Win £500 in book vouchers by helping us with a 7 minute reader survey click here.

newgen books for YA readers twitter eleanor oliphant
Search our site
The Woman in the Window by A. J. Finn Read the opening extract of the brand new A. J. Finn book before its publication on 22/01/2018

Network security books

See below for a selection of the latest books from Network security category. Presented with a red border are the Network security books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Network security books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

SCION: A Secure Internet Architecture by Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat SCION: A Secure Internet Architecture
, , ,
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability.
Format: Hardback - Released: 11/11/2017

Arista Warrior, 2e by Gary A. Donahue Arista Warrior, 2e

In the updated, second edition of this book, renowned consultant and technical author Gary Donahue (Network Warrior) provides an in-depth, objective guide to Arista Network's lineup of hardware, and explains why its network switches and Extensible Operating System (EOS) are...
Format: Paperback - Released: 25/10/2017

Network Security Metrics by Lingyu Wang, Sushil Jajodia, Anoop Singhal Network Security Metrics
, ,
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since...
Format: Hardback - Released: 23/10/2017

Guide to Security in SDN and NFV Challenges, Opportunities, and Applications by Shao Ying Zhu Guide to Security in SDN and NFV Challenges, Opportunities, and Applications

This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV.
Format: Hardback - Released: 30/09/2017

Network Security Through Data Analysis by Michael S. Collins Network Security Through Data Analysis

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing...
Format: Paperback - Released: 25/09/2017

Mobile Payment Systems Secure Network Architectures and Protocols by Jesus R. Tellez, Sherali Zeadally Mobile Payment Systems Secure Network Architectures and Protocols
,
This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. outlines the key challenges in MPS, covering...
Format: Hardback - Released: 20/09/2017

Protecting Your Children Online What You Need to Know About Online Threats to Your Children by Kimberly Ann McCabe Protecting Your Children Online What You Need to Know About Online Threats to Your Children

Children are very vulnerable and perfect targets to internet crimes, with that new technology presents complex challenges for law enforcement agencies and victim service providers. This book provides parents with practical advice to combat internet crimes by identifying the types,...
Format: Hardback - Released: 15/09/2017

Intrusion Detection and Prevention for Mobile Ecosystems by George Kambourakis Intrusion Detection and Prevention for Mobile Ecosystems

The objective of this edited book is to solicit state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It will include chapters dealing with fundamental theory, techniques, applications, as well...
Format: Hardback - Released: 07/09/2017

Coming Soon

Networks Functions Virtualization Security by Zonghua (Professor, Institut Mines Telecom/Telecom Lille, France) Zhang, Ahmed (Professor, Institut Mines Telecom/Tele Meddahi Networks Functions Virtualization Security
, , , ,
Networks Functions Virtualization Security investigates and explores the potential security issues for NFV, containing three major ingredients: (1) A comprehensive survey on the NFV framework and architecture, highlighting the significant advancements of NFV in both industry and academia; (2) A...
Format: Hardback - Released: 01/12/2017

Listening In Cybersecurity in an Insecure Age by Susan Landau Listening In Cybersecurity in an Insecure Age

A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers and misinformed policymakers
Format: Hardback - Released: 02/01/2018

Other books in this genre

System Forensics, Investigation, And Response by Chuck Easttom System Forensics, Investigation, And Response

Revised edition of the author's System forensics, investigation, and response, c2014.
Format: Paperback - Released: 01/09/2017

DNS Security Management by Michael Dooley, Timothy Rooney DNS Security Management
,
An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name...
Format: Hardback - Released: 14/08/2017

Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings by Jacek Rak Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017.
Format: Paperback - Released: 06/08/2017

The Virtual Weapon and International Order by Lucas Kello The Virtual Weapon and International Order

An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international order
Format: Hardback - Released: 01/08/2017

Cyber Power Potential of the Army's Reserve Component by Isaac R Porche Cyber Power Potential of the Army's Reserve Component


Format: Paperback - Released: 28/07/2017

Network Forensics by Ric Messier Network Forensics

Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity.
Format: Paperback - Released: 28/07/2017

Linux Hardening in Hostile Networks Server Security from TLS to Tor by Kyle Rankin Linux Hardening in Hostile Networks Server Security from TLS to Tor

Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. In Linux (R) Hardening...
Format: Mixed media product - Released: 26/07/2017

Strategic Cyber Deterrence The Active Cyber Defense Option by Scott Jasper Strategic Cyber Deterrence The Active Cyber Defense Option

This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces active cyber defense as a technically capable and legally viable alternative strategy for the deterrence of cyber attacks. It examines the array of malicious...
Format: Hardback - Released: 15/07/2017

Stateless Attribution Toward International Accountability in Cyberspace by John S Davis Stateless Attribution Toward International Accountability in Cyberspace


Format: Paperback - Released: 13/07/2017

Zero Trust Networks by Evan Gilman, Doug Barth Zero Trust Networks
,
With this practical book, you'll learn the principles behind zero trust architecture, along with details necessary to implement it.
Format: Paperback - Released: 30/06/2017

Registered users have access to unique site features

Register now