-
The Truth About Computer Scams
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.What you must know about Internet scams: from phishing and Trojan horses to fake death threats!After installed on your computer, T....
Release Date 2010/11 -
Author Jamie Sanbower , Mason Harris , Vivek Santuka , Aaron Woland
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protectionIntegrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in se....
Release Date 2018/07 -
97 Things Every Information Security Professional Should Know
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn h.... -
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Author Michael Hale Ligh , Andrew Case , Jamie Levy , AAron Walters
Memory forensics provides cutting edge technology to help investigate digital attacksMemory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malwa....
Release Date 2014/07 -
Information Governance, 2nd Edition
Author Robert F. Smallwood
The essential guide to effective IG strategy and practiceInformation Governance is a highly practical and deeply informative handbook for the implementation of effective Information Governance (IG) procedures and strategies. A critical facet of any mid- to large-si....
Release Date 2019/12 -
CSSLP Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Daniel Paul Shoemaker , Wm. Arthur Conklin
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This self-study guide delivers 100% coverage of all domainsin the the CSSLP ....
Release Date 2019/03 -
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Author Maciej Machulak , Michael Schwartz
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate y....
Release Date 2018/12 -
Author Jean-Philippe Aumasson
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, bl....
Release Date 2017/11 -
Author Daniel Sawano , Dan Bergh Johnsson , Daniel Deogun
Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you’ll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You’ll also master security-centric t....
Release Date 2019/09 -
Author Thomas Kranz
A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. In Making Sense of Cybersecurity you will learn how to: Develop and incrementally improve your own cybersecurity strategyDetect rogue WiFi ....
Release Date 2022/10 -
Author Vimal Kumar , Amartya Sen , Sanjay Madria
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It ....
Release Date 2018/12 -
Penetration Testing: A guide for business and IT managers
Author Peter Taylor , Felix Ryan , Tylor Robinson , Gemma Moore , Moinuddin Zaki , Jims Marc
Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers becom....
Release Date 2019/08 -
Author Adrian Pruteanu
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker.Key FeaturesBuilds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Exa....
Release Date 2019/01 -
Metasploit 5.0 for Beginners - Second Edition
Author Sagar Rahalkar
A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilitiesKey FeaturesPerform pentesting in highly secured environments with Metasploit 5.0 Become well-versed with th....
Release Date 2020/04 -
Nine Steps to Success: An ISO27001:2013 implementation overview
Author Alan Calder
In Nine Steps to Success – An ISO 27001 Implementation Overview, Alan provides a comprehensive overview of how to lead a successful ISO 27001-compliant ISMS implementation in just nine steps. Show and hide more
Release Date 2016/05 -
CISA® Certified Information Systems Auditor All-in-One Exam Guide
Author Peter H. Gregory
"All-in-One is All You Need."CISA Certified Information Systems Auditor All in One Exam GuideGet complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit ....
Release Date 2009/10 -
E-Health Care Information Systems: An Introduction for Students and Professionals
Author Joseph Tan
E-Health Care Information Systems is a comprehensive collection written by leading experts from a range of disciplines including medicine, health sciences, engineering, business information systems, general science, and computing technology. This easily followed tex....
Release Date 2005/05 -
Cloud Native Application Security
Cloud native applications do more than just run on a different platform. The entire scope of these applications is different, including the methodologies and skills used to build them. Security practices for these applications need a transformation of equal magnitude. With this report, you'll learn.... -
Author Matthew Berninger , Ric Messier
There’s a powerful new tool in the fight against malware. The US National Security Agency (NSA) recently released its reverse engineering framework, Ghidra, as free and open source software. This practical report explains how engineers can use Ghidra to analyze mal....
Release Date 2019/10 -
Unmasking the Social Engineer: The Human Element of Security
Author Paul Ekman , Paul Kelly F. , Christopher Hadnagy
Learn to identify the social engineer by non-verbal behaviorUnmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men ....
Release Date 2014/02 -
The Handbook of Mobile Market Research: Tools and Techniques for Market Researchers
Author Sue York , Navin Williams , Ray Poynter
The first book on the market that focuses on the area of mobile researchMore people have mobile phones than have computers or land lines and for several years researchers have understood that data collection needs to become mobile. Up until now, there were no system....
Release Date 2014/10 -
The Oliver Wight Class A Standard for Business Excellence, 7th Edition
Author Oliver Wight International , Inc.
The Oliver Wight Class A Standard for Business Excellence is the definitive, comprehensive statement of excellence in business today. Oliver Wight’s Class A Standard is the accumulated practice and experience of Oliver Wight Consultants around the world. It reflect....
Release Date 2017/05 -
Author Brian Stafford , Dottie Schindlinger
A new edition of the #1 text in the human computer Interaction field!This book seeks to chart the technology-fueled changes taking place in the field of corporate governance and describes the impact these changes are having on boards and the enterprises they govern....
Release Date 2019/04 -
Author Deborah Hicks Midanek
Boards of directors are sitting ducks. Shareholders complain and even attack, management manipulates, and individual board members have little power, able to act only as part of the board as a whole. Governance issues are front and center, yet there is often little....
Release Date 2018/09 -
Author Everardo Reyes-Garcia
Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is rendered on the scr....
Release Date 2017/11 -
The Long-Tail Strategy of IT Outsourcing
Author Ravi Aron , Julia Kotlarsky , Ilan Oshri , Kunsoo Han , Vijay Gurbaxani , Rudy Hirsch
Today’s rapid technological changes have transformed the role of global IT outsourcing in companies’ strategies. Traditionally viewed as a cost-saving measure, IT outsourcing is also increasingly being leveraged as a strategic tool for acquiring cutting....
Release Date 2016/01 -
Author Linda Frederiksen
Within most libraries in the United States today there is an information professional who has become the ‘go-to’ person for grasping and grappling with copyright questions. While not an attorney, this librarian has developed an awareness and understanding of copyri....
Release Date 2015/11