-
Reflexive Governance for Research and Innovative Knowledge
Author Marc Maesschalck
The governance theories that have developed over the past twenty years offer a new framework to consider and examine the collective conditions of a “Responsible Research and Innovation – RRI” linked up with the policy challenges of a society in transition in all ....
Release Date 2017/03 -
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501), 2nd Edition
Author Scott Jernigan , Mike Meyers
A fully updated CompTIA Security+ exam guide from training and exam preparation expert Mike MeyersTake the CompTIA Security+ exam (exam SY0-501) with confidence using the comprehensive information contained in this highly effective study resource. Like the exam, th....
Release Date 2017/12 -
CISSP Practice Exams, Fifth Edition, 5th Edition
Author Jonathan Ham , Shon Harris
Fully updated coverage of the 2018 CISSP exam, including 1250+ in-depth practice questionsTake the 2018 version of the challenging CISSP exam with confidence using this up-to-date, exam-focused study resource. Designed as a companion to CISSP All-in-One Exam Guide,....
Release Date 2018/11 -
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition, 4th Edition
Author Matt Walker
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Up-to-date coverage of every topic on the CEH v10 examThoroughly updated for....
Release Date 2019/03 -
Author Scar de Courcier , Oleg Skulkin
Maximize the power of Windows Forensics to perform highly effective forensic investigationsAbout This BookPrepare and perform investigations using powerful tools for Windows,Collect and validate evidence from suspects and computers and uncover clues that are otherw....
Release Date 2017/08 -
Building a Cyber Resilient Business
Author Dr. Magda Lilia Chelly , Shamane Tan , Hai Tran
Learn how to build a proactive cybersecurity culture together with the rest of your C-suite to effectively manage cyber risksKey FeaturesEnable business acceleration by preparing your organization against cyber risksDiscover tips and tricks to manage cyber risks in your organization and build a cybe....
Release Date 2022/11 -
Social Ontology of Whoness, 3rd Edition
Author Michael Eldred
How are core social phenomena to be understood as modes of being? This book offers an alternative approach to social ontology. Recent interest in social ontology on the part of mainstream philosophy and the social sciences presupposes from the outset that the human....
Release Date 2018/10 -
Author Peter Yaworski
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbu....
Release Date 2019/06 -
Healthcare Information Technology Exam Guide for CHTS and CAHIMS Certifications, 2nd Edition
Author John Mattison , Brian Gugerty , Kathleen A. McCormick
This effective study resource delivers complete coverage of all topics on the newest versions of these challenging HIT examsThis comprehensive self-study guide fully prepares candidates for the Certified Associate in Healthcare Information and Management Systems (C....
Release Date 2017/09 -
Cisco Certified CyberOps Associate 200-201 Certification Guide
Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certificationKey FeaturesReceive expert guidance on how to kickstart your career in the cybersecurity industryGain hands-on experience while studying for the Cisco Certified CyberOps Associa.... -
Nine Steps to Success: North American edition - An ISO 27001 Implementation Overview
Author Alan Calder
Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard....
Release Date 2017/10 -
CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition
Author Matt Walker
Thoroughly revised for the latest release of the Certified Ethical Hacker (CEH) v8 certification examFully updated for the CEH v8 exam objectives, this comprehensive guide offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new editi....
Release Date 2014/04 -
CCNA Cybersecurity Operations Companion Guide, First Edition
Author Cisco Networking Academy
CCNA Cybersecurity Operations Companion Guide is the official supplemental textbook for the Cisco Networking Academy CCNA Cybersecurity Operations course.The course emphasizes real-world practical application, while providing opportunities for you to gain the skill....
Release Date 2018/06 -
Author James M. Stewart
Get the streamlined tool you need to bone up for the Security+ exam [SYO-101]. Fast Pass coverage includes:General security concepts.Assessing risk.Securing communications.Implementing wireless security features.Configuring a firewall.Detecting intrusions.Securing y....
Release Date 2004/10 -
The Handbook of Board Governance, 2nd Edition
Author Richard Leblanc
The revised new edition of the must-read guide for executives—provides comprehensive coverage of topics in corporate governance by leading subject-matter expertsThe Handbook of Board Governance is the marketing-leading text on public, nonprofit, and private board governan....
Release Date 2020/05 -
GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Ric Messier
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Fully updated coverage of every topic on the current version of the GSEC exa....
Release Date 2019/08 -
Cybersecurity - Attack and Defense Strategies
Author Erdal Ozkaya , Yuri Diogenes
Enhance your organization's secure posture by improving your attack and defense strategiesAbout This BookGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.Learn to unique te....
Release Date 2018/01 -
Network Protocols for Security Professionals
Author Yoram Orzach , Deepanshu Khanna
Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey FeaturesExploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database, DNS, voice, video, and collaboration server attac....
Release Date 2022/10 -
CompTIA Linux+ Practice Tests, 2nd Edition
Author Steve Suehring
The best practice test preparation for the foundational CompTIA Linux+ certification examIf you’re preparing for this all-important exam, turn to CompTIA Linux+ Practice Tests. The book covers the 5 objective domains, PLUS one additional 90-question practice exam, ....
Release Date 2019/07 -
Hands-On Application Penetration Testing with Burp Suite
Author Riyaz Ahemed Walikar , Dhruv Shah , Carlos A. Lozano
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilitiesKey FeaturesMaster the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intru....
Release Date 2019/02 -
Author Robin Abernathy , Troy McMillan
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.Learn, prepare, and practice for CISSP exam success with the CISSP Cert Guide from Pearson IT Certification, a lea....
Release Date 2013/11 -
Author Ric Messier
Intensively hands-on training for real-world network forensicsNetwork Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, y....
Release Date 2017/08 -
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
Author Sanjib Sinha
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your....
Release Date 2019/11 -
Governance of Portfolios, Programs, and Projects: A Practice Guide
Author Project Management Institute
Understanding governance as it applies to portfolios, programs, and projects is growing in importance to organizations, because appropriate governance is a factor in the success or failure of strategic initiatives and portfolios, as well as an organization’s ....
Release Date 2016/01 -
CISSP®: Certified Information Systems Security Professional Study Guide, Fifth Edition
Author Mike Chapple , Ed Tittel , James Michael Stewart
Totally updated for 2011, here's the ultimate study guide for the CISSP examConsidered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive stu....
Release Date 2011/01 -
CompTIA Security+ Study Guide, 7th Edition
Author Chuck Easttom , Emmett Dulaney
Expert preparation covering 100% of Security+ exam SY0-501 objectivesCompTIA Security+ Study Guide, Seventh Edition offers invaluable preparation for Exam SY0-501. Written by an expert author team, this book covers 100% of the exam objectives with clear, concise ex....
Release Date 2017/10 -
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
Author Jesus Vigo , Jr.
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic to....
Release Date 2022/12 -
Author Doug Barth , Evan Gilman
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar ....
Release Date 2017/07