-
Zero Trust Networks, 2nd Edition
Author Razi Rais , Christina Morillo , Evan Gilman , Doug Barth
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method....
Release Date 2023/12 -
Author Stoyan Stefanov , Jeremy Rogers
Secure your Linux server and protect it from intruders, malware attacks, and other external threatsAbout This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as ....
Release Date 2006/02 -
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. Adopting an.... -
Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Author Noel Rivera , Richard Bedwell , William Wilson , Chris Carthern
This book is a one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification preparation. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions fo....
Release Date 2015/12 -
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2
Author Yvonne Wilson , Abhishek Hingnikar
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building ....
Release Date 2022/11 -
Mastering Linux Security and Hardening - Second Edition
Author Donald A. Tevault
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a L....
Release Date 2020/02 -
Network Security, Firewalls, and VPNs, 3rd Edition
Author J. Michael Stewart , Denise Kinsey
Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet.
Release Date 2020/10 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Morey J. Haber
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization wi....
Release Date 2020/06 -
The Network Security Test Lab: A Step-by-Step Guide
Author Michael Gregg
The ultimate hands-on guide to IT security and proactive defenseThe Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential g....
Release Date 2015/08 -
Author Tom Piens
Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platformKey FeaturesUnderstand how to optimally use PAN-OS featuresBuild firewall solutions to safeguard local, cloud, and mobile networksProtec....
Release Date 2020/09 -
Cisco ASA and PIX Firewall Handbook
Author Dave Huca
The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security featuresLearn about the various firewall models, user interfaces, feature sets, and configuration methodsUnderstand how a Cisco firewall inspects trafficConfigure firewall inter....
Release Date 2005/06 -
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance, Second Edition
Author Omar Santos , Jazib Frahim - CCIE No. 5459
For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide t....
Release Date 2009/12 -
Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Author Andrew Ossipov , Omar Santos , Jazib Frahim
Cisco® ASAAll-in-One Next-Generation Firewall, IPS, and VPN Services, Third EditionIdentify, mitigate, and respond to today’s highly-sophisticated network attacks.Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA:....
Release Date 2014/04 -
Author Chad Sullivan
Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention SystemSecure your endpoint systems with host IPSBuild and manipulate policies for the systems you wish to protectLearn how to use groups and hosts....
Release Date 2005/06 -
SSH, The Secure Shell: The Definitive Guide, 2nd Edition
Author Robert G. Byrnes , Richard E. Silverman , Daniel J. Barrett
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implement....
Release Date 2005/05 -
Author Charles Bihis
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkAbout This BookLearn how to use the OAuth 2.0 protocol to interact with the world's most popular ....
Release Date 2015/12 -
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Author Aaron Woland , Panos Kampanakis , Omar Santos
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network securit....
Release Date 2016/06 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
Author Doug Barth , Evan Gilman
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar ....
Release Date 2017/07 -
Demystifying Cryptography with OpenSSL 3.0
Author Alexei Khlebnikov , Jarle Adolfsen
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, digital signatures, SSL/TLS connectivity, and PKI handlingKey FeaturesSecure your applications against common network security threats using OpenSSLGet to grips with the ....
Release Date 2022/10 -
Adversarial Tradecraft in Cybersecurity
Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition.Key FeaturesGain an advantage against live hackers in a competition or real computing environmentUnderstand .... -
Mastering Windows Security and Hardening
Author Mark Dunkerley , Matt Tumbarello
Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and A....
Release Date 2020/07 -
Network Protocols for Security Professionals
Author Yoram Orzach , Deepanshu Khanna
Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey FeaturesExploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database, DNS, voice, video, and collaboration server attac....
Release Date 2022/10 -
Workshop Mastery with Jimmy DiResta
Author John Baichtal , Jimmy DiResta
Jimmy DiResta has made a name for himself with his inventiveness and workshop skills, creating dozens of projects for YouTube videos and television shows such as Hammered and Against the Grain on the DIY network. In Make: Workshop Mastery With Jimmy DiResta, Jimmy ....
Release Date 2016/10 -
Author Aditya Mukherjee
Build a resilient network and prevent advanced cyber attacks and breachesKey FeaturesExplore modern cybersecurity techniques to protect your networks from ever-evolving cyber threatsPrevent cyber attacks by using robust cybersecurity strategiesUnlock the secrets of networ....
Release Date 2020/11 -
Author Jamie Sanbower , Mason Harris , Vivek Santuka , Aaron Woland
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protectionIntegrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in se....
Release Date 2018/07 -
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
Author Jesus Vigo , Jr.
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic to....
Release Date 2022/12 -
Distributed Denial of Service (DDoS)
Author Rich Groves , Eric Chou
Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to ....
Release Date 2018/04 -
A concise introduction to the NIS Directive - A pocket guide for digital service providers
Author Alan Calder
This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENIS....
Release Date 2018/11