-
Author Stephen Bussey
Give users the real-time experience they expect, by using Elixir and Phoenix Channels to build applications that instantly react to changes and reflect the application's true state. Learn how Elixir and Phoenix make it easy and enjoyable to create real-time applications ....
Release Date 2020/03 -
Mastering Linux Security and Hardening - Second Edition
Author Donald A. Tevault
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a L....
Release Date 2020/02 -
Advanced API Security: OAuth 2.0 and Beyond
Author Prabath Siriwardena
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is conv....
Release Date 2019/12 -
Author Abhishek Hingnikar , Yvonne Wilson
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and t....
Release Date 2019/12 -
Author Allison Cerra
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can tak....
Release Date 2019/09 -
Author Jennifer Jin , Marcus J. Carey
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published asTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introd....
Release Date 2019/08 -
Author Stephen Gates
Despite deploying the latest security technologies, organizations still struggle to defend cloud-based web applications against sophisticated cyberattacks. Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach ha....
Release Date 2019/04 -
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Author Mike O'Leary
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and....
Release Date 2019/03 -
Securing Network Infrastructure
Author Sagar Rahalkar , Sairam Jetty
Plug the gaps in your network's infrastructure with resilient network security modelsKey FeaturesDevelop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement n....
Release Date 2019/03 -
Author Imke Köhler
There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat,....
Release Date 2019/03 -
Author Dr. Michael J. Urick
Many assumed characteristics of generational groupings are actually “myths,” meaning that generational stereotypes are not accurate across all members of a generation.This book explores the Generation Myth by highlighting the complexity of the “generation” concept ....
Release Date 2019/02 -
A concise introduction to the NIS Directive - A pocket guide for digital service providers
Author Alan Calder
This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENIS....
Release Date 2018/11 -
Author Sairam Jetty
Discover network vulnerabilities and threats to design effective network security strategiesKey FeaturesPlunge into scanning techniques using the most popular tools Effective vulnerability assessment techniques to safeguard network infrastructure Explore the Nmap S....
Release Date 2018/09 -
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Author Carey Parker
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure ....
Release Date 2018/08 -
Network Vulnerability Assessment
Author Sagar Rahalkar
Build a network security threat model with this comprehensive learning guideKey FeaturesDevelop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastr....
Release Date 2018/08 -
Author Jamie Sanbower , Mason Harris , Vivek Santuka , Aaron Woland
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protectionIntegrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in se....
Release Date 2018/07 -
Author David Zientara
Install, Configure and Setup different connections with pfSenseKey FeaturesBuild firewall and routing solutions with PfSense. Learn how to create captive portals, how to connect Pfsense to your https environment and so on. Practical approach towards building firew....
Release Date 2018/07 -
Author Manuj Aggarwal
Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your networkKey FeaturesExplore pfSense, a trusted open source network security solution Configure pfSense as a firewall and create and manage firewall ru....
Release Date 2018/07 -
Author Brad Hibbert , Morey J. Haber
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, ev....
Release Date 2018/06 -
Author Ajay Singh Chauhan
Get more from your network by securing its infrastructure and increasing its effectivenessAbout This BookLearn to choose the best network scanning toolset for your systemImplement different concepts of network scanning such as port scanning and OS detectionAdapt a ....
Release Date 2018/05 -
Mastering pfSense - Second Edition
Author David Zientara
Install and configure a pfSense router/firewall, and become a pfSense expert in the process.About This BookYou can always do more to secure your software ? so extend and customize your pfSense firewallBuild a high availability security system that's fault-tolerant....
Release Date 2018/05 -
Network Defense and Countermeasures: Principles and Practices, Third edition
Author Chuck Easttom
All you need to know about defending networks, in one bookClearly explains concepts, terminology, challenges, tools, and skillsCovers key security standards and models for business and governmentThe perfect introduction for all network/computer security professiona....
Release Date 2018/04 -
Author Andrei Miroshnikov
Go deep into Windows security tools to implement more robust protocols and processesWindows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Microsoft security p....
Release Date 2018/04 -
Distributed Denial of Service (DDoS)
Author Rich Groves , Eric Chou
Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to ....
Release Date 2018/04 -
Author Andy Still
Automated traffic is a major factor in the modern internet, especially for website owners. Bots, spiders, and scrapers now exceed the amount of traffic from human users, and this trend is expected to continue in the number and sophistication of bot types. With this....
Release Date 2018/04 -
Author Chad Russell
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security....
Release Date 2018/04 -
Network Meta-Analysis for Decision-Making
Author Alexander J. Sutton , Jeroen P. Jansen , Nicky J. Welton , A. E. Ades , Sofia Dias
A practical guide to network meta-analysis with examples and codeIn the evaluation of healthcare, rigorous methods of quantitative assessment are necessary to establish which interventions are effective and cost-effective. Often a single study will not provide the ....
Release Date 2018/03 -
Mastering Linux Security and Hardening
Author Donald A. Tevault
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.About This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such a....
Release Date 2018/01 -
Cisco Firepower Threat Defense (FTD)
Author Nazmul Rajib
The authoritative visual guide to Cisco Firepower Threat Defense (FTD)This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower....
Release Date 2017/12 -
Author Adolfo Eloy Nascimento
Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies.About This BookInteract with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google.Use Spring Security and Spring Securit....
Release Date 2017/10