Catalog Search Results
Author
Language
English
Description
"A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our car doors with electronic key fobs. Broadly defined as a set of tools for establishing the basic elements of security in cyberspace, cryptography enables us...
Author
Language
English
Description
National Bestseller
NPR Best Book of the Year
"Not all superheroes wear capes, and Elizebeth Smith Friedman should be the subject of a future Wonder Woman movie." —The New York Times
Joining the ranks of Hidden Figures and In the Garden of Beasts, the incredible true story of the greatest codebreaking duo that ever lived, an American woman and her husband who invented
...Author
Series
Language
English
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Series
Language
English
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Language
English
Description
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process...
Author
Language
English
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Language
English
Description
This course will examine each of the 5 phases of risk management i.e. 1) Introduction to Risk, 2) Risk Identification, 3) IT Risk assessment, 4) Risk Response and Mitigation, 5) Risk and Control Monitoring and Reporting, and will help you prepare for ISACA's CRISC or Certified in Risk and Information Systems Control examination.
Through this course, you will have the opportunity to gain a high-level understanding of the risk management process. This...
Author
Language
English
Description
"Every 39 seconds, hackers attack a server or network somewhere. And by 2020, the estimated per data breach will cost more than $150 million.” These basic cybersecurity statistics should alarm everyone. With those stats in mind, people should understand the internet is never fully safe. Everything can be hacked, and the few safe spots on the internet are kept that way thanks to teams of cybersecurity professionals. These are the people responsible...
Author
Language
English
Description
"Safeguarding the Digital Fortress: A Guide to Cyber Security" is an essential resource that equips readers with the knowledge and tools needed to navigate the complex world of cyber security. In this comprehensive guide, a clear and concise roadmap for individuals and organizations to protect their digital assets from the ever-evolving threats of the digital age is provided. Chapters included:Chapter 1: Fundamentals of Information SecurityChapter...
Author
Language
English
Description
Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to.
KEY FEATURES ? Dive into real-world practical hands-on experience with authentication protocols through sample code.? Gain a programmer's perspective on cryptography, certificates, and their role in securing authentication processes.? Explore a wide array of authentication protocols, including TLS, SAML, OAuth, OIDC, WebAuthn, and Digital Identity.?...
Author
Language
English
Description
Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do to protect yourself from cyber threats and the most common hacking techniques used today. Structured in 10 chapters, all about cyber-security and ethical hacking, this is in short what the book covers...
Author
Language
English
Description
A history of cryptology from its early days in Ancient Egypt, Sparta and Rome to the present day when it has ceased to be a government monopoly and now affects all our lives whenever we use our mobile phones or connect to the internet. Subjects covered here include Mary Queen of Scots' cryptic messages when she was plotting against her cousin Elizabeth I; code-breaking during World Wars I and II including the Enigma Machine and the interception of...
Author
Language
English
Description
As the Ethereum platform has grown, so has the ecosystem of tools that support it. In this book, we'll examine some of the most popular Ethereum tools, and walk you through how to use them when building your own Ethereum-based apps. It contains:
• Remix: Develop Smart Contracts for the Ethereum Blockchain by Ahmed Bouchefra
• An Introduction to Geth and Running Ethereum Nodes by Mislav Javor
• Introducing Mist, a Human-friendly Geth Interface...
16) Exploring Blockchain in Healthcare: Implementation and Impact of Distributed Database Across Phar
Author
Language
English
Description
An overview of the Healthcare Industry and Applications of the Blockchain KEY FEATURES ● Includes graphical representations and architecture schematics for healthcare processes powered by the blockchain technology.● Real-world examples of how medical and pharma companies can use a blockchain in healthcare.● Includes algorithms and procedures for smart contracts to provide more in-depth knowledge. DESCRIPTION This book aims to analyze the role...
Author
Language
English
Description
���� Unveil the Secrets of Digital Security with "Cryptography and Computer Science" Bundle! ����
Are you ready to explore the thrilling world of cryptography and computer science? Dive into the depths of digital secrecy, protection, and innovation with our comprehensive book bundle, the "Cryptography and Computer Science: Design Manual for Algorithms, Codes, and Ciphers."
���� Book 1 - Introduction to Cryptography: A Beginner's...
Author
Language
Français
Description
Dans ce livre, nous plongeons dans l'univers complexe de la sécurité des réseaux sans fil. À l'ère de la connectivité omniprésente, la protection de nos données et de notre vie privée est devenue une priorité absolue. Ce livre offre une exploration détaillée des méthodes de sécurisation des réseaux WiFi, allant du décryptage des mots de passe à la prévention des attaques malveillantes.Nous commençons par démystifier les protocoles...
Author
Series
Language
English
Description
This book is based on, an in-depth filmed conversation between Howard Burton and Artur Ekert, Professor of Quantum Physics at the Mathematical Institute at the University of Oxford and Director of the Centre for Quantum Technologies and Lee Kong Chian Centennial Professor at the National University of Singapore. Artur Ekert is best known as one of the pioneers of quantum cryptography. This wide-ranging conversation provides detailed insights into...
Author
Series
Language
English
Description
Security Engineering is the third domain of the Certified Information Systems Security Professional certification. In this course we will cover the following: secure design principle and processes, fundamental concepts of security modules, security evaluation models, security capabilities of information systems, vulnerabilities in security architecture and technology components, cryptography and site and secure facility design.
In Interlibrary Loan
Didn't find what you need? Items not owned by Pueblo Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request