-
Network Security Through Data Analysis, 2nd Edition
Author Michael Collins
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for col....
Release Date 2017/09 -
Linux Hardening in Hostile Networks: Server Security from TLS to Tor
Author Kyle Rankin
Implement Industrial-Strength Security on Any Linux ServerIn an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-fa....
Release Date 2017/07 -
What's Wrong with Damn Near Everything!
Author Larry Winget
The Pitbull of Personal Development® Takes on Damn Near Everything!Larry Winget does not mince words, and in this latest addition to his straight-talking brand, one of the most iconic leaders of the personal development industry puts down in black and white, What'....
Release Date 2017/07 -
Author Doug Barth , Evan Gilman
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar ....
Release Date 2017/07 -
Author Michael McLafferty , Warun Levesque , Arthur Salmon
Master the art of detecting and averting advanced network security attacks and techniquesAbout This BookDeep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and WiresharkBecome an expert in ....
Release Date 2017/04 -
Author Justin Richer Antonio Sanso
SummaryOAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You’ll learn how to confidently and securely build and deploy OAuth on both the client an....
Release Date 2017/03 -
Author Dimitar P. Mishev , Aliakbar Montazer Haghighi
Presents an introduction to differential equations, probability, and stochastic processes with real-world applications of queues with delay and delayed network queuesFeaturing recent advances in queueing theory and modeling, Delayed and Network Queues provides the ....
Release Date 2016/10 -
Workshop Mastery with Jimmy DiResta
Author John Baichtal , Jimmy DiResta
Jimmy DiResta has made a name for himself with his inventiveness and workshop skills, creating dozens of projects for YouTube videos and television shows such as Hammered and Against the Grain on the DIY network. In Make: Workshop Mastery With Jimmy DiResta, Jimmy ....
Release Date 2016/10 -
Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within
Author Julie Mehan
Learn how to build a defense program against insider threats Insiders are not always employees and insider threats are not always intentional. This new title from Dr Julie Mehan looks beyond perimeter protection tools and shows how a security culture based on int....
Release Date 2016/09 -
Author Joseph L. Badaracco Jr.
When Business and Personal Values CollideDefining moments” occur when managers face business decisions that trigger conflicts with their personal values. These moments test a person’s commitment to those values and ultimately shape their character. But these are a....
Release Date 2016/08 -
Author Gregory Fell , Mike Barlow
Just beneath the very busy, public Web is a shadowy realm largely untouched by search engines. This is the dark net—a hidden place where individuals and groups seek anonymity. It provides sanctuary for people living under authoritarian regimes, consumers tired of b....
Release Date 2016/07 -
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Author Aaron Woland , Panos Kampanakis , Omar Santos
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network securit....
Release Date 2016/06 -
Identity and Data Security for Web Development
Author Tim Messerschmidt , Jonathan LeBlanc
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without r....
Release Date 2016/06 -
Business Continuity and the Pandemic Threat
Author Robert Clark
Considering the pandemic threat in a business continuity context I thoroughly enjoyed reading Clark’s book which is written in a style that makes it easy for anyone to understand without requiring a background in medicine or business. I have been involved in....
Release Date 2016/06 -
Author Will Gragido , Iain Davison , David DeSanto , John Pirc
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting....
Release Date 2016/05 -
Anomaly Detection for Monitoring
Author Baron Schwartz , Preetam Jinka
Monitoring, the practice of observing systems and determining if they're healthy, is hard--and getting harder. In a perfect world, your anomaly detection system would warn you about new behaviors and data patterns in time to fix problems before they happened, and ....
Release Date 2016/03 -
Cryptography and Network Security
Author S. Bose , Ajay Kumar
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map th....
Release Date 2016/03 -
Warding Off the Threat of Disruption
Author Joshua S. Gans , Daniel Cohen
In a fast-changing digital landscape, companies shouldn't wait too long to reconfigure their offerings — but they also should be wary of moving to an untested technology too soon. Monitoring trends in related industries and identifying high-potential startup....
Release Date 2016/01 -
Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Author Noel Rivera , Richard Bedwell , William Wilson , Chris Carthern
This book is a one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification preparation. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions fo....
Release Date 2015/12 -
Author Charles Bihis
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkAbout This BookLearn how to use the OAuth 2.0 protocol to interact with the world's most popular ....
Release Date 2015/12 -
Introduction to Network Security, 2nd Edition
Author Zachary A. Kissel , Jie Wang
Introductory textbook in the important area of network security for undergraduate and graduate studentsComprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee securityFully updated to reflect....
Release Date 2015/10 -
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285
Author John Gay , Alex Tatistcheff , Todd Lammle
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prepSecuring Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives. With clear and conci....
Release Date 2015/10 -
The Network Security Test Lab: A Step-by-Step Guide
Author Michael Gregg
The ultimate hands-on guide to IT security and proactive defenseThe Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential g....
Release Date 2015/08 -
Network Attacks and Exploitation
Author Matthew Monte
Incorporate offense and defense for a more effective network security strategyNetwork Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. ....
Release Date 2015/08 -
Sage 50 Accounts For Dummies, 3rd UK Edition
Author Jane E. Kelly
The easy way to come to grips with Sage 50 AccountsWritten by a Sage 50 Accounts expert and packed with step-by-step instructions, this hands-on, accessible guide is the easiest way to master this popular small business accounting software. Walking you through every....
Release Date 2015/06 -
Author Suraj Gaurav , Suren Machiraju
Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform.This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NE....
Release Date 2015/06 -
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis
Author Marco M. Morana , Tony UcedaVelez
This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security counte....
Release Date 2015/05 -
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
Author Prabath Siriwardena
AdvancedAPI Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs.API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business func....
Release Date 2014/08 -
Sage Instant Accounts For Dummies
Author Jane E. Kelly
Get to grips with Sage Instant Accounts in simple steps.This comprehensive guide walks you through every aspect of setting up and using Sage Instant Accounts, from downloading and installing the software to customizing it to your needs. Packed with handy step-by-ste....
Release Date 2014/06 -
Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Author Andrew Ossipov , Omar Santos , Jazib Frahim
Cisco® ASAAll-in-One Next-Generation Firewall, IPS, and VPN Services, Third EditionIdentify, mitigate, and respond to today’s highly-sophisticated network attacks.Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA:....
Release Date 2014/04