-
How to Choose the Right Digital Leader for Your Company
Author Nikolaus Obwegeser , Michael Wade
Striking the right balance between competence and credibility is essential to digital leaders’ success, but it depends on what a company expects its CDO to do. While external candidates can bring critical digital competence and experience to organizations seeking a....
Release Date 2019/05 -
Implementing Digital Forensic Readiness, 2nd Edition
Author Jason Sachowski
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with....
Release Date 2019/05 -
Author Dwayne Williams , Gregory B. White , Wm. Arthur Conklin , Nicholas Lane
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Complete coverage of every topic on the CompTIA Advanced Security Practition....
Release Date 2019/05 -
Author Konstantin Kerekovski , Bal Mukund Sharma , Krishna Kumar K M , Nassyam Basha , YV R
Work with Oracle database’s high-availability and disaster-management technologies. This book covers all the Oracle high-availability technologies in one place and also discusses how you configure them in engineered systems and cloud services.You will see that when....
Release Date 2019/05 -
Author Peter Yaworski
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbu....
Release Date 2019/06 -
CEH v10 Certified Ethical Hacker Study Guide
Author Ric Messier
As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10....
Release Date 2019/06 -
CompTIA PenTest+ Practice Tests
Author Robb Tracy , Crystal Panek
The must-have test prep for the new CompTIA PenTest+ certificationCompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerability assessment, and vulnerability-management skills. These cogniti....
Release Date 2019/06 -
Forensics For Dummies, 2nd Edition
Author Douglas P. Lyle
Forensics For Dummies (9781119608967) was previously published as Forensics For Dummies (9781119181651). While this version features a new Dummies cover and design, the content is the same as the prior release and should not be considered a new or updated product. ....
Release Date 2019/06 -
CEH Certified Ethical Hacker Practice Exams, Fourth Edition, 4th Edition
Author Matt Walker
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Don’t Let the Real Test Be Your First Test!Fully updated for the CEH v10 exa....
Release Date 2019/06 -
SSCP Systems Security Certified Practitioner Practice Exams
Author Nick Mitropoulos
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Hundreds of accurate practice questions and in-depth answer explanations to ....
Release Date 2019/06 -
Protecting Your Web Applications
Author Ken Hess , Gary Sloper
Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical eboo....
Release Date 2019/06 -
Author Alexey Kleymenov , Amr Thabet
Master malware analysis to protect your systems from getting infectedKey FeaturesSet up and model solutions, investigate malware, and prevent it from occurring in future Learn core concepts of dynamic malware analysis, memory forensics, decryption, and much more A pract....
Release Date 2019/06 -
Fully Compliant: Compliance Training to Change Behavior
Author Travis Waugh
A Better Kind of Compliance TrainingCompliance training succeeds when you balance the needs of not just the organization but also the employees who you hope will learn and change their behavior. In Fully Compliant, Travis Waugh challenges traditional compliance tr....
Release Date 2019/06 -
Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition
Author Omar Santos , Michael Gregg
In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 10 exam and advance your career in IT security. The authors' concise, focused appro....
Release Date 2019/07 -
CompTIA Linux+ Practice Tests, 2nd Edition
Author Steve Suehring
The best practice test preparation for the foundational CompTIA Linux+ certification examIf you’re preparing for this all-important exam, turn to CompTIA Linux+ Practice Tests. The book covers the 5 objective domains, PLUS one additional 90-question practice exam, ....
Release Date 2019/07 -
CISM Certified Information Security Manager Practice Exams
Author Peter H. Gregory
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Don’t Let the Real Test Be Your First Test! Take the current version of the ....
Release Date 2019/07 -
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Author Niranjan Reddy
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you ....
Release Date 2019/07 -
Change Manager - Careers in IT service management
Author Tracey Torble
Change management is about the control of all changes that have an effect on the IT services and hence, the business of an organisation. This practical book describes the change manager role in depth including purpose, typical responsibilities and required skills. ....
Release Date 2019/07 -
Cyber-Vigilance and Digital Trust
Author Wiem Tounsi
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms – no....
Release Date 2019/07 -
Author Jennifer Jin , Marcus J. Carey
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published asTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introd....
Release Date 2019/08 -
GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Ric Messier
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Fully updated coverage of every topic on the current version of the GSEC exa....
Release Date 2019/08 -
Waging Cyber War: Technical Challenges and Operational Constraints
Author Jacob G. Oakley
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....
Release Date 2019/08 -
Penetration Testing: A guide for business and IT managers
Author Peter Taylor , Felix Ryan , Tylor Robinson , Gemma Moore , Moinuddin Zaki , Jims Marc
Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers becom....
Release Date 2019/08 -
Information Security Risk Management for ISO 27001/ISO 27002, third edition
Author Alan Calder , Steve Watkins
Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework f....
Release Date 2019/08 -
Author Allison Cerra
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can tak....
Release Date 2019/09 -
The Customer Revolution in Healthcare: Delivering Kinder, Smarter, Affordable Care for All
Author David W Johnson
Customer-centric, market-driven solutions for fixing America’s broken healthcare system—from one of the industry’s most innovative thought leaders. Healthcare accounts for nearly a fifth of the U.S. economy. Everyone agrees that the current system is broken and in ....
Release Date 2019/09 -
Elementary Information Security, 3rd Edition
Author Richard E. Smith
An ideal text for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cyber security and technology. Thoroughly updated with an increase....
Release Date 2019/09 -
Author Daniel Sawano , Dan Bergh Johnsson , Daniel Deogun
Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you’ll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You’ll also master security-centric t....
Release Date 2019/09 -
Establishing an occupational health & safety management system based on ISO 45001
Author Naeem Sadiq
This book provides a comprehensive explanation of the detailed requirements of ISO 45001. The author draws out key parts of the Standard, which can often be confusing for non-experts or newcomers to ISO standards, and explains what they mean and how to comply. ....
Release Date 2019/09 -
ISO 27001 controls – A guide to implementing and auditing
Author Bridget Kenyon
Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001. Show and h....
Release Date 2019/09