-
Official (ISC)2 Guide to the CAP CBK, 2nd Edition
Author Patrick D. Howard
Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization....
Release Date 2016/04 -
Wireless Network Security: A Beginner’s Guide
Author Tyler Wrightson
Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and....
Release Date 2012/04 -
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. Adopting an.... -
Author Stoyan Stefanov , Jeremy Rogers
Secure your Linux server and protect it from intruders, malware attacks, and other external threatsAbout This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as ....
Release Date 2006/02 -
The Definitive Guide to Plone, Second Edition
Author Andy McKay , Fabrizio Reale , Alice Narduzzo , Davide Moro , Maurizio Delmonte
The Definitive Guide to Plone, Second Edition has been completely updated to cover version 3 of Plone and its newest features. This book provides a complete and detailed overview of Plone. It is divided into three parts, which cover using, configuring, and developin....
Release Date 2009/04 -
Kali Linux Intrusion and Exploitation Cookbook
Author Ishan Girdhar , Dhruv Shah
Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsAbout This BookSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsImprove your testing efficien....
Release Date 2017/04 -
Zero Trust Networks, 2nd Edition
Author Razi Rais , Christina Morillo , Evan Gilman , Doug Barth
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method....
Release Date 2023/12 -
CompTIA® Security+ SY0-501 Cert Guide, Academic Edition, Second Edition
Author David L. Prowse
Learn, prepare, and practice for CompTIA Security+ SY0-501 exam success with this full-color CompTIA Authorized Cert Guide, Academic Edition from Pearson IT Certification, a leader in IT Certification learning. This book includes access to four complete practice te....
Release Date 2017/12 -
Applied Network Security Monitoring
Author Jason Smith , Chris Sanders
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring i....
Release Date 2013/11 -
Eleventh Hour CISSP®, 3rd Edition
Author Joshua Feldman , Seth Misenar , Eric Conrad
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presente....
Release Date 2016/09 -
CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide, Second Edition
Author Robin Abernathy , Troy McMillan
Learn, prepare, and practice for CompTIA Advanced Security Practitioner (CASP) CAS-003 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner.Master CompTIA A....
Release Date 2018/05 -
CompTIA® Security+ SY0-501 Cert Guide
Author David L. Prowse
This is the most comprehensive core study tool for CompTIA's latest Security+ exam. Perfect for every candidate preparing for this challenging exam, its comprehensive coverage offers all the information and insight readers need to succeed. From start to finish, th....
Release Date 2017/10 -
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition
Author Stephen Sims , Ryan Linn , Branko Spasojevic , Jonathan Ness , Chris Eagle , Allen Ha
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker’s....
Release Date 2018/04 -
CEH v10 Certified Ethical Hacker Study Guide
Author Ric Messier
As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10....
Release Date 2019/06 -
Author Roger A. Grimes
Meet the world's top ethical hackers and explore the tools of the tradeHacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms ....
Release Date 2017/05 -
Author Matthew Hickey , Jennifer Arcuri
A fast, hands-on introduction to offensive hacking techniquesHands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author....
Release Date 2020/09 -
The Basics of Hacking and Penetration Testing, 2nd Edition
Author Patrick Engebretson
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the result....
Release Date 2013/06 -
Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition
Author Omar Santos , Michael Gregg
In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 10 exam and advance your career in IT security. The authors' concise, focused appro....
Release Date 2019/07 -
Hacking: The Art of Exploitation, 2nd Edition
Author Jon Erickson
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to reall....
Release Date 2008/01 -
CEH v11 Certified Ethical Hacker Study Guide
As protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The....