-
CEH: Certified Ethical Hacker Version 8 Study Guide
Author Sean-Philip Oriyano
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guideSecurity professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study....
Release Date 2014/08 -
Information Governance, 2nd Edition
Author Robert F. Smallwood
The essential guide to effective IG strategy and practiceInformation Governance is a highly practical and deeply informative handbook for the implementation of effective Information Governance (IG) procedures and strategies. A critical facet of any mid- to large-si....
Release Date 2019/12 -
CompTIA CySA+ Study Guide Exam CS0-002, 2nd Edition
Author Mike Chapple , David Seidl
This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics!Where can you find 100% coverage of the revised CompTIA Cybersecurity Analyst+ (CySA+) e....
Release Date 2020/07 -
Benefit Corporation Law and Governance
Author Frederick Alexander
Corporations with a ConscienceCorporations today are embedded in a system of shareholder primacy. Nonfinancial concerns—like worker well-being, environmental impact, and community health—are secondary to the imperative to maximize share price. Benefit corporat....
Release Date 2017/10 -
Author Kumaraguru Velmurugan , Mounir Hahad , Abhijit Mohanta
Your one-stop guide to know digital extortion and it's prevention.About This BookA complete guide to how ransomware worksBuild a security mechanism to prevent digital extortion.A practical approach to knowing about, and responding to, ransomware.Who This Book Is F....
Release Date 2018/03 -
Learning Android Forensics - Second Edition
Author Rohit Tamma , Donnie Tindall , Oleg Skulkin
A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifactsKey FeaturesGet up and running with modern mobile forensic strategies and techniques Analyze the most popular Android applications using free and open source foren....
Release Date 2018/12 -
Adversarial Tradecraft in Cybersecurity
Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition.Key FeaturesGain an advantage against live hackers in a competition or real computing environmentUnderstand .... -
iOS Forensics for Investigators
Author Gianluca Tiepolo
Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey FeaturesExplore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts, recover deleted mobile data, and investigate p....
Release Date 2022/05 -
Practical Mobile Forensics - Fourth Edition
Author Rohit Tamma , Oleg Skulkin , Heather Mahalik
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenariosKey FeaturesApply advanced forensic techniques to recover deleted data from mobile devices Retrieve and analyze data ....
Release Date 2020/04 -
Author Russell von Frank
Trust, it binds us together in our deepest most fulfilling relationships, attracts and retains the best employees, and turns clients into raving fans. Let me show you how to heal old wounds, become a sought out business leader to work for, and create a loyal following of ....
Release Date 2020/11 -
Gray Hat Hacking The Ethical Hacker’s Handbook
Author Jonathan Ness , Chris Eagle , Shon Harris , Gideon Lenkey , Allen Harper , Terron Wil
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker'....
Release Date 2011/01 -
Author Darril Gibson
Assess your readiness for the CISSP Exam—and quickly identify where you need to focus and practice. This practical, streamlined guide provides objective overviews, exam tips, "need-to-know" checklists, review questions, and a list of valuable resources—all designed ....
Release Date 2012/12 -
Author Nikhil Abraham
Coding For Dummies, (9781119293323) was previously published as Coding For Dummies, (9781118951309). While this version features a new Dummies cover and design, the content is the same as the prior release and should not be considered a new or updated product.Hands....
Release Date 2016/06 -
Author Daniel Sawano , Dan Bergh Johnsson , Daniel Deogun
Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you’ll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You’ll also master security-centric t....
Release Date 2019/09 -
Establishing an occupational health & safety management system based on ISO 45001
Author Naeem Sadiq
This book provides a comprehensive explanation of the detailed requirements of ISO 45001. The author draws out key parts of the Standard, which can often be confusing for non-experts or newcomers to ISO standards, and explains what they mean and how to comply. ....
Release Date 2019/09 -
Mastering Windows Security and Hardening
Author Mark Dunkerley , Matt Tumbarello
Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and A....
Release Date 2020/07 -
CompTIA Security+ Certification Practice Exams, Second Edition (Exam SY0-401), 2nd Edition
Author Glen E. Clarke , Daniel Lachance
Don't Let the Real Test Be Your First Test!Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.CompTI....
Release Date 2014/07 -
Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition
Author Aamir Lakhani , Joseph Muniz
Investigating the Cyber BreachThe Digital Forensics Guide for the Network EngineerUnderstand the realities of cybercrime and today’s attacksBuild a digital forensics lab to test tools and methods, and gain expertiseTake the right actions as soon as you discover a b....
Release Date 2018/02 -
Hacker Techniques, Tools, and Incident Handling
Author Michael Gregg , Sean-Philip Oriyano
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about ....
Release Date 2010/10 -
Cloud Native Application Security
Cloud native applications do more than just run on a different platform. The entire scope of these applications is different, including the methodologies and skills used to build them. Security practices for these applications need a transformation of equal magnitude. With this report, you'll learn.... -
Author Matthew Berninger , Ric Messier
There’s a powerful new tool in the fight against malware. The US National Security Agency (NSA) recently released its reverse engineering framework, Ghidra, as free and open source software. This practical report explains how engineers can use Ghidra to analyze mal....
Release Date 2019/10 -
CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition, 3rd Edition
Author Peter Gregory
This up-to-date self-study system offers 100% coverage of every topic on the 2016 version of the CISA examThe fully revised new edition delivers complete coverage of every topic on t....
Release Date 2016/10 -
Workshop Mastery with Jimmy DiResta
Author John Baichtal , Jimmy DiResta
Jimmy DiResta has made a name for himself with his inventiveness and workshop skills, creating dozens of projects for YouTube videos and television shows such as Hammered and Against the Grain on the DIY network. In Make: Workshop Mastery With Jimmy DiResta, Jimmy ....
Release Date 2016/10 -
Distributed Denial of Service (DDoS)
Author Rich Groves , Eric Chou
Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to ....
Release Date 2018/04 -
Author Jean-Philippe Aumasson
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, bl....
Release Date 2017/11 -
Author Jan Yager , Fred Yager
Along with Medicare, Social Security is one of the "rites of passage" as older Americans retire. After contributing funds to this program their entire working life, people are anxious to start getting their monthly checks. Following a brief look at why Social Secur....
Release Date 2015/04 -
Penetration Testing: A guide for business and IT managers
Author Peter Taylor , Felix Ryan , Tylor Robinson , Gemma Moore , Moinuddin Zaki , Jims Marc
Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers becom....
Release Date 2019/08 -
Nine Steps to Success: An ISO27001:2013 implementation overview
Author Alan Calder
In Nine Steps to Success – An ISO 27001 Implementation Overview, Alan provides a comprehensive overview of how to lead a successful ISO 27001-compliant ISMS implementation in just nine steps. Show and hide more
Release Date 2016/05