Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play ...
The Dictionary of Information Security is a compilation of security terms and definitions that wo...
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive in...
How to Attack and Defend Your Website is a concise introduction to web security ...
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fac...
Linux Malware Incident Response is a 'first look' at the Malware Forensics Field Guide ...
There is considerably more skill in the IT and security communities than is reflected in the j...
Identity authentication and authorization are integral tasks in today's digital world. As busi...
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all s...
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Se...
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource una...