Catalog Search Results
Author
Description
"A fascinating exploration of the uncrackable codes and secret cyphers that helped win wars, spark revolutions and change the faces of nations.
There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament, too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy.
In The Hidden History of Code Breaking, Sinclair McKay explores...
Author
Description
The complete untold story of the cracking of the infamous Nazi code
Most histories of the cracking of the elusive Enigma code focus on the work done by the codebreakers at Bletchley Park, Britain's famous World War II counterintelligence station. In this fascinating account, however, we are told, for the first time, the hair-raising stories of the heroic British and American sailors, spies, and secret agents who put their lives on the line to provide...
Author
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Description
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process...
11) Beyond the grave
Author
Description
Betrayed by their cousins, abandoned by their uncle, and with only the slimmest hint to guide them, Amy and Dan rush off to Egypt on the hunt for 39 clues that lead to a source of unimaginable power.
Author
Description
In this picture book biography, young readers will learn all about Elizebeth Friedman (1892-1980), a brilliant American code breaker who smashed Nazi spy rings, took down gangsters, and created the CIA's first cryptology unit. Her story came to light when her secret papers were finally declassified in 2015. From thwarting notorious rumrunners with only paper and pencil to "counter-spying into the minds and activities of" Nazis, Elizebeth held a pivotal...
Author
Description
This course will examine each of the 5 phases of risk management i.e. 1) Introduction to Risk, 2) Risk Identification, 3) IT Risk assessment, 4) Risk Response and Mitigation, 5) Risk and Control Monitoring and Reporting, and will help you prepare for ISACA's CRISC or Certified in Risk and Information Systems Control examination.
Through this course, you will have the opportunity to gain a high-level understanding of the risk management process. This...
Author
Description
"Every 39 seconds, hackers attack a server or network somewhere. And by 2020, the estimated per data breach will cost more than $150 million.” These basic cybersecurity statistics should alarm everyone. With those stats in mind, people should understand the internet is never fully safe. Everything can be hacked, and the few safe spots on the internet are kept that way thanks to teams of cybersecurity professionals. These are the people responsible...
Author
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Description
In today's digital landscape, web apps evolve rapidly, demanding enhanced security. This “Ultimate Web Authentication Handbook” offers a comprehensive journey into this realm. Beginning with web authentication basics, it builds a strong foundation. You'll explore cryptography fundamentals, essential for secure authentication. The book delves into the connection between authentication and network security, mastering federated authentication via...
Author
Description
Welcome to "Cybersecurity in the Digital Age: Safeguarding Data and Privacy." In today's interconnected world, where digital technologies are deeply embedded in our daily lives, the need for robust cybersecurity measures has never been more critical. This book serves as a comprehensive guide to understanding the threats posed by cybercriminals and how individuals and organizations can protect themselves against these threats. As technology continues...
Author
Description
Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to.
KEY FEATURES ? Dive into real-world practical hands-on experience with authentication protocols through sample code.? Gain a programmer's perspective on cryptography, certificates, and their role in securing authentication processes.? Explore a wide array of authentication protocols, including TLS, SAML, OAuth, OIDC, WebAuthn, and Digital Identity.?...
Author
Description
Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do to protect yourself from cyber threats and the most common hacking techniques used today. Structured in 10 chapters, all about cyber-security and ethical hacking, this is in short what the book covers...
Author
Description
"Safeguarding the Digital Fortress: A Guide to Cyber Security" is an essential resource that equips readers with the knowledge and tools needed to navigate the complex world of cyber security. In this comprehensive guide, a clear and concise roadmap for individuals and organizations to protect their digital assets from the ever-evolving threats of the digital age is provided. Chapters included:Chapter 1: Fundamentals of Information SecurityChapter...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request