-
The Cybersecurity Manager's Guide
Author Todd Barnum
If you're a leader in Cybersecurity, then you know it often seems like no one cares about--or understands--information security. Infosec professionals struggle to integrate security into their companies. Most are under resourced. Most are at odds with their organization....
Release Date 2021/04 -
Cisco ASA and PIX Firewall Handbook
Author Dave Huca
The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security featuresLearn about the various firewall models, user interfaces, feature sets, and configuration methodsUnderstand how a Cisco firewall inspects trafficConfigure firewall inter....
Release Date 2005/06 -
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance, Second Edition
Author Omar Santos , Jazib Frahim - CCIE No. 5459
For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide t....
Release Date 2009/12 -
Author Nick Orchiston , Steve Watkins
ISO 9001:2015 – A Pocket Guide is a handy reference book that provides an overview of the ISO 9001 quality management standard. This is the perfect introduction to the Standard, and will help ensure the quality of your products and services, increase customer....
Release Date 2016/05 -
Web Penetration Testing with Kali Linux - Third Edition
Author Juned Ahmed Ansari , Gilberto Najera-Gutierrez
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holesAbout This BookKnow how to set up your lab with Kali LinuxDiscover the core concepts of web penetration testin....
Release Date 2018/02 -
Author Laura B. Madsen
Data governance is broken. It's time we fix it. Why is data governance so ineffective? The truth is data governance programs aren't designed for the way we run our data teams, they aren't even designed for a modern organization at all. They were designed ....
Release Date 2020/01 -
Mastering Metasploit - Third Edition
Author Nipun Jaswal
Discover the next level of network defense with the Metasploit frameworkAbout This BookGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop exploits, and generate modules ....
Release Date 2018/05 -
CCNA Routing and Switching Complete Review Guide, 2nd Edition
Author Todd Lammle
Tight, focused CCNA review covering all three examsThe CCNA Routing and Switching Complete Review Guide offers clear, concise review for Exams 100-105, 200-105, and 200-125. Written by best-selling certification author and Cisco guru Todd Lammle, this guide is your....
Release Date 2016/12 -
Microservices Security in Action
Author Wajjakkara Kankanamge Anthony Nuwan Dias , Prabath Siriwardena
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you’ve learned i....
Release Date 2020/08 -
Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Author Andrew Ossipov , Omar Santos , Jazib Frahim
Cisco® ASAAll-in-One Next-Generation Firewall, IPS, and VPN Services, Third EditionIdentify, mitigate, and respond to today’s highly-sophisticated network attacks.Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA:....
Release Date 2014/04 -
Author Alexey Kleymenov , Amr Thabet
Master malware analysis to protect your systems from getting infectedKey FeaturesSet up and model solutions, investigate malware, and prevent it from occurring in future Learn core concepts of dynamic malware analysis, memory forensics, decryption, and much more A pract....
Release Date 2019/06 -
Python Ethical Hacking from Scratch
Explore the world of practical ethical hacking by developing custom network scanning and remote access tools that will help you test the system security of your organizationKey FeaturesGet hands-on with ethical hacking and learn to think like a real-life hackerBuild practical ethical hacking tools f.... -
How Cybersecurity Really Works
You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversarie.... -
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless netwo....
Release Date 2019/11 -
Computer Security Fundamentals, 5th Edition
Author William Chuck Easttom
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITYClearly explains core concepts, terminology, challenges, technologies, and skillsCovers today's latest attacks and countermeasuresThe perfect beginner's guide for anyone interested in a computer security careerDr. Chuck Easttom brings together complete c....
Release Date 2023/02 -
Author Mukund Chaudhary , Abhishek Chopra
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the tim....
Release Date 2019/12 -
Author Eric C. Thompson
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecu....
Release Date 2020/02 -
Author Mike Chapple
Ace the CompTIA Security+ exam with over 700 practice exam questions written using the style and format of the Security+ examKey FeaturesGet a detailed breakdown of the type of questions and the exam environmentDiscover a step-by-step process that guides you throug....
Release Date 2019/10 -
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition, 2nd Edition
Author Peter H. Gregory
Provides 100% coverage of every objective on the 2022 CISM examThis integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by an expert in the field, the book offers exam-focused coverage of information security governance, inf....
Release Date 2022/10 -
Data Protection and Compliance, 2nd Edition
Author Stewart Room , Michelle Maher , Niall O'Brien , Adam Panagiotopoulos , Shervin Nahid
This comprehensive guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to operationalise a truly risk-based approach to data protection and compliance, beyond just emphasis on regulatory frameworks and legalistic complia....
Release Date 2021/11 -
The Complete Coding Interview Guide in Java
Author Anghel Leonard
Explore a wide variety of popular interview questions and learn various techniques for breaking down tricky bits of code and algorithms into manageable chunksKey FeaturesDiscover over 200 coding interview problems and their solutions to help you secure a job as a Java dev....
Release Date 2020/08 -
Inside Network Security Assessment: Guarding Your IT Infrastructure
Author David Kim , Michael Gregg
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two high....
Release Date 2005/11 -
CISSP Cert Guide, Second Edition
Author Troy McMillian , Robin Abernathy
In this best-of-breed study guide, two leading experts help you master all the topics you need to know to succeed on your CISSP exam and advance your career in IT security. Their concise, focused approach explains every exam objective from a real-world perspective, ....
Release Date 2016/06 -
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition
Author Darril Gibson , Mike Chapple , James M. Stewart
CISSP Study Guide - fully updated for the 2015 CISSP Body of KnowledgeCISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex....
Release Date 2015/09 -
The Official (ISC)2 CCSP CBK Reference, 3rd Edition
The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated.Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the clou.... -
The Trouble With Corporate Compliance Programs
Author Maurice E. Stucke , David Wasieleski , John Dienhart , Sean J. Griffith , Tom R. Tyl
Multinational corporations spend millions of dollars per year on compliance. In highly regulated industries, such as health care and finance, large companies spend much more, sometimes hiring hundreds or even thousands of compliance officers at a time. There is oft....
Release Date 2017/10 -
Author Patrick Gargano
31 Days Before Your CCNA Security Exam31 Days Before Your CCNA Security Exam offers you an engaging and practical way to understand the certification process, commit to taking the CCNA Security IINS 210-260 certification exam, and finish your preparation using a va....
Release Date 2016/06 -
Exam Ref MS-500 Microsoft 365 Security Administration
Author Ed Fisher , Nate Chamberlain
Prepare for Microsoft Exam MS-500: Demonstrate your real-world knowledge of Microsoft 365 security implementation and administration, including identity, access, threat and information protection, governance, and compliance. Designed for professionals with Microsoft secur....
Release Date 2020/09