Elementary Information Security

Human Aspects of Information Security, Privacy, and Trust: 4th International Conference

Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings by Theo Tryfonas
English | 2016 | ISBN: 3319393804 | 289 Pages | PDF | 19.2 MB

This book constitutes the proceedings of the 4th International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2016, held as part of the 18th International Conference on Human-Computer Interaction, HCII 2016, held in Toronto, ON, Canada, in July 2016 and received a total of 4354 submissions, of which 1287 papers were accepted for publication after a careful reviewing process.

Information Security Theory and Practice. Securing the Internet of Things  eBooks & eLearning

Posted by DZ123 at Sept. 6, 2017
Information Security Theory and Practice. Securing the Internet of Things

David Naccache, Damien Sauveron, "Information Security Theory and Practice. Securing the Internet of Things"
English | 2014 | ISBN: 3662438259 | PDF | pages: 215 | 8.6 mb

Applied Information Security: A Hands-On Approach [Repost]  eBooks & eLearning

Posted by hill0 at Sept. 5, 2017
Applied Information Security: A Hands-On Approach [Repost]

Applied Information Security: A Hands-On Approach by David Basin
English | 28 Oct. 2011 | ISBN: 3642244734 | 218 Pages | PDF | 1.43 MB

This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software.

The Block Cipher Companion (Information Security and Cryptography) [Repost]  eBooks & eLearning

Posted by hill0 at Sept. 4, 2017
The Block Cipher Companion (Information Security and Cryptography) [Repost]

The Block Cipher Companion (Information Security and Cryptography) by Lars R. Knudsen
English | 26 Oct. 2011 | ISBN: 3642173411 | 284 Pages | PDF | 2.47 MB

Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key.

Information Security and Cryptology - ICISC 2016  eBooks & eLearning

Posted by hill0 at Aug. 28, 2017
Information Security and Cryptology - ICISC 2016

Information Security and Cryptology - ICISC 2016: 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers (Lecture Notes in Computer Science) by Seokhie Hong
English | 9 Feb. 2017 | ISBN: 331953176X | 368 Pages | PDF | 8.62 MB

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.

Information Security Auditor : Careers in Information Security  eBooks & eLearning

Posted by readerXXI at Aug. 21, 2017
Information Security Auditor : Careers in Information Security

Information Security Auditor : Careers in Information Security
by Wendy Goucher
English | 2016 | ISBN: 1780172168 | 167 Pages | True PDF | 7.7 MB

Information Security Manager - Information Security Governance  eBooks & eLearning

Posted by naag at Aug. 13, 2017
Information Security Manager - Information Security Governance

Information Security Manager - Information Security Governance
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4.5 Hours | 295 MB
Genre: eLearning | Language: English

Governance is the driving force in managing an information security program and protecting information technology assets. In this course, you'll learn how governance directly affects security management, strategy, compliance, and the organization.

Information Security Practice and Experience: 12th International Conference  eBooks & eLearning

Posted by Jeembo at Aug. 4, 2017
Information Security Practice and Experience: 12th International Conference

Information Security Practice and Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
English | 2016 | ISBN: 3319491504 | 380 Pages | PDF | 28.0 MB

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016.
Information Security Risk Management: Risikomanagement mit ISO/IEC 27001, 27005 und 31010 (Auflage: 2)

Sebastian Klipper - Information Security Risk Management: Risikomanagement mit ISO/IEC 27001, 27005 und 31010 (Auflage: 2)
Published: 2015-02-24 | ISBN: 3658087730 | PDF | 198 pages | 102.99 MB

Information Security Practices: Emerging Threats and Perspectives [Repost]  eBooks & eLearning

Posted by hill0 at July 23, 2017
Information Security Practices: Emerging Threats and Perspectives [Repost]

Information Security Practices: Emerging Threats and Perspectives by Issa Traoré
English | 24 Jan. 2017 | ISBN: 3319489461 | 114 Pages | PDF | 3.07 MB

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms;