-
Practical Mobile Forensics - Fourth Edition
Author Rohit Tamma , Oleg Skulkin , Heather Mahalik
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenariosKey FeaturesApply advanced forensic techniques to recover deleted data from mobile devices Retrieve and analyze data ....
Release Date 2020/04 -
The Long-Tail Strategy of IT Outsourcing
Author Ravi Aron , Julia Kotlarsky , Ilan Oshri , Kunsoo Han , Vijay Gurbaxani , Rudy Hirsch
Today’s rapid technological changes have transformed the role of global IT outsourcing in companies’ strategies. Traditionally viewed as a cost-saving measure, IT outsourcing is also increasingly being leveraged as a strategic tool for acquiring cutting....
Release Date 2016/01 -
How to Defeat Advanced Malware
Author Simon Cros , Henry Dalziel
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverage....
Release Date 2014/12 -
Getting Started with z/OS Data Set Encryption
Author Andy Coulson Bill White Jacky Doll , Brad Habbershaw , Cecilia Carranza Lewis , Tho
AbstractThis IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/O....
Release Date 2018/06 -
Author Matthew Berninger , Ric Messier
There’s a powerful new tool in the fight against malware. The US National Security Agency (NSA) recently released its reverse engineering framework, Ghidra, as free and open source software. This practical report explains how engineers can use Ghidra to analyze mal....
Release Date 2019/10 -
CCNA® Cisco Certified Network Associate Review Guide
Author Todd Lammle
The leading quick-review guide to the number-one IT certificationThe Cisco Certified Network Associate (CCNA) certification is the first step for network administrators seeking to advance their careers. Part of the Sybex study-practice-review approach to certificati....
Release Date 2011/06 -
The Handbook of Mobile Market Research: Tools and Techniques for Market Researchers
Author Sue York , Navin Williams , Ray Poynter
The first book on the market that focuses on the area of mobile researchMore people have mobile phones than have computers or land lines and for several years researchers have understood that data collection needs to become mobile. Up until now, there were no system....
Release Date 2014/10 -
Author Brian Stafford , Dottie Schindlinger
A new edition of the #1 text in the human computer Interaction field!This book seeks to chart the technology-fueled changes taking place in the field of corporate governance and describes the impact these changes are having on boards and the enterprises they govern....
Release Date 2019/04 -
Workshop Mastery with Jimmy DiResta
Author John Baichtal , Jimmy DiResta
Jimmy DiResta has made a name for himself with his inventiveness and workshop skills, creating dozens of projects for YouTube videos and television shows such as Hammered and Against the Grain on the DIY network. In Make: Workshop Mastery With Jimmy DiResta, Jimmy ....
Release Date 2016/10 -
Author Daniel Sawano , Dan Bergh Johnsson , Daniel Deogun
Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you’ll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You’ll also master security-centric t....
Release Date 2019/09 -
Penetration Testing: A guide for business and IT managers
Author Peter Taylor , Felix Ryan , Tylor Robinson , Gemma Moore , Moinuddin Zaki , Jims Marc
Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers becom....
Release Date 2019/08 -
Author Adrian Pruteanu
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker.Key FeaturesBuilds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Exa....
Release Date 2019/01 -
Author Aditya Mukherjee
Build a resilient network and prevent advanced cyber attacks and breachesKey FeaturesExplore modern cybersecurity techniques to protect your networks from ever-evolving cyber threatsPrevent cyber attacks by using robust cybersecurity strategiesUnlock the secrets of networ....
Release Date 2020/11 -
Author Jamie Sanbower , Mason Harris , Vivek Santuka , Aaron Woland
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protectionIntegrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in se....
Release Date 2018/07 -
Adobe ColdFusion 8 Web Application Construction Kit, Volume 1: Getting Started
Author Charlie Arehart , Raymond Camden , Ben Forta
The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time—the books that most ColdFusion developers used to learn the product. This Getting Started volume starts with Web and Internet fundamentals and database concepts and des....
