-
Business Continuity and Disaster Recovery for InfoSec Managers
Author James F. Ransome , PhD , CISM , CISSP , John Rittinghouse , PhD , CISM
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses t....
Release Date 2005/09 -
Cyber Warfare - Truth, Tactics, and Strategies
Author Dr. Chase Cunningham , Gregory J. Touhill
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy based on current and past ....
Release Date 2020/02 -
Analytical Solutions for Two Ferromagnetic Nanoparticles Immersed in a Magnetic Field
Author Gehan Anthonys , Richard C. Dorf
The investigation of the behavior of ferromagnetic particles in an external magnetic field is important for use in a wide range of applications in magnetostatics problems, from biomedicine to engineering. To the best of the author's knowledge, the systematic analysis for....
Release Date 2018/02 -
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Author David Both
Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.This book....
Release Date 2019/12 -
Ransomware and Cyber Extortion: Response and Prevention
Author Sherri Davidoff , Matt Durrin , Karen Sprenger
Protect Your Organization from Devastating Ransomware and Cyber Extortion AttacksRansomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after a....
Release Date 2022/11 -
Cybersecurity - Attack and Defense Strategies
Author Yuri Diogenes , Dr. Erdal Ozkaya
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscapeKey FeaturesUpdated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and moreExplore the latest too....
Release Date 2022/09 -
Author Scott Davis , Carter Copeland , Rob Wertheimer
Three top Wall Street analysts reveal enduring lessons in sustainable success from the great industrial titans—the high-tech companies of their day—to the disruptors that now dominate the economy.Before Silicon Valley disrupted the world with new technologies and business....
Release Date 2020/07 -
Author Ric Messier
With nation-states, organized crime groups, and other attackers scouring systems to steal funds, information, or intellectual property, incident response has become one of today’s most important technology sectors. If you’re not familiar with incident response, thi....
Release Date 2019/12 -
Advanced Modern Control System Theory and Design
Author Stanley M. Shinners
The definitive guide toadvanced control system designAdvanced Modern Control System Theory and Design offers the most comprehensive treatment of advanced control systems available today. Superbly organized and easy to use, this book is designed for an advanced cours....
Release Date 1998/09 -
Author Russell von Frank
Trust, it binds us together in our deepest most fulfilling relationships, attracts and retains the best employees, and turns clients into raving fans. Let me show you how to heal old wounds, become a sought out business leader to work for, and create a loyal following of ....
Release Date 2020/11 -
Modern Control System Theory and Design, 2nd Edition
Author Stanley M. Shinners
The definitive guide to control system designModern Control System Theory and Design, Second Edition offers the most comprehensive treatment of control systems available today. Its unique text/software combination integrates classical and modern control system theor....
Release Date 1998/05 -
Protecting Your Web Applications
Author Ken Hess , Gary Sloper
Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical eboo....
Release Date 2019/06 -
Author Eric C. Thompson
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecu....
Release Date 2020/02 -
Author David Sutton
Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Release Date 2022/12 -
GCIH GIAC Certified Incident Handler All-in-One Exam Guide
Author Nick Mitropoulos
This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler examPrepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide. Written by a reco....
Release Date 2020/08 -
Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
Author Nihad A. Hassan
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, re....
Release Date 2019/11 -
Microsoft System Center Endpoint Protection Cookbook - Second Edition
Author Nicolai Henriksen
Over 31 simple yet incredibly effective recipes for installing and managing System Center 2016 Endpoint ProtectionAbout This BookThis is the most practical and up-to-date book covering important new features of System Center 2016 Endpoint protectionGain confidence ....
Release Date 2016/12 -
Digital Forensics and Incident Response - Third Edition
Author Gerard Johansen
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threatsKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyLearn to apply digital forensics tools ....
Release Date 2022/12 -
Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
Author Omar Santos
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed, SOCs desperately need more qualified cybersecurity professionals. Cisco’s new Cisco Certifie....
Release Date 2020/11 -
How to Measure Anything in Cybersecurity Risk, 2nd Edition
Author Douglas W. Hubbard , Richard Seiersen
A start-to-finish guide for realistically measuring cybersecurity riskIn the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the qu....
Release Date 2023/04 -
Author Tony Crescenzi
During the Great Depression, legendary British economist Keynes advocated using government money to fill the economic void until consumer spending and business investment recovered. But what happens when governments can't do that anymore? You've arrived at "The Ke....
Release Date 2011/10