Books on Information Security (Part 2)

    We bring to your attention a continuation of the article on books on information security, this time a list of literature that attracted the attention of experts at the RSA 2014 conference, some of the books can be found on 8files.

    Googling Security: How Much Does Google Know About You?

    “Google is watching you,” is the main idea of ​​this book. The authors claim that the world's largest provider of free web services actually charges users for their services, they only pay for these services not with money, but with information about themselves. With comprehensive data about each user, Google has a huge potential impact on society. The authors give some advice on how to protect yourself from the all-seeing eye of the search giant.

    Hacking Exposed 7: Network Security Secrets & Solutions

    After reading this book, you will understand how a hacker thinks and how he approaches the execution of various attacks. How are vulnerabilities most often found? What hacker uses tools and techniques? What software holes on your side can be fatal? The answers to these and many other questions about modern hacker attacks can be found in this book.

    Big Data For Dummies

    The book introduces you to the basics of managing large amounts of data using "cloud" technologies. The authors consider the concept of "big data" and the key points associated with the organization of storage and processing of these data arrays. In a clear language, the basis is needed for cloud storage administrators of any scale: from the enterprise to the data center.

    Unmasking the Social Engineer: The Human Element of Security

    Social engineering, or more simply, fraud using social networks and modern technologies, is one of the key threats to the security of our time. The book is devoted to modern methods of social engineering and allows you to identify fraudsters among customers and contractors.

    Social Engineering: The Art of Human Hacking

    The book describes the basic techniques of social engineering, or "hacking people." The authors consider the basic techniques and methods of fraudsters, teach to identify provocations. It considers not only the tools used by scammers, but also the most effective and easiest methods to counter.

    Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results

    Working in a remote team is becoming increasingly popular, but it also carries a number of risks. The book is devoted to techniques by which you can avoid common mistakes when working remotely. The authors consider ways of motivation, building trust, the use of synchronous and asynchronous communications and give a lot of useful tips.

    CISSP Exam Cram

    The CISSP exam is a reliable way to prove your competency in information security. The book provides the reader with the necessary package of information for passing the exam, including encryption, working with "cloud" systems, security management methods and much more. The convenient structure allows you to quickly find the information you need in the book.

    CISSP Practice Exams, Second Edition

    Self-study in 10 parts, which allows you to fundamentally prepare for the CISSP exam. Recognized information security expert Sean Harris shares the most practical information and provides a detailed analysis of the questions that will need to be answered in the exam.

    Mobile Device Security For Dummies

    Mobile devices are rapidly replacing desktop PCs in the corporate environment, so the security issue of these devices is becoming especially acute. The authors consider practical approaches to the rapid and reliable organization of protection for mobile devices. Attention is paid to information security, counteraction to hacker attacks, use of VPN and granular control of access to applications.

    Mobile Authentication: Problems and Solutions

    The book addresses the issue of mobile authentication in terms of the specifics of human-computer interaction. The author pays special attention to the influence of the human factor and ways to mitigate the risks associated with it. To ensure the security of mobile devices, a deep understanding of the operating characteristics of these devices and the formation of authentication methods based on these features are required.

    Also popular now: