-
Marine Genetic Resources, R&D and the Law 1
Author Bleuenn Guilloux
Advances in research and development reveal the immense diversity and potential of marine genetic resources. Under international law, no specific regime applies to these complex and paradoxical objects of use. The Law of the Sea Convention sets a framework that is ....
Release Date 2018/08 -
Network Vulnerability Assessment
Author Sagar Rahalkar
Build a network security threat model with this comprehensive learning guideKey FeaturesDevelop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastr....
Release Date 2018/08 -
Kali Linux Web Penetration Testing Cookbook - Second Edition
Author Gilberto Najera-Gutierrez
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab E....
Release Date 2018/08 -
Practical Linux Security Cookbook - Second Edition
Author Tajinder Kalsi
Enhance file system security and learn about network attack, security tools and different versions of Linux build.Key FeaturesHands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use v....
Release Date 2018/08 -
Author Jamie Sanbower , Mason Harris , Vivek Santuka , Aaron Woland
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protectionIntegrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in se....
Release Date 2018/07 -
Author Robin Abernathy , Troy McMillan
In this best-of-breed study guide, two leading experts help you master all the topics you need to know to succeed on your CISSP exam and advance your career in IT security. Their concise, focused approach explains every exam objective from a real-world perspective....
Release Date 2018/07 -
Social Engineering, 2nd Edition
Author Christopher Hadnagy
Harden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus softw....
Release Date 2018/07 -
Hacking For Dummies, 6th Edition
Author Kevin Beaver
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penet....
Release Date 2018/07 -
Author Ric Messier
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book cov....
Release Date 2018/07 -
Author Allan Liska , Stephen Gates
Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company’s vulnerabilities to common web application security th....
Release Date 2018/07 -
Author Marcus Gatto , Claire-Michelle Smyth
This text serves as an accessible introduction to the law of contract. The headings chosen for examination track the main points in the lifetime of a contract-from its formation, drafting, and onward to its eventual dissolution, whether this occurs due to the terms....
Release Date 2018/07 -
Hands-on Incident Response and Digital Forensics
Author Mike Sheward
Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what follows - a scientific investigation into the causes o....
Release Date 2018/07 -
Hands-On Penetration Testing on Windows
Author Phil Bramwell
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.Key FeaturesIdentify the vulnerabilities in your system using Kali Linux 2018.02 Discover the art of exploiting Windows kernel drivers Get ....
Release Date 2018/07 -
Learn Ethical Hacking from Scratch
Author Zaid Sabih
Learn how to hack systems like black hat hackers and secure them like security experts Key FeaturesUnderstand how computer systems work and their vulnerabilitiesExploit weaknesses and hack into machines to test their securityLearn how to secure systems from hackers....
Release Date 2018/07 -
Author David Zientara
Install, Configure and Setup different connections with pfSenseKey FeaturesBuild firewall and routing solutions with PfSense. Learn how to create captive portals, how to connect Pfsense to your https environment and so on. Practical approach towards building firew....
Release Date 2018/07 -
Author Manuj Aggarwal
Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your networkKey FeaturesExplore pfSense, a trusted open source network security solution Configure pfSense as a firewall and create and manage firewall ru....
Release Date 2018/07 -
Estimation and Control of Large-Scale Networked Systems
Author Tao Li , Keyou You , Tong Zhou
Estimation and Control of Large Scale Networked Systems is the first book that systematically summarizes results on large-scale networked systems. In addition, the book also summarizes the most recent results on structure identification of a networked system, attac....
Release Date 2018/06 -
CCNA Cybersecurity Operations Companion Guide, First Edition
Author Cisco Networking Academy
CCNA Cybersecurity Operations Companion Guide is the official supplemental textbook for the Cisco Networking Academy CCNA Cybersecurity Operations course.The course emphasizes real-world practical application, while providing opportunities for you to gain the skill....
Release Date 2018/06 -
Getting Started with z/OS Data Set Encryption
Author Andy Coulson Bill White Jacky Doll , Brad Habbershaw , Cecilia Carranza Lewis , Tho
AbstractThis IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/O....
Release Date 2018/06 -
CISSP Official (ISC)2 Practice Tests, 2nd Edition
Author David Seidl , Mike Chapple
Full-length practice tests covering all CISSP domains for the ultimate exam prepThe (ISC)2 CISSP Official Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain....
Release Date 2018/06 -
CISSP For Dummies, 6th Edition
Author Peter H. Gregory , Lawrence C. Miller
Secure your CISSP certification!If you’re a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass....
Release Date 2018/06 -
Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition, 5th Edition
Author Dwayne Williams , Roger L. Davis , Chuck Cothren , Greg White , Wm. Arthur Conklin
Fully updated computer security essentials—quality approved by CompTIALearn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbo....
Release Date 2018/06 -
Author Brad Hibbert , Morey J. Haber
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, ev....
Release Date 2018/06 -
Author Jeff Saperstein , Hunter Hastings
Given the rapid technological, organizational, and structural changes that challenge conventional institutions and economies, what is the future of work? The authors propose a path to seize opportunity for the individual worker and entrepreneur, who can be newly in....
Release Date 2018/06 -
CCNA Security 210-260 Certification Guide
Author Vijay Anandh , Michael Vinod , Glen D. Singh
Become a Cisco security specialist by developing your skills in network security and explore advanced security technologiesAbout This BookEnhance your skills in network security by learning about Cisco's device configuration and installationUnlock the practical as....
Release Date 2018/06 -
Author Monnappa K A
Understand malware analysis and its practical implementationAbout This BookExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactic....
Release Date 2018/06 -
Practical Web Penetration Testing
Author Gus Khawaja
Learn how to execute web application penetration testing end-to-endAbout This BookBuild an end-to-end threat model landscape for web application securityLearn both web application vulnerabilities and web intrusion testingAssociate network vulnerabilities with a web....
Release Date 2018/06 -
Learning Python Web Penetration Testing
Author Christian Martorella
Leverage the simplicity of Python and available libraries to build web security testing tools for your applicationAbout This BookUnderstand the web application penetration testing methodology and toolkit using PythonWrite a web crawler/spider with the Scrapy librar....
Release Date 2018/06 -
Hands-On Cryptography with Python
Author Samuel Bowne
Learn to evaluate and compare data encryption methods and attack cryptographic systemsAbout This BookExplore popular and important cryptographic methodsCompare cryptographic modes and understand their limitationsLearn to perform attacks on cryptographic systemsWho ....
Release Date 2018/06