-
Securing Network Infrastructure
Author Sagar Rahalkar , Sairam Jetty
Plug the gaps in your network's infrastructure with resilient network security modelsKey FeaturesDevelop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement n....
Release Date 2019/03 -
Author Thomas Kranz
A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. In Making Sense of Cybersecurity you will learn how to: Develop and incrementally improve your own cybersecurity strategyDetect rogue WiFi ....
Release Date 2022/10 -
Advanced API Security: OAuth 2.0 and Beyond
Author Prabath Siriwardena
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is conv....
Release Date 2019/12 -
Author Abhishek Hingnikar , Yvonne Wilson
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and t....
Release Date 2019/12 -
Author Dylan Shields
Running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS. In AWS Security you’ll learn how to: Securely grant access to AWS resources to coworkers and customersDevelop policies....
Release Date 2022/09 -
CCNP Security Firewall 642-617 Quick Reference
Author Andrew Mason
As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Reference provides a concise review of all objectives on the new CCNP Security Firewall exam (642-617). This eBook provides you with detailed, graphical-based information, highlighting only t....
Release Date 2011/01 -
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition
Author David Huca - CCIE No. 4594
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily config....
Release Date 2007/08 -
Network Vulnerability Assessment
Author Sagar Rahalkar
Build a network security threat model with this comprehensive learning guideKey FeaturesDevelop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastr....
Release Date 2018/08 -
Author Allison Cerra
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can tak....
Release Date 2019/09 -
Cryptography and Network Security
Author S. Bose , Ajay Kumar
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map th....
Release Date 2016/03 -
Author Brad Hibbert , Morey J. Haber
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, ev....
Release Date 2018/06 -
Author Alexandre M.S.P Moraes
Cisco FirewallsConcepts, design and deployment for Cisco Stateful Firewall solutions¿“ In this book, Alexandre proposes a totally different approach to the important subject of firewalls: Instead of just presenting configuration models, he uses a set of carefully c....
Release Date 2011/06 -
Author Joseph L. Badaracco Jr.
When Business and Personal Values CollideDefining moments” occur when managers face business decisions that trigger conflicts with their personal values. These moments test a person’s commitment to those values and ultimately shape their character. But these are a....
Release Date 2016/08 -
Mastering pfSense - Second Edition
Author David Zientara
Install and configure a pfSense router/firewall, and become a pfSense expert in the process.About This BookYou can always do more to secure your software ? so extend and customize your pfSense firewallBuild a high availability security system that's fault-tolerant....
Release Date 2018/05 -
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. -
Author Adolfo Eloy Nascimento
Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies.About This BookInteract with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google.Use Spring Security and Spring Securit....
Release Date 2017/10 -
Author Dr. Michael J. Urick
Many assumed characteristics of generational groupings are actually “myths,” meaning that generational stereotypes are not accurate across all members of a generation.This book explores the Generation Myth by highlighting the complexity of the “generation” concept ....
Release Date 2019/02 -
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Author Carey Parker
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure ....
Release Date 2018/08 -
Author Manuj Aggarwal
Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your networkKey FeaturesExplore pfSense, a trusted open source network security solution Configure pfSense as a firewall and create and manage firewall ru....
Release Date 2018/07 -
Author Thomas Akin
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco ro....
Release Date 2002/02 -
Anomaly Detection for Monitoring
Author Baron Schwartz , Preetam Jinka
Monitoring, the practice of observing systems and determining if they're healthy, is hard--and getting harder. In a perfect world, your anomaly detection system would warn you about new behaviors and data patterns in time to fix problems before they happened, and ....
Release Date 2016/03 -
Cisco Firepower Threat Defense (FTD)
Author Nazmul Rajib
The authoritative visual guide to Cisco Firepower Threat Defense (FTD)This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower....
Release Date 2017/12 -
Cisco Secure Firewall Services Module (FWSM)
Author Arvind CCIE No. 7016 Durai , Ray CCIE No. 7050 Blair
Cisco Secure Firewall Services Module (FWSM)Best practices for securing networks with FWSMRay Blair, CCIE® No. 7050Arvind Durai, CCIE No. 7016The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 ....
Release Date 2008/08 -
Warding Off the Threat of Disruption
Author Joshua S. Gans , Daniel Cohen
In a fast-changing digital landscape, companies shouldn't wait too long to reconfigure their offerings — but they also should be wary of moving to an untested technology too soon. Monitoring trends in related industries and identifying high-potential startup....
Release Date 2016/01 -
Author Justin Richer Antonio Sanso
SummaryOAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You’ll learn how to confidently and securely build and deploy OAuth on both the client an....
Release Date 2017/03 -
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285
Author John Gay , Alex Tatistcheff , Todd Lammle
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prepSecuring Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives. With clear and conci....
Release Date 2015/10 -
Author Michael McLafferty , Warun Levesque , Arthur Salmon
Master the art of detecting and averting advanced network security attacks and techniquesAbout This BookDeep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and WiresharkBecome an expert in ....
Release Date 2017/04 -
Author David Zientara
Install, Configure and Setup different connections with pfSenseKey FeaturesBuild firewall and routing solutions with PfSense. Learn how to create captive portals, how to connect Pfsense to your https environment and so on. Practical approach towards building firew....
Release Date 2018/07 -
Author Pini Gurfil
In recent years, an unprecedented interest in novel and revolutionary space missions has risen out of the advanced NASA and ESA programs. Astrophysicists, astronomers, space systems engineers, mathematicians and scientists have been cooperating to implement novel an....
Release Date 2006/10 -
Author Gregory Fell , Mike Barlow
Just beneath the very busy, public Web is a shadowy realm largely untouched by search engines. This is the dark net—a hidden place where individuals and groups seek anonymity. It provides sanctuary for people living under authoritarian regimes, consumers tired of b....
Release Date 2016/07