-
Author William L. Sparks , Peter C. Browning
Directors: Improve Board PerformanceThe Director's Manual: A Framework for Board Governance offers current and aspiring board members essential up-to-date governance guidance that blends rigorous research-based information with the wisdom found only through practi....
Release Date 2016/02 -
Author Allison Cerra
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can tak....
Release Date 2019/09 -
Author Brad Hibbert , Morey J. Haber
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, ev....
Release Date 2018/06 -
Author Amanda Berlin , Lee Brotherston
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to ....
Release Date 2017/04 -
Author Michael Collins
Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company’s network. In many organizations, security analysts initiate threat hunting when they spot something weird—network conditions or activ....
Release Date 2018/05 -
The Social Leader: Redefining Leadership for the Complex Social Age
Author Sudhanshu Palsule , Frank Guglielmo
Technology, global economics, and demographics are colluding to create workspaces that thrive on communities rather than hierarchies. Our industrial paradigm with its roots in the military is swiftly being replaced by a paradigm based on networks that are held toget....
Release Date 2014/09 -
Mastering Malware Analysis - Second Edition
Author Alexey Kleymenov , Amr Thabet
Learn effective malware analysis tactics to prevent your systems from getting infectedKey FeaturesInvestigate cyberattacks and prevent malware-related incidents from occurring in the futureLearn core concepts of static and dynamic malware analysis, memory forensics, decryption, and much moreGet prac....
Release Date 2022/09 -
Digital Forensics and Incident Response - Second Edition
Author Gerard Johansen
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident r....
Release Date 2020/01 -
Author Alan Calder
An Introduction to IT GovernanceIf you are unsure what IT governance is, or how it is relevant to your business, this pocket guide is for you. It outlines the key drivers for IT governance in the modern global economy, with particular reference to corporate governan....
Release Date 2007/05 -
Data Protection vs. Freedom of Information
Author Paul Ticher
How would you respond to a freedom of information request, whilst ensuring compliance with the Data Protection Act?Get clear and practical guidance on this key data governance issue!Freedom of information is often mentioned in the same breath as data protection. In ....
Release Date 2008/11 -
Author Dr Sabina Dosani , Infinite Ideas
Defeat depression tackles this greatly misunderstood condition head on with over 50 inspirational ideas from a psychiatrist who struggled with and overcame depression as a young adult. Defeat depression offers a real insight into the condition with practical, tried ....
Release Date 2011/12 -
Cryptography and Network Security
Author S. Bose , Ajay Kumar
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map th....
Release Date 2016/03 -
Author W. Curtis Preston
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quic....
Release Date 2002/02 -
Author Michael Gregg
A new edition of this title is available, ISBN-10: 0789738066 ISBN-13: 9780789738066Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam....
Release Date 2005/09 -
Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security
Author Omar Santos
A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber securityToday’s world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibil....
Release Date 2015/09 -
Designing and Developing Secure Azure Solutions
Author Michael Howard , Simone Curzi , Heinrich Gantenbein
Plan, build, and maintain highly secure Azure applications and workloadsAs business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across t....
Release Date 2022/11 -
Author Ben Forta
Written by the best known and most trusted name in the ColdFusion community, Ben Forta, The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time. Volume 3: Advanced Application Development, focuses on application security, sc....
Release Date 2010/08 -
Mastering Windows Network Forensics and Investigation, 2nd Edition
Author Scott Pearson , Ryan Johnson , Steve Bunting , Steven Anson
An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personn....
Release Date 2012/06 -
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
Author Ben Malisow
The only official study guide for the new CCSP examCCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare fas....
Release Date 2017/05 -
Social Engineering, 2nd Edition
Author Christopher Hadnagy
Harden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus softw....
Release Date 2018/07 -
CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition, 2nd Edition
Author Daniel Carter
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Comprehensive coverage of every domain on the CCSP exam This highly effect....
Release Date 2019/12 -
Big Data Analytics with Applications in Insider Threat Detection
Author Latifur Khan , Mohammad Mehedy Masud , Pallabi Parveen , Bhavani Thuraisingham
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malwa....
Release Date 2017/11 -
Visual Cryptography and Secret Image Sharing
Author Ching-Nung Yang , Stelvio Cimato
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography ....
Release Date 2017/12 -
Reducing MTTD for High-Severity Incidents
Author Jordan Pritchard , Ramin Keene , Rodney Lester , Jay Holler , Michael Kehoe , Tammy B
For companies such as Amazon, Dropbox, and Gremlin, the term high severity incident (SEV) signifies drops in network availability, product feature issues, data loss, revenue loss, and security risks. These high-impact bugs occur when coding, automation, testing, an....
Release Date 2018/12 -
Business Continuity and Disaster Recovery for InfoSec Managers
Author James F. Ransome , PhD , CISM , CISSP , John Rittinghouse , PhD , CISM
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses t....
Release Date 2005/09 -
Business Analyst - Careers in Business Analysis
Author Adrian Reed
Business analysis is a crucial discipline for organisational success, it enables organisations to rise to the challenges presented by today's increasing pace of change. It is a broad field and has matured into a profession of its own, with its own unique career ro....
Release Date 2018/08 -
Service Integration and Management (SIAM™) Professional Body of Knowledge (BoK), Second edition
Service Integration and Management (SIAM™) Professional Body of Knowledge (BoK), Second edition has been updated to reflect changes to the market and is the official guide for the EXIN SIAM™ Professional certification.Prepare for your SIAM™ Professional exam and understand how SIAM can benefit your .... -
Validating Your Business Continuity Plan: Ensuring your BCP actually works
Author Robert Clark
75% of companies without a business continuity plan fail within three years. Disruptive incidents can affect any organization and occur at any moment. ICT outages, cyber attacks, natural disasters, terrorist attacks, pandemics, supply chain failures and other unex....
Release Date 2015/11 -
Author Tom Clark
Designing Storage Area Networks, Second Edition, succinctly captures the key technologies that are driving the storage networking industry. Tom Clark's works are helping to educate the IT community to the benefits and challenges of shared storage and are recommende....
Release Date 2003/03 -
A Brief Look at Some Businesses Based on Shared Social Experience
Author Rawn Shah
This Element is an excerpt from Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs (9780132357791) by Rawn Shah. Available in print and digital formats.¿Lessons from some of today’s most innovative social businesses: last.fm, Li....
Release Date 2010/04