-
Author Lawrence E. Hughes
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required backgrou....
Release Date 2022/03 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Brad Hibbert , Morey J. Haber
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breache....
Release Date 2017/12 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Morey J. Haber
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization wi....
Release Date 2020/06 -
Author Jason A. Scharfman
Develop and manage a private equity compliance program Compliance has become one of the fastest-growing areas in the private equity (PE) space. Mirroring trends from the hedge fund industry, recent surveys indicate that PE managers rank compliance as the single mos....
Release Date 2018/09 -
Principles of Microelectromechanical Systems
Author Ki Bang Lee
The building blocks of MEMS design through closed-form solutionsMicroelectromechanical Systems, or MEMS, is the technology of very small systems; it is found in everything from inkjet printers and cars to cell phones, digital cameras, and medical equipment. This boo....
Release Date 2011/02 -
Principles of Digital Audio, Sixth Edition, 6th Edition
Author Ken C. Pohlmann
The definitive guide to digital engineering--fully updatedGain a thorough understanding of digital audio tools, techniques, and practices from this completely revised and expanded resource. Written by industry pioneer and Audio Engineering Society Fellow Ken C. Pohl....
Release Date 2010/10 -
Principles of Data Management - Facilitating information sharing Second edition
Author Keith Gordon
Data is a valuable corporate asset and its effective management can be vital to an organisation's success. This professional guide covers all the key areas of data management, including database development and corporate data modelling. It is business-focused, prov....
Release Date 2013/11 -
Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition, 5th Edition
Author Dwayne Williams , Roger L. Davis , Chuck Cothren , Greg White , Wm. Arthur Conklin
Fully updated computer security essentials—quality approved by CompTIALearn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbo....
Release Date 2018/06 -
Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)
Practice the Skills Essential for a Successful Career in Cybersecurity!This hands-on guide contains more than 90 labs that challenge you to solve real-world problems and help you to master key cybersecurity concepts. Clear, measurable lab results map to exam objectives, offering direct correlation t.... -
Author Kumaraguru Velmurugan , Mounir Hahad , Abhijit Mohanta
Your one-stop guide to know digital extortion and it's prevention.About This BookA complete guide to how ransomware worksBuild a security mechanism to prevent digital extortion.A practical approach to knowing about, and responding to, ransomware.Who This Book Is F....
Release Date 2018/03 -
Predictive Control of Power Converters and Electrical Drives
Author Patricio Cortes , Jose Rodriguez
Describes the general principles and current research into Model Predictive Control (MPC); the most up-to-date control method for power converters and drivesThe book starts with an introduction to the subject before the first chapter on classical control methods for....
Release Date 2012/04 -
Practitioner's Guide to Program Management
Author Irene Didinsky MBA , PMP
Programs serve as a crucial link between strategy and the execution of business results and organizations implement them to achieve strategic goals. Although the practice of program management has evolved in lockstep with the project management profession, the root....
Release Date 2017/06 -
Author Konstantin Sapronov , Ayman Shaaban
Leverage the power of digital forensics for Windows systemsAbout This BookBuild your own lab environment to analyze forensic data and practice techniques.This book offers meticulous coverage with an example-driven approach and helps you build the key skills of perf....
Release Date 2016/06 -
Practical Web Penetration Testing
Author Gus Khawaja
Learn how to execute web application penetration testing end-to-endAbout This BookBuild an end-to-end threat model landscape for web application securityLearn both web application vulnerabilities and web intrusion testingAssociate network vulnerabilities with a web....
Release Date 2018/06 -
Practical Threat Intelligence and Data-Driven Threat Hunting
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat h.... -
Author Roman Zabicki
Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basic....
Release Date 2019/02 -
Author Ajay Singh Chauhan
Get more from your network by securing its infrastructure and increasing its effectivenessAbout This BookLearn to choose the best network scanning toolset for your systemImplement different concepts of network scanning such as port scanning and OS detectionAdapt a ....
Release Date 2018/05 -
Practical Negotiating: Tools, Tactics & Techniques
Author Tom Gosselin
Praise for Practical Negotiating: Tools, Tactics & Techniques"Practical Negotiating is an innovative, resourceful, and-as its name implies-practical guide to the art and science of negotiating. Unlike many books on negotiating, which are filled with theories and....
Release Date 2007/05 -
Practical Mobile Forensics - Third Edition
Author Heather Mahalik , Satish Bommisetty , Oleg Skulkin , Rohit Tamma
Investigate, analyze, and report iOS, Android, and Windows devicesAbout This BookGet hands-on experience in performing simple to complex mobile forensics techniques.Retrieve and analyze data stored not only on mobile devices but also through the cloud and other conn....
Release Date 2018/01 -
Practical Mobile Forensics - Second Edition
Author Satish Bommisetty , Rohit Tamma , Heather Mahalik
A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platformsAbout This BookGet to grips with the basics of mobile forensics and the various forensic approachesRetrieve and analyze the data stored on mobile devices and on the ....
Release Date 2016/05 -
Practical Mobile Forensics - Fourth Edition
Author Rohit Tamma , Oleg Skulkin , Heather Mahalik
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenariosKey FeaturesApply advanced forensic techniques to recover deleted data from mobile devices Retrieve and analyze data ....
Release Date 2020/04 -
Author Svetlana Ostrovskaya , Oleg Skulkin
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey FeaturesExplore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware detection using volatile memoryGet acquainted wi....
Release Date 2022/03 -
Author Russ Hepworth-Sawyer , Mark Cousins
Guiding you through the history and emergence of modern mastering techniques, then providing practical hints and tips on how to use them in your set up, Practical Mastering is the book for anyone interested in tackling this elusive art form. Providing you with sold ....
Release Date 2013/08 -
Author Andrew Honig , Michael Sikorski
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software t....
Release Date 2012/02 -
Practical Linux Security Cookbook - Second Edition
Author Tajinder Kalsi
Enhance file system security and learn about network attack, security tools and different versions of Linux build.Key FeaturesHands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use v....
Release Date 2018/08 -
Author Mohammed Moreb
Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investi....
Release Date 2022/04 -
Author Wilson Bautista Jr.
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.About This BookIntelligence processes and procedures for response mechanismsMaster F3EAD to drive processes based on intelligenceThreat modeling and intelligent framewo....
Release Date 2018/03 -
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Author Niranjan Reddy
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you ....
Release Date 2019/07 -
Author Al-Sakib Khan Pathan , Saiful Azad
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted ele....
Release Date 2014/11