HACKING THE FUTURE – PRIVACY, IDENTITY, AND ANONYMITY ON THE WEB
Cole Stryker presents a strong defence of anonymity and explores some of the tools and organisations relating to privacy, identity, and anonymity on the Web, especially as it has evolved with the ubiquity of the Internet. Cogent and compelling, his examination of online identities, both false and real, is an essential read for the social networking age.
Published by: Overlook Press
CORPORATE COMPUTER SECURITY
Raymond R Panko and Randy Boyle provide a strong business focus, along with a solid technical understanding, of
security tools. This book gives readers the IT
security skills they need for the workplace. This edition is more business focused and contains additional hands-on projects, coverage of wireless and data
security, and case studies.
Published by: Prentice Hall
WEB APPLICATION DEFENDER’S COOKBOOK
Ryan C Barnett shows how attackers and hackers identify and attack vulnerable live Web applications. This book shows readers how to defend their applications, detailing defensive
security methods, and can also be used as courseware for training network
security personnel, Web server administrators, and
security consultants. Topics include identifying vulnerabilities, setting hacker traps, defending different access points and enforcing application flows.
Published by: John Wiley & Sons
COMPUTER SECURITY – PRINCIPLES AND PRACTICE
security.jpg" alt="" />William Stallings and Lawrie Brown state that in recent years, the need for education in computer
security and related topics has grown dramatically, and it is essential for anyone studying computer science or computer engineering. The book provides integrated, comprehensive, up-to-date coverage of the broad range of topics on this subject.
Published by: Prentice Hall