-
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Author Mike O'Leary
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and....
Release Date 2019/03 -
Cyber Mayday and the Day After
Author Daniel Lohrmann , Shamane Tan
Successfully lead your company through the worst crises with this first-hand look at emergency leadershipCyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event....
Release Date 2021/11 -
Cyber Forensics: From Data to Digital Evidence
Author Albert J. Marcella , Frederic Guillossou
An explanation of the basic principles of dataThis book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operati....
Release Date 2012/05 -
Cyber Crime and Cyber Terrorism Investigator's Handbook
Author Francesca Bosco , Andrew Staniforth , Babak Akhgar
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become ....
Release Date 2014/07 -
Cyber Conflict: Competing National Perspectives
Author Daniel Ventre
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace cou....
Release Date 2012/05 -
Cyber Breach Response That Actually Works
Author Andrew Gorecki
You will be breached—the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But....
Release Date 2020/07 -
Author Bryan E. Harkins , David A. Westcott , David D. Coleman
The most detailed, comprehensive coverage of CWSP-205 exam objectivesCWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objecti....
Release Date 2016/09 -
CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, 3rd Edition
Author David A. Westcott , David D. Coleman
Newly updated edition of this top-selling CWNA study guideSybex is the official publisher for CWNP, Inc., the organization behind the the CWNA certification. The new edition of Sybex's top-selling CWNA Study Guide covers the latest CWNA Exam, PW0-105. If you're pr....
Release Date 2012/05 -
Author Wanda Pina , Norma Davila
Managers are flooded with theories, concepts, and ideas for how to improve employee engagement—but what works, and what doesn’t? This book helps managers cut through the clutter of all those strategies and find the one that works for them. Beginning with the myths a....
Release Date 2013/12 -
Author Karen Pearlman
There are many books on the technical aspects of film and video editing. Much rarer are books on how editors think and make creative decisions.Filled with timeless principles and thought-provoking examples from a variety of international films, the second edition o....
Release Date 2015/12 -
Author Karen Pearlman
How does a film editor make decisions about where and when to cut in order to make a film 'feel right'? Generally speaking, the answer is, 'it's intuitive', which is accurate but leaves one wanting to know more. Cutting Rhythms breaks down the definition of int....
Release Date 2012/08 -
Author Shane Green
HACK YOUR WORKPLACE CULTURE FOR GREATER PROFITS AND PRODUCTIVITY"I LOVE THIS BOOK!" —CHESTER ELTON, New York Times bestselling author of All In and What Motivates Me "When companies focus on culture, the positive effects ripple outward, benefiting not just employee....
Release Date 2017/04 -
Author Iqbal Muhardianto , Digit Oktavianto
Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skillsUnderstand the risk of the rise of document-based malwareEnhance your malware analysis concepts through illustrations, tips and tricks, step-by-s....
Release Date 2013/10 -
CTS-I Certified Technology Specialist-Installation Exam Guide, Second Edition, 2nd Edition
The Most Complete, Up-to-Date CTS-I Exam Study System Published with AVIXA™, CTS®-I Certified Technology Specialist-Installation Exam Guide, Second Edition provides comprehensive coverage of all exam objectives on the leading internationally recognized certification for audiovisual installation pr.... -
CTS-I Certified Technology Specialist-Installation Exam Guide
Author InfoComm International
The Most Complete CTS-I Exam Study SystemPublished with InfoComm International, CTS-I Certified Technology Specialist-Installation Exam Guide provides comprehensive coverage of all exam objectives on the leading internationally recognized certification for audiovisu....
Release Date 2015/03 -
CTS-D Certified Technology Specialist-Design Exam Guide
Author InfoComm International , Brad Grimes
Exclusively from McGraw-Hill Professional and InfoComm International, this exam guide covers the latest Certified Technology Specialist Design exam for AV professionals.CTS-D Certified Technology Specialist Design Exam Guide is a complete study system for the leadi....
Release Date 2016/04 -
CSSLP SECURE SOFTWARE LIFECYCLE PROFESSIONAL ALL-IN-ONE EXAM GUIDE, Third Edition, 3rd Edition
Author Wm. Arthur Conklin , Daniel Paul Shoemaker
Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the examCSSLP Certification All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certific....
Release Date 2022/02 -
CSSLP Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Daniel Paul Shoemaker , Wm. Arthur Conklin
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This self-study guide delivers 100% coverage of all domainsin the the CSSLP ....
Release Date 2019/03 -
CSSLP Certification All-in-One Exam Guide
Author Daniel Shoemaker , Wm. Arthur Conklin
Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam. CSSLP All-in-One Exam Guide covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC2). Y....
Release Date 2013/12 -
CSI Exam Cram™ 2 (Exam 642-541)
Author Annlee Hines
Security is Cisco's top priority in 2003 and few other resources are available for exam preparation on this topic!Industry experts expect the CCSP to be one of the most popular certifications in 2003.The CSI exam is the fifth and final exam required to obtain a CCS....
Release Date 2003/11 -
Author Brian Honan , Jim Reavis , Raj Samani
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).For many years the CSA has been at the forefront of researc....
Release Date 2014/09 -
Cryptography InfoSec Pro Guide
Author Sean-Philip Oriyano
Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques.
Release Date 2013/07 -
Cryptography and Network Security
Author S. Bose , Ajay Kumar
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map th....
Release Date 2016/03 -
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
Author Ted G. Lewis
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)"The book is written as a student t....
Release Date 2014/11 -
Author Peter H. Gregory , Bobby E. Rogers , Dawn Dunkerley
A fully updated self-study guide for the industry-standard information technology risk certification, CRISCWritten by information security risk experts, this complete self-study system is designed to help you prepare for—and pass—ISACA’s CRISC certification exam. CRISC Certified in Risk and Informa....
Release Date 2022/05 -
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
Author Dawn Dunkerley , Bob E. Rogers
An all-new exam guide for the industry-standard information technology risk certification, Certified in Risk and Information Systems Control (CRISC)Prepare for the newly-updated Certified in Risk and Information Systems Control (CRISC) certification exam with this ....
Release Date 2015/12 -
Author Zulfikar Ramzan , Markus Jakobsson
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a....
Release Date 2008/04 -
Author Jeff Bollinger , Brandon Enright , Matthew Valites
This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy,....
Release Date 2015/05 -
Cracking Security Misconceptions
Author Andrew Peterson
As stories continue to mount about security breaches in organizations and government agencies—such as the 2016 US Department of Justice hack—many people believe there’s really nothing they can do about it. Fact is, you can do quite a bit. In this report, security p....
Release Date 2016/09