Computer Security

Securing computer systems is crucial in our increasingly interconnected electronic world. With so many business, consumer, and governmental processes occurring online, a growing potential exists for unauthorized access, change, or destruction of those processes. For years, Elsevier’s Syngress imprint has helped computer and information security professionals learn theory, strategy, and tactics for protecting digital assets in this constantly evolving field. Our books and eBooks in areas such as info security, digital forensics, hacking and penetration testing, certification, and IT security and administration. Click here for Syngress companion materials Click here for access to our archive of free eBooks, booklets and downloadable PDFs for Syngress and Computer security content. Access companion materials and instructor’s resources for all our books from the Elsevier Store. Search by author, title or ISBN, then look for the “Resources” tab on any book page.

Computer Security

Floating point

Nowadays, most embedded systems are built using 32-bit CPUs. These devices give plenty of scope for performing the... Read more

Computer Science; Computer Security

Does Regulating Artificial Intelligence Save Humanity Or Just Stifle Innovation?

Some people are afraid that heavily armed artificially intelligent robotsmight take over the world, enslaving humanity – or perhaps exterminating... Read more

Computer Science; Computer Security

Are Cryptocurrencies A Dream Come True For Cyber-Extortionists?

When malicious software takes over computers around the world, encrypts their data and demands a ransom to decode the information, regular activities... Read more

Computer Science; Computer Security

On The Future Of Data Warehousing

Last month, Prof Zicari had the pleasure of interviewing Jacque Istok, Head of Data Technical Field for Pivotal,... Read more

Computer Science; Computer Security

Why Don’t Big Companies Keep Their Computer Systems Up-To-Date?

The Equifax hack, exposing 143 million people’s personal data to unknown cybercriminals starting in March but not made... Read more

Computer Science; Computer Security

By Concealing Identities, Cryptocurrencies Fuel Cybercrime

When hackers hold their victims’ data for ransom, as happened in the WannaCry and NotPetya ransomware attacks that spread across... Read more

Computer Security

The Five Technological Forces Disrupting Security

We are fortunate to be living in one of the most exciting times in the history of modern... Read more

Computer Science; Computer Security

The Only Safe Email Is Text-Only Email

It’s troubling to think that at any moment you might open an email that looks like it comes... Read more

Connect with us on social media and stay up to date on new articles