-
Author Monnappa K A
Understand malware analysis and its practical implementationAbout This BookExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactic....
Release Date 2018/06 -
Practical Web Penetration Testing
Author Gus Khawaja
Learn how to execute web application penetration testing end-to-endAbout This BookBuild an end-to-end threat model landscape for web application securityLearn both web application vulnerabilities and web intrusion testingAssociate network vulnerabilities with a web....
Release Date 2018/06 -
Learning Python Web Penetration Testing
Author Christian Martorella
Leverage the simplicity of Python and available libraries to build web security testing tools for your applicationAbout This BookUnderstand the web application penetration testing methodology and toolkit using PythonWrite a web crawler/spider with the Scrapy librar....
Release Date 2018/06 -
Hands-On Cryptography with Python
Author Samuel Bowne
Learn to evaluate and compare data encryption methods and attack cryptographic systemsAbout This BookExplore popular and important cryptographic methodsCompare cryptographic modes and understand their limitationsLearn to perform attacks on cryptographic systemsWho ....
Release Date 2018/06 -
Author Jamie Sanbower , Mason Harris , Vivek Santuka , Aaron Woland
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protectionIntegrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in se....
Release Date 2018/07 -
Author Robin Abernathy , Troy McMillan
In this best-of-breed study guide, two leading experts help you master all the topics you need to know to succeed on your CISSP exam and advance your career in IT security. Their concise, focused approach explains every exam objective from a real-world perspective....
Release Date 2018/07 -
Social Engineering, 2nd Edition
Author Christopher Hadnagy
Harden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus softw....
Release Date 2018/07 -
Hacking For Dummies, 6th Edition
Author Kevin Beaver
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penet....
Release Date 2018/07 -
Author Ric Messier
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book cov....
Release Date 2018/07 -
Author Allan Liska , Stephen Gates
Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company’s vulnerabilities to common web application security th....
Release Date 2018/07 -
Author Marcus Gatto , Claire-Michelle Smyth
This text serves as an accessible introduction to the law of contract. The headings chosen for examination track the main points in the lifetime of a contract-from its formation, drafting, and onward to its eventual dissolution, whether this occurs due to the terms....
Release Date 2018/07 -
Hands-on Incident Response and Digital Forensics
Author Mike Sheward
Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what follows - a scientific investigation into the causes o....
Release Date 2018/07 -
Hands-On Penetration Testing on Windows
Author Phil Bramwell
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.Key FeaturesIdentify the vulnerabilities in your system using Kali Linux 2018.02 Discover the art of exploiting Windows kernel drivers Get ....
Release Date 2018/07 -
Learn Ethical Hacking from Scratch
Author Zaid Sabih
Learn how to hack systems like black hat hackers and secure them like security experts Key FeaturesUnderstand how computer systems work and their vulnerabilitiesExploit weaknesses and hack into machines to test their securityLearn how to secure systems from hackers....
Release Date 2018/07 -
Author David Zientara
Install, Configure and Setup different connections with pfSenseKey FeaturesBuild firewall and routing solutions with PfSense. Learn how to create captive portals, how to connect Pfsense to your https environment and so on. Practical approach towards building firew....
Release Date 2018/07 -
Author Manuj Aggarwal
Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your networkKey FeaturesExplore pfSense, a trusted open source network security solution Configure pfSense as a firewall and create and manage firewall ru....
Release Date 2018/07 -
Formation Control of Multiple Autonomous Vehicle Systems
Author Bo Zhu , Hugh H. T. Liu
This text explores formation control of vehicle systems and introduces three representative systems: space systems, aerial systems and robotic systemsFormation Control of Multiple Autonomous Vehicle Systems offers a review of the core concepts of dynamics and contr....
Release Date 2018/08 -
CompTIA IT Fundamentals (ITF+) Study Guide, 2nd Edition
Author Quentin Docter
NOTE: The name of the exam has changed from IT Fundamentals to IT Fundamentals+ (ITF+). However, the FC0-U61 exam objectives are exactly the same. After the book was printed with IT Fundamentals in the title, CompTIA changed the name to IT Fundamentals+ (ITF+). We ....
Release Date 2018/08 -
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Author Carey Parker
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure ....
Release Date 2018/08 -
How Open Source Ate Software: Understand the Open Source Movement and So Much More
Author Gordon Haff
Learn how free software became open source and how you can sell open source software. This book provides a historical context of how open source has thoroughly transformed how we write software, how we cooperate, how we communicate, how we organize, and, ultimately....
Release Date 2018/08 -
Business Analyst - Careers in Business Analysis
Author Adrian Reed
Business analysis is a crucial discipline for organisational success, it enables organisations to rise to the challenges presented by today's increasing pace of change. It is a broad field and has matured into a profession of its own, with its own unique career ro....
Release Date 2018/08 -
Marine Genetic Resources, R&D and the Law 1
Author Bleuenn Guilloux
Advances in research and development reveal the immense diversity and potential of marine genetic resources. Under international law, no specific regime applies to these complex and paradoxical objects of use. The Law of the Sea Convention sets a framework that is ....
Release Date 2018/08 -
Network Vulnerability Assessment
Author Sagar Rahalkar
Build a network security threat model with this comprehensive learning guideKey FeaturesDevelop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastr....
Release Date 2018/08 -
Kali Linux Web Penetration Testing Cookbook - Second Edition
Author Gilberto Najera-Gutierrez
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab E....
Release Date 2018/08 -
Practical Linux Security Cookbook - Second Edition
Author Tajinder Kalsi
Enhance file system security and learn about network attack, security tools and different versions of Linux build.Key FeaturesHands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use v....
Release Date 2018/08 -
Author Jason A. Scharfman
Develop and manage a private equity compliance program Compliance has become one of the fastest-growing areas in the private equity (PE) space. Mirroring trends from the hedge fund industry, recent surveys indicate that PE managers rank compliance as the single mos....
Release Date 2018/09 -
Hacker Techniques, Tools, and Incident Handling, 3rd Edition
Author Michael G. Solomon , Sean-Philip Oriyano
Hacker Techniques, Tools, and Incident Handling, Third Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrup....
Release Date 2018/09 -
Information Governance for Healthcare Professionals
Author Robert F. Smallwood
Like other critical organizational assets, information is a strategic asset that requires high level of oversight in order to be able to effectively use it for organizational decision-making, performance improvement, cost management, and risk mitigation.Adopting an....
Release Date 2018/09 -
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Author Eric C. Thompson
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and....
Release Date 2018/09