Hardware Security and Trust

Hardware Security and Trust

This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from...

Biometric Security and Privacy

Biometric Security and Privacy

This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches,...

Introduction to Cybercrime

Introduction to Cybercrime

Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments,...

Wireless Hacking

Wireless Hacking

Introduction to Wireless Hacking with Kali Linux. Understanding the need to test your wireless systems. Wireless vulnerabilities. Thinking like a...

Hardware IP Security and Trust

Hardware IP Security and Trust

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of...

NTP Security

NTP Security

Learn  the risks associated with Network Time Protocol (NTP) security and how to minimize those risks in daily deployment. Disruption of...

DDoS Attacks

DDoS Attacks

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a...

From Hacking to Report Writing

From Hacking to Report Writing

This book will teach you everything you need to know to become a professional security and penetration tester. It simplifies...