FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
-
Tor: From the Dark Web to the Future of Privacy (Ben Collier)
A biography of Tor - one of the most important and misunderstood technologies of the digital age, is best known as the infrastructure underpinning the so-called Dark Web - a history of power, privacy, and global politics at the internet's core.
-
Information Security Management: An Executive View
This book helps enable companies to understand and manage privacy and cyber risks to build business trust. It serves as a reference for professionals who currently work in the labor market.
-
CompTIA Security+ Study Guide (Netwrix)
This book is designed for IT and security professionals who aim to obtain CompTIA Security+ certification. It covers all the certification exam objectives (domains) of the latest version of the exam, Sy0-501.
-
Big Data Security (Shibakali Gupta, et al)
After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.
-
An Introduction to Computer Security: The NIST Handbook
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
-
Computer Systems Security: Planning for Success (Ryan Tolboom)
This book is an introduction to the applied topic of computer security. Readers will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems.
-
Security Service Edge (SSE) For Dummies, Netskope Special Edition
Security Service Edge (SSE) is described by Gartner as the security stack of services within a SASE architecture. SSE is fast, easy to use, and secures your business wherever your people and data go.
-
The InfoSec Handbook: An Introduction to Information Security
This book offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.
-
Security Concepts (Subspacefield)
This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.
-
Information Security Governance Simplified (Todd Fitzgerald)
This book lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.
-
Computer Security Handbook (Seymour Bosworth, et al.)
This handbook has compiled advice about how to minimize the possibility of computer security breaches in your systems. It provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more.
-
Managing Risk and Information Security: Protect to Enable
Examine the evolving enterprise security landscape and discover how to manage and survive risk. The book also includes many examples from other well-known companies and provides guidance for a management-level audience.
-
Security as Code: DevSecOps Patterns with AWS (BK Das, et al.)
It demonstrates how to use this methodology to secure any application and infrastructure you want to deploy. You'll learn how to create a secure containerized application with Kubernetes using CI/CD tooling from AWS and open source providers.
-
DevOpsSec: Securing Software through Continuous Delivery
Understand how to use DevOps to secure DevOps. This book uses case studies from Etsy, Netflix, and the London Multi-Asset Exchange (LMAX) to illustrate the steps leading organizations have taken to secure their DevOps processes.
-
Security of Ubiquitous Computing Systems (Gildas Avoine, et al)
It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.
-
Security in Distributed, Grid, Mobile, and Pervasive Computing
A rich and useful presentation of strategies for security issues, this book focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems.
-
Platform Embedded Security Technology Revealed (Xiaoyu Ruan)
This book is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones.
-
Building Secure and Reliable Systems: Best Practices
Security is crucial to the design and operation of scalable systems in production. Experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.
-
Rational Cybersecurity for Business (Daniel Blum)
This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.
-
Security Engineering: Building Dependable Distributed Systems
It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.
-
Web Application Security: Exploitation and Countermeasures
This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. It introduces three pillars of web application security: recon, offense, and defense.
-
Unauthorized Access: The Crisis in Online Privacy and Security
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security.
-
Defense against the Black Arts: How Hackers Do What They Do?
The best way to secure a system is to understand the tools hackers use and know how to circumvent them. This book provides hands-on instruction to a host of techniques used to hack into a variety of systems.
-
The Privacy Engineer's Manifesto: Getting from Policy to Code
This book offers industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy.
-
How to Become Anonymous, Secure and Free Online (Amy Awol)
This book describes how internet users can become anonymous, secure and free. It gives many free resources and methods for users who want to go anonymous and protect their personal data from being accessed or hacked from outside sources.
-
Data Privacy for the Smart Grid (Rebecca Herold, et al)
This book provides a clear description of the Smart Grid ecosystem, presents practical guidance about its privacy risks, and details the actions required to protect data generated by Smart Grid technologies.
-
Handbook of Digital Face Manipulation and Detection
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the both biometrics and media forensics fields.
-
Cybersecurity: Public Sector Threats and Responses
Focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging trends and strategies from around the world and offers practical guidance for addressing contemporary risks.
-
Demystifying Internet of Things Security (Sunil Cheruvu, et al)
This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. It provides clarity to industry professionals and provides and overview of different security solutions.
-
Next-Generation Firewalls For Dummies (Palo Alto Networks)
This book will show you how to rethink your security strategy to counter and block even the most sophisticated attacks, help you understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one.
