A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their usage in real applications that the reader can build themselves. It includes access to a live execution environment and real code examples.
Although a book about computer security, this goes far beyond the usual "beware the dangers of chat rooms" warnings to teach you everything you need to know to protect your computer, your privacy, and yourself.
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. The book explores techniques that developers can use to build additional layers of security into their apps beyond the security controls provided by Android itself.
Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle.
This book provides a comprehensive look at the various facets of cloud security infrastructure, network, services, Compliance and users. It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a security perspective.
Written with everyday users in mind, this practical book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities.
Internet security expert Matt Curtin's book, Developing Trust: Online Privacy and Security is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
Written by an experienced consultant with 25 years of industry experience, Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference is a practical how-to guide that explains how to thrive in the face of natural disasters, man-made events, power outages, hackers, and anything else that might interrupt business operations.
A definitive, expert-driven update of the popular, slash-dotted first edition, containing detailed Mac OS X security information and walkthroughs on securing systems, including the Snow Leopard operating system.
Any company using .NET will eventually (if it hasn't already) expose part of its functionality as a .NET Web service, and securing these features will become job number one. This book provides a comprehensive treatment on how to secure Web services on the .NET platform.