This ApressOpen book Managing Risk and Information Security: Protect to Enable describes the changing risk environment and why a fresh approach to information security is needed. The book discusses business risk from a broad perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.
Free IT Security Books
ApressOpen title Managing Risk and Information Security: Protect to Enable, 2nd Edition provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed.
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their usage in real applications that the reader can build themselves. It includes access to a live execution environment and real code examples.
The InfoSec Handbook: An Introduction to Information Security is An easily accessible but detailed book making it easy for beginners to experienced engineers to get the lowdown on the latest policies, practices, tools, and technologies available in the field of information security.
In The Security Development Lifecycle (SDL), security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL—from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization.
The author, Darmawan Salihun, has released an unedited version of his book “BIOS Disassembly Ninjutsu Uncovered” in PDF format for free. You will be able to grasp how exactly the PC hardware works in its lowest level. This book also presents a generic approach to PCI expansion ROM development using the widely available GNU tools.
“Identity Management on a Shoestring: Architectural Lessons from a Real-World Implementation”, written by Ganesh Prasad and Umesh Rajbhandari, is about a radically different approach to Identity and Access Management (IAM) called LIMA (Lightweight/Low-cost/Loosely-coupled Identity Management Architecture).
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or web site. It is important to understand the potential risks and then make sure you are fully protected against them.
Download this free eBook “HackerProof: Your Guide To PC Security” from MakeUseOf.com. This guide provides an objective, detailed, but easily understood walkthrough of PC security. By the end of this guide you will know exactly what PC security means and, more importantly, what you need to do to keep your PC secure.
This is a free book about computer, network, technical, physical, information and cryptographic security. You can download it as a pdf file or read it online.