Serious Cryptography

Serious Cryptography

This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away...

Industrial Cybersecurity

Industrial Cybersecurity

With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure...

Ubuntu using hacking

Ubuntu using hacking

The name of this book is Ubuntu Ushing Hacking. This book write is a Indian author Meet Chauhan. With the...

Cyber Insecurity

Cyber Insecurity

Cyber security is a completely man made phenomenon, which has become the most complex threat to modern societies and disruptor...

Personal Cybersecurity

Personal Cybersecurity

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the...

Real-Time Embedded Systems

Real-Time Embedded Systems

Offering comprehensive coverage of the convergence of real-time embedded systems scheduling, resource access control, software design and development, and high-level...

DNS Security Management

DNS Security Management

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and...