-
Forensics For Dummies, 2nd Edition
Author Douglas P. Lyle
Forensics For Dummies (9781119608967) was previously published as Forensics For Dummies (9781119181651). While this version features a new Dummies cover and design, the content is the same as the prior release and should not be considered a new or updated product. ....
Release Date 2019/06 -
CompTIA Server+ Certification All-in-One Exam Guide, Second Edition (Exam SK0-005), 2nd Edition
This exam-focused study guide contains complete coverage of every topic on the current edition of the CompTIA Server+ certification exam This highly effective self-study resource fully prepares you for the latest version of CompTIA’s Server+ certification exam. The book shows how to implement serve.... -
Hands-On Web Penetration Testing with Metasploit
Author Harpreet Singh , Himanshu Sharma
Identify, exploit, and test web application security with easeKey FeaturesGet up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerab....
Release Date 2020/05 -
Author Joan C. Williams
"I recommend a book by Professor Williams, it is really worth a read, it's called White Working Class." -- Vice President Joe Biden on Pod Save AmericaAn Amazon Best Business and Leadership book of 2017Around the world, populist movements are gaining traction amon....
Release Date 2017/05 -
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Author Aaron Woland , Panos Kampanakis , Omar Santos
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network securit....
Release Date 2016/06 -
CompTIA Security+ SY0-201 Cert Guide
Author David L. Prowse
CompTIA® Security+ SY0-201 Cert GuideDavid L. ProwseDVD Features Complete Practice ExamMaster every topic on CompTIA’s new Security+ SY0-201 exam.Assess your knowledge and focus your learning.Get the practical workplace knowledge you need!Start-to-finish Security+ S....
Release Date 2010/11 -
Interpretation and Application of IPSAS
Author Isabelle Andernack , Caroline Aggestam-Pontoppidan
Clear, practical IPSAS guidance, explanation, and examplesInterpretation and Application of IPSAS provides practical guidance on the implementation and application of the International Public Sector Accounting Standards. This book brings readers up to date on the s....
Release Date 2016/02 -
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
Author Darril Gibson , James M Stewart , Mike Chapple
CISSP Study Guide - fully updated for the 2018 CISSP Body of KnowledgeCISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex....
Release Date 2018/05 -
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests
Author David Seidl , Mike Chapple
Smarter, faster prep for the SSCP exam(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests is the only (ISC)2-endorsed set of questions for the SSCP exam. With SSCP certification, you will meet Department of Defense requirements for entry-lev....
Release Date 2019/01 -
Legal and Privacy Issues in Information Security, 3rd Edition
Author Joanna Lyn Grama
Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information security. Information systems securi....
Release Date 2020/12 -
Author Jennifer C. Wolfe
No boardroom in any industry is safe from new market threats in this time of rapid technological growth. We’ve all heard the stories of corruption by CEOs at WeWork and Theranos and witnessed whistleblowers revealing crises at Wells Fargo and Uber. The board’s responsibil....
Release Date 2020/08 -
TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
Author Shawn Porter , Debra Littlejohn Shinder , Mike Chapple
TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at individuals with 2 or more years of computer security experience or training equivalent to 48 hours in a 24 month period. TICSA represents base l....
Release Date 2002/09 -
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Author Sagar Rahalkar
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanni....
Release Date 2018/11 -
Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the im.... -
Author Charles Bihis
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkAbout This BookLearn how to use the OAuth 2.0 protocol to interact with the world's most popular ....
Release Date 2015/12 -
Cybersecurity Attacks – Red Team Strategies
Author Johann Rehberger
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team program Leve....
Release Date 2020/03 -
Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition
Author Michael G. Solomon , Sean-Philip Oriyano
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous....
Release Date 2022/11 -
Digital Forensics Basics: A Practical Guide Using Windows OS
Author Nihad A. Hassan
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gat....
Release Date 2019/02 -
Mobile Location Services: The Definitive Guide
Author Andrew Jagoe
The first comprehensive guide to building and deploying mobile location-based servicesDetailed coverage of mobile location servers, client platforms, protocols, and standardsMapping, geocoding, mobile positioning, security, personalization, privacy, and moreForeword....
Release Date 2002/12 -
Author Ron Taylor , Omar Santos
Learn, prepare, and practice for CompTIA Pentest+ PT0-001 exam success with this CompTIA Cert Guide from Pearson IT Certification, a leader in IT Certification.Master CompTIA Pentest+ PT0-001 exam topicsAssess your knowledge with chapter-ending quizzesReview key co....
Release Date 2019/01 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
Author Nikhil Abraham
Hands-on exercises help you learn to code like a proNo coding experience is required for Coding For Dummies, your one-stop guide to building a foundation of knowledge in writing computer code for web, application, and software development. It doesn't matter if you....
Release Date 2015/02 -
Systems Leadership, 2nd Edition
Author Karl Stewart , Catherine Burke , Ian Macdonald
The new edition of this influential and bestselling book is concerned with how people come together to achieve a productive purpose. Survival and success in business and social terms have always depended upon our ability to form and sustain social organisations. Pe....
Release Date 2018/05 -
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Author Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux....
Release Date 2018/11 -
A Complete Guide to Burp Suite : Learn to Detect Application Vulnerabilities
Author Sagar Rahalkar
Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps.Burp Suite is a simple, yet powerful, tool used for a....
Release Date 2020/11 -
The Enterprise Path to Service Mesh Architectures, 2nd Edition
Author Lee Calcote
Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This....
Release Date 2020/11 -
31 Days Before Your CCNA Exam: A Day-by-Day Review Guide for the CCNA 640-802 Exam, Second Edition
Author Allan Johnson
31 Days Before your CCNA Exam, Second Edition, offers you a personable and practical way to understand the certification process, commit to taking the exam, and finish your preparation using a variety of Foundational and Supplemental study resources.The book breaks ....
Release Date 2008/11 -
A Profile of the United States Toy Industry, Second Edition
Author Christopher Byrne
The toy industry is one of the most consistently misunderstood sectors of American business, comprising a wide range of businesses under one banner-entertainment, commodities, fashion and licensing-that each behave differently. Broad-based change is constant, with ....
Release Date 2017/01 -
Author Nipun Jaswal
Gain basic skills in network forensics and learn how to apply them effectively Key FeaturesInvestigate network threats with ease Practice forensics tasks such as intrusion detection, network analysis, and scanning Learn forensics investigation at the network levelB....
Release Date 2019/03 -
Successful Cybersecurity Professionals
Author Dr. Steven Brown
This book provides a unique perspective into the mindset of psychology and cybersecurity.It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals’ behavior, but our b....
Release Date 2020/09