-
Palo Alto Firewall: Practical Guidance and Hands-On Labs
This book explains step-by-step how to configure a Palo Alto firewall in the network. Each chapter begins with learning objectives and contains step-by-step explanations for GNS3 beginners on how to build different security scenarios from scratch.
-
FortiGate Firewall: Practical Guidance and Hands-On Labs
This book explains step-by-step how to configure a FortiGate firewall in the network. Each chapter begins with learning objectives and contains step-by-step explanations for GNS3 beginners on how to build different security scenarios from scratch.
-
Firewalls and Internet Security: Repelling the Wily Hacker
This book gives invaluable advice and practical tools for protecting our computers. Learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your easy access to Internet services.
-
Firewalls Complete (Marcus Goncalves)
This info-packed book covers virtually all firewall techniques, technologies, and brands - and even includes a blueprint for designing your own. It gives you 100% of what you need to deliver fully functional applications quickly.
-
Building Internet Firewalls, 2nd Edition (E. Zwicky, et al)
Without firewalls, network security problems can rage out of control. This book is is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall.
-
Advances in Security in Computing and Communications
This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It covers cryptography, network security, and security and privacy issues in the Internet of Things (IoT).
-
Cryptography and Computer Security (Chris Bourke, et al)
This book introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security.
-
Beautiful Security: Leading Security Experts Explain How They Think
This book features a collection of essays and insightful analyses by leaders who have found unusual solutions for writing secure code, designing secure applications, addressing modern challenges such as wireless security, and much more.
-
Security+ Essentials (Neil Smyth)
This book is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ examination. It is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.
-
Building the Infrastructure for Cloud Security: A Solutions View
This book provides a comprehensive look at the various facets of cloud security - infrastructure, network, services, Compliance and users. It highlights the fundamental technology components necessary to build and enable trusted clouds.
-
The Security Development Lifecycle: More Secure Software
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). It guides you through each stage of the SDL-from education and design to testing and post-release.
-
Open Source Security Tools: A Practical Guide to Security Apps
This book is a practical, hands-on introduction to open source security tools. It reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the "best of breed" for all major areas of information security.
-
Forensic Discovery (Dan Farmer, et al)
This book covers both theory and hands-on practice of computer forensics, introducing a powerful approach that can often recover evidence considered lost forever. It covers everything from file systems, to memory and kernel hacks, to malware.
-
Hacking Exposed Computer Forensics (Aaron Philipp, et al)
This book explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents.
-
Vulnerability Management for Dummies (Wolfgang Kandek)
This book is all about what you can do to automatically manage vulnerabilities and keep your network safe from attack. It arms you with the facts and shows you how to implement a successful Vulnerability Management program.
-
Security Enhanced Applications for Information Systems
this book aims to present a number of innovative security enhanced applications. It is also a quality guide for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems.
-
Unmanned Aircraft Systems in the Cyber Domain
It will fully immerse and engage the readers in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). It brings a breadth and quality of information that is unparalleled in the unclassified sphere.
-
Intrusion Detection Systems with Snort, Apache, MySQL, PHP, ACID
This book provides information about how to use free Open Source tools to build and manage an Intrusion Detection System. Provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
-
Identity Management on a Shoestring (Ganesh Prasad, et al)
This book is aimed at Security and IT practitioners (especially architects) in end-user organisations who are responsible for implementing an enterprise-wide Identity and Access Management (IAM) system.
-
Survive The Deep End: PHP Security (Padraic Brady)
This book will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, etc.
-
Kali Linux Revealed: Mastering the Penetration Testing Distribution
Kali Linux has not only become the information security professional's platform of choice, but evolved into an industrial-grade, and world-class operating system distribution--mature, secure, and enterprise-ready.
-
Kali Linux: Assuring Security by Penetration Testing
This book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing to detailed coverage.
-
Web Application Security Guide (Jan Schejbal)
This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.
-
Web Application Security for Dummies (Mike Shema)
This book is a quick guide to understanding how to make your website secure. It surveys the best steps for establishing a regular program to quickly find vulnerabilities in your site with a web application scanner.
-
Web Servers Succinctly (Marc Clifton)
This book provides great insights on the benefits of building your own web server, and covers different options available for threading, work processes, session management, routing, and security.
-
Theory and Practice of Cryptography and Network Security Protocols
This book discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges.
-
Nmap Cookbook: The Fat-Free Guide to Network Security Scanning
This book provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.
