-
The Law of Tax-Exempt Healthcare Organizations 2017 Cumulative Supplement, Fourth Edition + website
Author Bruce R. Hopkins , Thomas K. Hyatt
2017's must-have reference for nonprofit healthcare organizationsThe Law of Tax-Exempt Healthcare Organizations is a one-stop reference for organizations and their advisors, providing accessible explanations of the complex legal framework surrounding tax-exempt st....
Release Date 2017/03 -
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Edition
Author Mike Wills
The only SSCP study guide officially approved by (ISC)2The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT....
Release Date 2022/02 -
CompTIA Server+ Certification All-in-One Exam Guide, Second Edition (Exam SK0-005), 2nd Edition
This exam-focused study guide contains complete coverage of every topic on the current edition of the CompTIA Server+ certification exam This highly effective self-study resource fully prepares you for the latest version of CompTIA’s Server+ certification exam. The book shows how to implement serve.... -
Author Charles Bihis
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkAbout This BookLearn how to use the OAuth 2.0 protocol to interact with the world's most popular ....
Release Date 2015/12 -
CompTIA Security+ SY0-201 Cert Guide
Author David L. Prowse
CompTIA® Security+ SY0-201 Cert GuideDavid L. ProwseDVD Features Complete Practice ExamMaster every topic on CompTIA’s new Security+ SY0-201 exam.Assess your knowledge and focus your learning.Get the practical workplace knowledge you need!Start-to-finish Security+ S....
Release Date 2010/11 -
Legal and Privacy Issues in Information Security, 3rd Edition
Author Joanna Lyn Grama
Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information security. Information systems securi....
Release Date 2020/12 -
Author Jennifer C. Wolfe
No boardroom in any industry is safe from new market threats in this time of rapid technological growth. We’ve all heard the stories of corruption by CEOs at WeWork and Theranos and witnessed whistleblowers revealing crises at Wells Fargo and Uber. The board’s responsibil....
Release Date 2020/08 -
31 Days Before Your CCNA Exam: A Day-by-Day Review Guide for the CCNA 640-802 Exam, Second Edition
Author Allan Johnson
31 Days Before your CCNA Exam, Second Edition, offers you a personable and practical way to understand the certification process, commit to taking the exam, and finish your preparation using a variety of Foundational and Supplemental study resources.The book breaks ....
Release Date 2008/11 -
Cybersecurity Attacks – Red Team Strategies
Author Johann Rehberger
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team program Leve....
Release Date 2020/03 -
Mobile Location Services: The Definitive Guide
Author Andrew Jagoe
The first comprehensive guide to building and deploying mobile location-based servicesDetailed coverage of mobile location servers, client platforms, protocols, and standardsMapping, geocoding, mobile positioning, security, personalization, privacy, and moreForeword....
Release Date 2002/12 -
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Author Aaron Woland , Panos Kampanakis , Omar Santos
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network securit....
Release Date 2016/06 -
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us
Author Eugene H. Spafford , Leigh Metcalf , Josiah Dykstra
175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct ThemCybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the wor....
Release Date 2023/02 -
Author Nikhil Abraham
Hands-on exercises help you learn to code like a proNo coding experience is required for Coding For Dummies, your one-stop guide to building a foundation of knowledge in writing computer code for web, application, and software development. It doesn't matter if you....
Release Date 2015/02 -
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests
Author David Seidl , Mike Chapple
Smarter, faster prep for the SSCP exam(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests is the only (ISC)2-endorsed set of questions for the SSCP exam. With SSCP certification, you will meet Department of Defense requirements for entry-lev....
Release Date 2019/01 -
Digital Forensics Basics: A Practical Guide Using Windows OS
Author Nihad A. Hassan
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gat....
Release Date 2019/02 -
CompTIA Security+ Certification Study Guide: Network Security Essentials
Author Ahmed F. Sheikh
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and yo....
Release Date 2020/09 -
Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the im.... -
Cyber resilience - Defence-in-depth principles
Author Alan Calder
This book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project.
Release Date 2023/08 -
Author Nipun Jaswal
Gain basic skills in network forensics and learn how to apply them effectively Key FeaturesInvestigate network threats with ease Practice forensics tasks such as intrusion detection, network analysis, and scanning Learn forensics investigation at the network levelB....
Release Date 2019/03 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002, Second Edition
Author Michael Gregg
CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 examCASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition of the bestselling book covering the CASP certificat....
Release Date 2014/10 -
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
Author Darril Gibson , James M Stewart , Mike Chapple
CISSP Study Guide - fully updated for the 2018 CISSP Body of KnowledgeCISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex....
Release Date 2018/05 -
Windows Virus and Malware Troubleshooting
Author Mike Halsey , Andrew Bettany
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.Whatever version of Windows you're using, the threat of virus and malware infection is always a com....
Release Date 2017/03 -
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Author Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux....
Release Date 2018/11 -
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Author Sagar Rahalkar
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanni....
Release Date 2018/11 -
A Complete Guide to Burp Suite : Learn to Detect Application Vulnerabilities
Author Sagar Rahalkar
Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps.Burp Suite is a simple, yet powerful, tool used for a....
Release Date 2020/11 -
The Enterprise Path to Service Mesh Architectures, 2nd Edition
Author Lee Calcote
Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This....
Release Date 2020/11 -
A Profile of the United States Toy Industry, Second Edition
Author Christopher Byrne
The toy industry is one of the most consistently misunderstood sectors of American business, comprising a wide range of businesses under one banner-entertainment, commodities, fashion and licensing-that each behave differently. Broad-based change is constant, with ....
Release Date 2017/01 -
Successful Cybersecurity Professionals
Author Dr. Steven Brown
This book provides a unique perspective into the mindset of psychology and cybersecurity.It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals’ behavior, but our b....
Release Date 2020/09 -
TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
Author Shawn Porter , Debra Littlejohn Shinder , Mike Chapple
TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at individuals with 2 or more years of computer security experience or training equivalent to 48 hours in a 24 month period. TICSA represents base l....
Release Date 2002/09