Security Enhanced Applications for Information Systems
by Christos Kalloniatis
Publisher: InTech 2012
Number of pages: 224
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
Home page url
Download or read it online for free here:
by WeiQi Yan, Jonathan Weir - BookBoon
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
by Symeon Xenitellis - OpenCA Team
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
by Paul Maher, Alex Mackman - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
by Kelvin Karanja
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.