Computing & Internet Networking & Security Books

Beginner's Guide to Information Security: Kickstart your security career with insight from InfoSec experts

"The Beginner’s Guide to Information Security" offers insight and resources to help readers embark on a career in one of the 21st century’s most important—and potentially lucrative—fields. Maybe you want to move into information security from IT, say, from a developer or system administrator role. Or maybe you just graduated with your bachelor’s or master’s degree. Whatever your education or prior experience, this book can offer you a great start, with advice from real people who are working in the InfoSec field. It starts off with some chapters that cover ways to learn about information security, maybe pick up a certification or two, find out about job opportunities, and then, hopefully, snag a job. "The Beginner’s Guide" also delves deeper into InfoSec topics, helping readers master key skills like knowing how to protect a network, respond to a security incident, and educate users so they’re part of the security solution—not the problem. The final chapters focus on “big picture” issues such as women in security, and where InfoSec may be heading in the future. The book’s content has been crowdsourced from members of, the independent online community of InfoSec professionals. Peerlyst users share their real-world knowledge every day and build their reputation as experts in the security space. Order the "Beginner’s Guide to Information Security" now to join them!

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers can use to exploit physical access, network access, and wireless vectors. The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks.

The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code.The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM.