-
Learning Android Forensics - Second Edition
Author Rohit Tamma , Donnie Tindall , Oleg Skulkin
A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifactsKey FeaturesGet up and running with modern mobile forensic strategies and techniques Analyze the most popular Android applications using free and open source foren....
Release Date 2018/12 -
CISSP Practice Exams, Fifth Edition, 5th Edition
Author Jonathan Ham , Shon Harris
Fully updated coverage of the 2018 CISSP exam, including 1250+ in-depth practice questionsTake the 2018 version of the challenging CISSP exam with confidence using this up-to-date, exam-focused study resource. Designed as a companion to CISSP All-in-One Exam Guide,....
Release Date 2018/11 -
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Author Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux....
Release Date 2018/11 -
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Author Sagar Rahalkar
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanni....
Release Date 2018/11 -
Understanding Government Contract Law, 2nd Edition
Author Terrence M. O'Connor
This updated classic offers clear and concise explanations of the basic legal concepts of government contract law for professionals at any stage of their career. Written in straightforward language for contracting officers, contract administrators, contractors,....
Release Date 2018/11 -
Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers
Author Alan Calder
This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them. Show and hide more
Release Date 2018/11 -
A concise introduction to the NIS Directive - A pocket guide for digital service providers
Author Alan Calder
This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENIS....
Release Date 2018/11 -
CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-001)
Author Jeff T. Parker
Prepare for the CompTIA CySA+ certification exam with this effective self-study resourceDon’t Let the Real Test Be Your First Test!Pass the new Cybersecurity Analyst+ certification exam and obtain the latest security credential from CompTIA using the accurate pract....
Release Date 2018/10 -
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition, 3rd Edition
Author Darril Gibson
This fully updated study guide offers complete coverage of every topic on the latest version of the SSCP examTake the 2018 edition of the challenging Systems Security Certified Practitioner (SSCP) exam with confidence using the detailed information contained in thi....
Release Date 2018/10 -
CISSP All-in-One Exam Guide, Eighth Edition, 8th Edition
Author Fernando Maymi , Shon Harris
A new edition of Shon Harris’ bestselling exam prep guide—fully updated for the new CISSP 2018 Common Body of KnowledgeThis effective self-study guide fully prepares you for the challenging CISSP exam and offers 100% coverage of all exam domains. This edition has b....
Release Date 2018/10 -
Hands-On Software Engineering with Python
Author Brian Allbee
Explore various verticals in software engineering through high-end systems using PythonKey FeaturesMaster the tools and techniques used in software engineering Evaluates available database options and selects one for the final Central Office system-components Exper....
Release Date 2018/10 -
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
Author Shakeel Ali , Tedi Heriyanto , Lee Allen , Gerard Johansen , Damian Boodoo , Alex Sam
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth editionKey FeaturesRely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-....
Release Date 2018/10 -
Social Ontology of Whoness, 3rd Edition
Author Michael Eldred
How are core social phenomena to be understood as modes of being? This book offers an alternative approach to social ontology. Recent interest in social ontology on the part of mainstream philosophy and the social sciences presupposes from the outset that the human....
Release Date 2018/10 -
Author Jason A. Scharfman
Develop and manage a private equity compliance program Compliance has become one of the fastest-growing areas in the private equity (PE) space. Mirroring trends from the hedge fund industry, recent surveys indicate that PE managers rank compliance as the single mos....
Release Date 2018/09 -
Hacker Techniques, Tools, and Incident Handling, 3rd Edition
Author Michael G. Solomon , Sean-Philip Oriyano
Hacker Techniques, Tools, and Incident Handling, Third Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrup....
Release Date 2018/09 -
Information Governance for Healthcare Professionals
Author Robert F. Smallwood
Like other critical organizational assets, information is a strategic asset that requires high level of oversight in order to be able to effectively use it for organizational decision-making, performance improvement, cost management, and risk mitigation.Adopting an....
Release Date 2018/09 -
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Author Eric C. Thompson
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and....
Release Date 2018/09 -
Author Hillary Sanders , Joshua Saxe
"Security has become a ""big data"" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, ....
Release Date 2018/09 -
Building a Successful Social Venture
Author James Koch , Eric Carlson
This is the first book on creating and running a social enterprise to combine theoretical discussions with current cases from around the world, filling a huge gap in the literature. It serves as an eminently practical blueprint for those who wish to build, sus....
Release Date 2018/09 -
Author Deborah Hicks Midanek
Boards of directors are sitting ducks. Shareholders complain and even attack, management manipulates, and individual board members have little power, able to act only as part of the board as a whole. Governance issues are front and center, yet there is often little....
Release Date 2018/09 -
Hands-On Bug Hunting for Penetration Testers
Author Joseph Marshall
Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.Key FeaturesLearn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book Desc....
Release Date 2018/09 -
Author Sairam Jetty
Discover network vulnerabilities and threats to design effective network security strategiesKey FeaturesPlunge into scanning techniques using the most popular tools Effective vulnerability assessment techniques to safeguard network infrastructure Explore the Nmap S....
Release Date 2018/09 -
CompTIA Security+ Certification Guide
Author Ian Neil
This is a practical certification guide covering all the exam topics in an easy-to-follow manner backed with mock tests and self-assesment scenarios for better preparation.Key FeaturesLearn cryptography and various cryptography algorithms for real-world implementat....
Release Date 2018/09 -
Author Sunny Wear
Get hands-on experience in using Burp Suite to execute attacks and perform web assessmentsKey FeaturesExplore the tools in Burp Suite to meet your web infrastructure security demands Configure Burp to fine-tune the suite of tools specific to the target Use Burp ext....
Release Date 2018/09 -
Formation Control of Multiple Autonomous Vehicle Systems
Author Bo Zhu , Hugh H. T. Liu
This text explores formation control of vehicle systems and introduces three representative systems: space systems, aerial systems and robotic systemsFormation Control of Multiple Autonomous Vehicle Systems offers a review of the core concepts of dynamics and contr....
Release Date 2018/08 -
CompTIA IT Fundamentals (ITF+) Study Guide, 2nd Edition
Author Quentin Docter
NOTE: The name of the exam has changed from IT Fundamentals to IT Fundamentals+ (ITF+). However, the FC0-U61 exam objectives are exactly the same. After the book was printed with IT Fundamentals in the title, CompTIA changed the name to IT Fundamentals+ (ITF+). We ....
Release Date 2018/08 -
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Author Carey Parker
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure ....
Release Date 2018/08 -
How Open Source Ate Software: Understand the Open Source Movement and So Much More
Author Gordon Haff
Learn how free software became open source and how you can sell open source software. This book provides a historical context of how open source has thoroughly transformed how we write software, how we cooperate, how we communicate, how we organize, and, ultimately....
Release Date 2018/08 -
Business Analyst - Careers in Business Analysis
Author Adrian Reed
Business analysis is a crucial discipline for organisational success, it enables organisations to rise to the challenges presented by today's increasing pace of change. It is a broad field and has matured into a profession of its own, with its own unique career ro....
Release Date 2018/08