-
Author Ric Messier
With nation-states, organized crime groups, and other attackers scouring systems to steal funds, information, or intellectual property, incident response has become one of today’s most important technology sectors. If you’re not familiar with incident response, thi....
Release Date 2019/12 -
Author Toomas Viira
"I loved the quotes at the beginning of each chapter – very interesting and thought-provoking. I also enjoyed the author’s style and his technical expertise shone through," Christopher Wright, Wright CandA Consulting Ltd. Protecting critical information infra....
Release Date 2018/01 -
CISSP® Exam Cram, Fourth Edition
Author Michael Gregg
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the digital edition of the Cram Sheet is available through product registration at Pearson IT Certific....
Release Date 2016/08 -
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Author Michael Hale Ligh , Andrew Case , Jamie Levy , AAron Walters
Memory forensics provides cutting edge technology to help investigate digital attacksMemory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malwa....
Release Date 2014/07 -
Author Camille McCue
An easy-to-grasp introduction to coding concepts for kidsCoding For Kids For Dummies breaks coding into a series of small projects, each designed to teach elementary-to-middle-school-aged students a core concept to build a game, application, or other tool. In this h....
Release Date 2014/11 -
Author Amy Sample Ward , Afua Bruce
Changing the way we use, develop, and fund technology for social change is possible, and it starts with you. The Tech That Comes Next: How Changemakers, Philanthropists, and Technologists Can Build an Equitable World outlines a vision of a more equitable and just world along with practical steps to ....
Release Date 2022/03 -
Author Scott Davis , Carter Copeland , Rob Wertheimer
Three top Wall Street analysts reveal enduring lessons in sustainable success from the great industrial titans—the high-tech companies of their day—to the disruptors that now dominate the economy.Before Silicon Valley disrupted the world with new technologies and business....
Release Date 2020/07 -
Author Christo Sims
In New York City in 2009, a new kind of public school opened its doors to its inaugural class of middle schoolers. Conceived by a team of game designers and progressive educational reformers and backed by prominent philanthropic foundations, it promised to reinvent....
Release Date 2017/03 -
Author Robert G. Werner , James A. Bach
The H-1B visa is the gateway for the world's best and brightest to live and work in the United States as IT professionals, engineers, scientists, professors, doctors, nurses, and researchers. How to Secure Your H-1B Visa guides employees and employers alike through....
Release Date 2013/01 -
Sourcing to Support the Green Initiative
Author Lisa Ellram , Wendy Tate
The “green” or environmental sustainability movement has taken hold throughout the world. Its staying power is confirmed by that fact that environmental emphasis in organizations did not decrease during the recent global recession, but rather increased. However, sin....
Release Date 2013/07 -
Author William Oettinger
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensics to acquire and secure digital evidence skillfully Conduct a digital fo....
Release Date 2020/04 -
Author Linda Frederiksen
Within most libraries in the United States today there is an information professional who has become the ‘go-to’ person for grasping and grappling with copyright questions. While not an attorney, this librarian has developed an awareness and understanding of copyri....
Release Date 2015/11 -
VCP5-DT Official Cert Guide: VMware Certified Professional 5 - Desktop
Author Linus Bourque
The Publisher regrets that the companion CD/DVD content cannot be made available Online.The VCP5-DT Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizze....
Release Date 2013/08 -
Author Chris Minnick , Eva Holland
Learn to code the fun way with nine real projects for true beginnersAdventures in Coding is written specifically for young people who want to learn how to code, but don't know where to begin. No experience? No problem! This book starts from the very beginning to t....
Release Date 2016/03 -
CIPM Certified Information Privacy Manager All-in-One Exam Guide
This self-study guide covers every topic on the Certified Information Privacy Manager exam Take IAPP’s rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candidates.... -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Brad Hibbert , Morey J. Haber
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breache....
Release Date 2017/12 -
Author Timothy Gallo , Allan Liska
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what st....
Release Date 2016/12 -
Data Analyst - BCS Guides to IT Roles
Author Obi Umegbolu , Clare Stanier , Charles Joseph , Harish Gulati , Rune Rasmussen
Data is constantly increasing; everything from app usage, to sales, to customer surveys generate data in an average business. Out on the streets data is everywhere too, from speed and security cameras, weather monitoring and measuring footfall to name just a few ex....
Release Date 2019/03 -
A concise introduction to the NIS Directive - A pocket guide for digital service providers
Author Alan Calder
This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENIS....
Release Date 2018/11 -
Securing Network Infrastructure
Author Sagar Rahalkar , Sairam Jetty
Plug the gaps in your network's infrastructure with resilient network security modelsKey FeaturesDevelop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement n....
Release Date 2019/03 -
Author Christopher Elisan
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting....
Release Date 2015/09 -
Google Hacking for Penetration Testers, 3rd Edition
Author Justin Brown , Bill Gardner , Johnny Long
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade sec....
Release Date 2015/11 -
The Essence of Software Engineering: Applying the SEMAT Kernel
Author Svante Lidman , Ian Spence , Paul E. McMahon , Pan-Wei Ng , Ivar Jacobson
SEMAT (Software Engineering Methods and Theory) is an international initiative designed to identify a common ground, or universal standard, for software engineering. It is supported by some of the most distinguished contributors to the field. Creating a simple langu....
Release Date 2013/01 -
Building Secure Software: How to Avoid Security Problems the Right Way
Author Gary McGraw , John Viega
Most organizations have a firewall, antivirus software, and intrusion detection systems, all of which are intended to keep attackers out. So why is computer security a bigger problem today than ever before? The answer is simple--bad software lies at the heart of all....
Release Date 2001/09 -
Next-Generation Video Coding and Streaming
Author Benny Bing
Reviews the new High Efficiency Video Coding (HEVC) standard and advancements in adaptive streaming technologies for use in broadband networks and the InternetThis book describes next-generation video coding and streaming technologies with a comparative assessment ....
Release Date 2015/10 -
CISM Certified Information Security Manager Practice Exams
Author Peter H. Gregory
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Don’t Let the Real Test Be Your First Test! Take the current version of the ....
Release Date 2019/07 -
Author Stanley Siegel , Chris Williams , Scott Donaldson
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and busine....
Release Date 2018/12 -
Author Thomas Kranz
A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. In Making Sense of Cybersecurity you will learn how to: Develop and incrementally improve your own cybersecurity strategyDetect rogue WiFi ....
Release Date 2022/10