Real Security

Real Security

Author: Kevin J. Cassidy

Publisher: SUNY Press

Published: 1993-01-01

Total Pages: 322

ISBN-13: 9780791416075

DOWNLOAD EBOOK

With the end of the Cold War and the extraordinary military competition that characterized it, the meaning of national security is being redefined. This book participates in that task by proposing a new, demilitarized foreign policy based on collective security, and an industrial policy capable of shifting the country's major resources from military purposes to the revitalization of the economy. This reduction in military production will also make possible the reversal of the environmental legacy of the Cold War, analyzed at length here.


Real 802.11 Security

Real 802.11 Security

Author: Jon Edney

Publisher: Addison-Wesley Professional

Published: 2004

Total Pages: 480

ISBN-13: 9780321136206

DOWNLOAD EBOOK

This book describes new approaches to wireless security enabled by the recent development of new core technologies for Wi-Fi/802.11. It shows how the new approaches work and how they should be applied for maximum effect. For system administrators, product designers, or advanced home users.


The Black Belt Librarian

The Black Belt Librarian

Author: Warren Graham

Publisher: American Library Association

Published: 2012

Total Pages: 106

ISBN-13: 0838911374

DOWNLOAD EBOOK

Sharing expertise gleaned from more than two decades as a library security manager, Graham demonstrates that libraries can maintain their best traditions of openness and public access by creating an unobtrusive yet effective security plan. In straightforward language, the author Shows how to easily set clear expectations for visitors' behavior Presents guidelines for when and how to intervene when someone violates the code of conduct, including tips for approaching an unruly patron Offers instruction on keeping persistent troublemakers under control or permanently barred from the library Gives library staff tools for communicating effectively with its security professionals, including examples of basic documentation The Black Belt Librarian arms librarians with the confidence and know-how they need to maintain a comfortable, productive, and safe environment for everyone in the library.


Real World Linux Security

Real World Linux Security

Author: Bob Toxen

Publisher: Prentice Hall Professional

Published: 2003

Total Pages: 852

ISBN-13: 9780130464569

DOWNLOAD EBOOK

With all-new coverage of home, mobile, and wireless issues, migrating from IP chains to IP tables, and protecting your network from users as well as hackers, this book provides immediate and effective Intrusion Detection System techniques. Contains practical solutions for every system administrator working with any Linux system, large or small.


Real World Microsoft Access Database Protection and Security

Real World Microsoft Access Database Protection and Security

Author: Garry Robinson

Publisher: Apress

Published: 2008-01-01

Total Pages: 501

ISBN-13: 1430207930

DOWNLOAD EBOOK

Security issues for all versions of Access from 97 to 2003 are discussed and the merits of each security approach from both the perspective of the developer and the database administrator/manager are examined.


Real Peace, Real Security

Real Peace, Real Security

Author: Sharon D. Welch

Publisher:

Published: 2008

Total Pages: 0

ISBN-13: 9780800662790

DOWNLOAD EBOOK

* Moves beyond the debate between just-war theory and pacifism * Explores new developments in the theory and practice of peace building


Web Security for Developers

Web Security for Developers

Author: Malcolm McDonald

Publisher: No Starch Press

Published: 2020-06-30

Total Pages: 217

ISBN-13: 1593279957

DOWNLOAD EBOOK

Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend themselves. The world has changed. Today, every time you make a site live, you're opening it up to attack. A first-time developer can easily be discouraged by the difficulties involved with properly securing a website. But have hope: an army of security researchers is out there discovering, documenting, and fixing security flaws. Thankfully, the tools you'll need to secure your site are freely available and generally easy to use. Web Security for Developers will teach you how your websites are vulnerable to attack and how to protect them. Each chapter breaks down a major security vulnerability and explores a real-world attack, coupled with plenty of code to show you both the vulnerability and the fix. You'll learn how to: Protect against SQL injection attacks, malicious JavaScript, and cross-site request forgery Add authentication and shape access control to protect accounts Lock down user accounts to prevent attacks that rely on guessing passwords, stealing sessions, or escalating privileges Implement encryption Manage vulnerabilities in legacy code Prevent information leaks that disclose vulnerabilities Mitigate advanced attacks like malvertising and denial-of-service As you get stronger at identifying and fixing vulnerabilities, you'll learn to deploy disciplined, secure code and become a better programmer along the way.


Real-World Cryptography

Real-World Cryptography

Author: David Wong

Publisher: Simon and Schuster

Published: 2021-10-19

Total Pages: 398

ISBN-13: 1638350841

DOWNLOAD EBOOK

"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography, you will find: Best practices for using cryptography Diagrams and explanations of cryptographic algorithms Implementing digital signatures and zero-knowledge proofs Specialized hardware for attacks and highly adversarial environments Identifying and fixing bad practices Choosing the right cryptographic tool for any problem Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You’ll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations. About the book Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You’ll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read—and it might just save your bacon the next time you’re targeted by an adversary after your data. What's inside Implementing digital signatures and zero-knowledge proofs Specialized hardware for attacks and highly adversarial environments Identifying and fixing bad practices Choosing the right cryptographic tool for any problem About the reader For cryptography beginners with no previous experience in the field. About the author David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security. Table of Contents PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY 1 Introduction 2 Hash functions 3 Message authentication codes 4 Authenticated encryption 5 Key exchanges 6 Asymmetric encryption and hybrid encryption 7 Signatures and zero-knowledge proofs 8 Randomness and secrets PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY 9 Secure transport 10 End-to-end encryption 11 User authentication 12 Crypto as in cryptocurrency? 13 Hardware cryptography 14 Post-quantum cryptography 15 Is this it? Next-generation cryptography 16 When and where cryptography fails