Release Date 2007/09 -
Advanced Modern Control System Theory and Design
Author Stanley M. Shinners
The definitive guide toadvanced control system designAdvanced Modern Control System Theory and Design offers the most comprehensive treatment of advanced control systems available today. Superbly organized and easy to use, this book is designed for an advanced cours....
Release Date 1998/09 -
Unmasking the Social Engineer: The Human Element of Security
Author Paul Ekman , Paul Kelly F. , Christopher Hadnagy
Learn to identify the social engineer by non-verbal behaviorUnmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men ....
Release Date 2014/02 -
The Oliver Wight Class A Standard for Business Excellence, 7th Edition
Author Oliver Wight International , Inc.
The Oliver Wight Class A Standard for Business Excellence is the definitive, comprehensive statement of excellence in business today. Oliver Wight’s Class A Standard is the accumulated practice and experience of Oliver Wight Consultants around the world. It reflect....
Release Date 2017/05 -
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
Author Jesus Vigo , Jr.
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic to....
Release Date 2022/12 -
Distributed Denial of Service (DDoS)
Author Rich Groves , Eric Chou
Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to ....
Release Date 2018/04 -
Author Deborah Hicks Midanek
Boards of directors are sitting ducks. Shareholders complain and even attack, management manipulates, and individual board members have little power, able to act only as part of the board as a whole. Governance issues are front and center, yet there is often little....
Release Date 2018/09 -
Hands-On Penetration Testing with Python
Author Furqan Khan
Implement defensive techniques in your ecosystem successfully with PythonKey FeaturesIdentify and expose vulnerabilities in your infrastructure with Python Learn custom exploit development . Make robust and powerful cybersecurity tools with Python W....
Release Date 2019/01 -
Building a Cyber Resilient Business
Author Dr. Magda Lilia Chelly , Shamane Tan , Hai Tran
Learn how to build a proactive cybersecurity culture together with the rest of your C-suite to effectively manage cyber risksKey FeaturesEnable business acceleration by preparing your organization against cyber risksDiscover tips and tricks to manage cyber risks in your organization and build a cybe....
Release Date 2022/11 -
Metasploit 5.0 for Beginners - Second Edition
Author Sagar Rahalkar
A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilitiesKey FeaturesPerform pentesting in highly secured environments with Metasploit 5.0 Become well-versed with th....
Release Date 2020/04 -
CISA® Certified Information Systems Auditor All-in-One Exam Guide
Author Peter H. Gregory
"All-in-One is All You Need."CISA Certified Information Systems Auditor All in One Exam GuideGet complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit ....
Release Date 2009/10 -
CompTIA Advanced Security Practitioner (CASP) CAS-002 Cert Guide
Author Troy McMillan , Robin Abernathy
Trust the best selling Authorized Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for exam success. These guides are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared....
Release Date 2015/04 -
CompTIA Security+ Study Guide: SY0-401, 6th Edition
Author Chuck Easttom , Emmett Dulaney
Join over 250,000 IT professionals who've earned Security+ certificationIf you're an IT professional hoping to progress in your career, then you know that the CompTIA Security+ exam is one of the most valuable certifications available. Since its introduction in 20....
Release Date 2014/05 -
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition, 3rd Edition
Author Darril Gibson
This fully updated study guide offers complete coverage of every topic on the latest version of the SSCP examTake the 2018 edition of the challenging Systems Security Certified Practitioner (SSCP) exam with confidence using the detailed information contained in thi....
Release Date 2018/10 -
CSSLP Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Daniel Paul Shoemaker , Wm. Arthur Conklin
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This self-study guide delivers 100% coverage of all domainsin the the CSSLP ....
Release Date 2019/03 -
Fundamentals of Computer Graphics, 3rd Edition
Author Steve Marschner , Michael Ashikhmin , Peter Shirley
With contributions by Michael Ashikhmin, Michael Gleicher, Naty Hoffman, Garrett Johnson, Tamara Munzner, Erik Reinhard, Kelvin Sung, William B. Thompson, Peter Willemsen, Brian Wyvill. The third edition of this widely adopted text gives students a comprehensive, fu....
Release Date 2009/07