-
The Coming Swarm: DDOS Actions, Hacktivism, and Internet
This book examines the history, development, theory, and practice of Distributed Denial of Service (DDoS) actions as a tactic of political activism, with a historically grounded analysis, and a focus on early deployments of activist DDOS.
-
Juniper SRX Series: A Comprehensive Guide to Security Services
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper's SRX Series networking device.
-
Handbook of Information Security Management (Micki Krause)
Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.
-
UNIX System Security: A Guide for Users and System Administrators
This book begins by examining four high-profile breaches of UNIX security as illustrations of how a UNIX system can be attacked. It then provides the information necessary to protect against these forms of attack, and offers the tools.
-
BIOS Disassembly Ninjutsu Uncovered (Darmawan Salihun)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs.
-
The SELinux Notebook, 4th Edition (Richard Haines)
If you want an effective means of securing your Linux system (and who doesn't?), this book provides the means. This best-known and most respected security-related extension to Linux embodies the key advances of the security field.
-
Cryptography and Security in Computing (Jaydip Sen)
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography mechanisms.
-
Applied Cryptography and Network Security (Jaydip Sen)
This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks.
-
Visual Cryptography and Its Applications (Jonathan Weir, et al)
In this book, one of the data security methods known as visual cryptography (VC) is presented. Many types of visual cryptography are examined. From the very first type of traditional visual cryptography right up to the latest developments.
-
Public-Key Cryptography: Theory and Practice (Bodo Moeller)
This book examines multiple aspects of public-key cryptography. It covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
-
Rethinking Public Key Infrastructures and Digital Certificates
In this book, the author proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Potential applications include electronic cash, electronic postage, digital rights management, etc.
-
A Guide to Claims-Based Identity and Access Control (D. Baier, et al)
This book explains what claims-based identity is and how to use it in the context of some commonly occurring scenarios. It deals with the fundamental issues, but it is practical and concise.
-
Ruby on Rails Security Guide (OWASP Foundation)
This is the one and only source of information about Rails security topics, and I keep the community up-to-date with blog posts and conference talks in Europe. The Guide and the Project has been mentioned in several Rails books and web-sites.
-
Nmap Network Scanning: The Official Nmap Guide
This book is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing.
-
Improving Web Services Security: Scenarios and Implementation
Using end-to-end application scenarios, this free book shows you how to design and implement authentication and authorization in WCF (Windows Communication Foundation).
-
Hacking the Xbox: An Introduction to Reverse Engineering
This book shows Xbox owners how to increase the value and utility of their system, Hacking the Xbox features step-by-step tutorials on hardware modification that teach basic hacking techniques as well as essential reverse engineering skills.
-
Mastering Ethereum: Building Smart Contracts and DApps
The book is intended to serve both as a reference manual and as a cover-to-cover exploration of Ethereum. If you're looking to get started with the Ethereum protocol (open source developers, integrators, etc.), this is the definitive book on the topic.
-
Mastering Bitcoin: Programming the Open Blockchain
This book is your guide through the seemingly complex world of Bitcoin, providing the knowledge you need to participate in the internet of money. It will help you engineer money. You're about to unlock the API to a new economy. This book is your key.
-
O'Reilly® SpamAssassin (Alan Schwartz )
This book is the only published resource devoted to SpamAssassin and how to integrate it effectively into your networks.
-
Secrets of Network Cartography: A Comprehensive Guide to Nmap
In this book, thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis!
-
Network Security Tools: Writing, Hacking, and Modifying Security
This concise, high-end free book discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment.
-
O'Reilly® Snort Cookbook (Angela Orebaugh, Simon Biles, et al)
This book offers far more than quick cut-and-paste solutions to frustrating security issues using Snort, the defacto open source standard of intrusion detection tools
-
The .NET Developer's Guide to Windows Security (Keith Brown)
This book is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems.
-
O'Reilly® Practical UNIX and Internet Security, Second Edition
This book is a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection.
-
Own Your Space: Keep Yourself and Your Stuff Safe Online
Defensive Computing Techniques to Help You Avoid Malware and Data Loss. This handbook is designed to help you find ways to protect your Windows XP/Vista/7 PC and ensure your data is safe.
-
Internet Safety: Keeping your Computer Safe on the Internet
It covers the basics - the things you must do, the software you must run and the concepts you need to be aware of - to keep your computer and your data safe as you use the internet.
-
Cryptography's Role in Securing the Information Society
This book addresses the need for a strong national policy on cryptography that protects the information interests of individuals and businesses while respecting the needs of law enforcement and intelligence for national security and foreign policy purposes.
:
|
|