhrung in Technischen Datenschutz, Datenschutzrecht Und Angewandte Kryptographie by Ronald Petrlic Datenschutz Einfuhrung in Technischen Datenschutz, Datenschutzrecht Und Angewandte Kryptographie


Format: Paperback / softback - Released: 10/04/2017

Informationelle Selbstbestimmung Im Digitalen Wandel by Michael (Fraunhofer Isi Germany) Friedewald Informationelle Selbstbestimmung Im Digitalen Wandel


Format: Paperback / softback - Released: 31/03/2017

Practical Packet Analysis, 3e by Chris Sanders Practical Packet Analysis, 3e


Format: Paperback - Released: 30/03/2017

Registered users have access to unique site features

Register now