The InfoSec Handbook

The InfoSec Handbook: An Introduction to Information Security. The InfoSec Handbook offers the reader an organized layout of information that...

Advanced API Security

Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE. Advanced API Security is a complete reference...

Enterprise Cybersecurity

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. Unify your organization’s people, budgets, technologies, and processes...

Cyber Operations

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks. Learn to set up, defend, and attack computer networks. This book...

Structured Peer-to-Peer Systems

Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. The field of structured P2P systems has seen fast...

Pattern and Security Requirements

Pattern and Security Requirements: Engineering-Based Establishment of Security Standards. Security threats are a significant problem for information technology companies today....

Cyber Security

Cyber Security: Analytics, Technology and Automation. Over the last two decades, the Internet and more broadly cyberspace has had a...

Security Planning

Security Planning: An Applied Approach. This book guides readers through building an IT security plan. Offering a template, it helps...

Digital Defense

Digital Defense: A Cybersecurity Primer. Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a...

CryptoSchool

CryptoSchool. This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary...