-
CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide, Second Edition
Author Robin Abernathy , Troy McMillan
Learn, prepare, and practice for CompTIA Advanced Security Practitioner (CASP) CAS-003 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner.Master CompTIA A....
Release Date 2018/05 -
CompTIA Security+ Practice Tests
Author Chuck Easttom , S. Russell Christy
1,000 Challenging practice questions for Exam SY0-501CompTIA Security+ Practice Tests provides invaluable practice for candidates preparing for Exam SY0-501. Covering 100% of exam objectives, this book provides 1,000 practice questions to help you test your knowled....
Release Date 2018/05 -
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
Author Darril Gibson , James M Stewart , Mike Chapple
CISSP Study Guide - fully updated for the 2018 CISSP Body of KnowledgeCISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex....
Release Date 2018/05 -
Systems Leadership, 2nd Edition
Author Karl Stewart , Catherine Burke , Ian Macdonald
The new edition of this influential and bestselling book is concerned with how people come together to achieve a productive purpose. Survival and success in business and social terms have always depended upon our ability to form and sustain social organisations. Pe....
Release Date 2018/05 -
Fixing an Insecure Software Life Cycle
Author April C. Wright
In the race to remain competitive, development teams in many companies are under tremendous pressure to create software on tight deadlines. And in most cases, that means dealing with security bugs only after software is released. But offensive testing and incident ....
Release Date 2018/05 -
Author Michael Collins
Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company’s network. In many organizations, security analysts initiate threat hunting when they spot something weird—network conditions or activ....
Release Date 2018/05 -
Author Ajay Singh Chauhan
Get more from your network by securing its infrastructure and increasing its effectivenessAbout This BookLearn to choose the best network scanning toolset for your systemImplement different concepts of network scanning such as port scanning and OS detectionAdapt a ....
Release Date 2018/05 -
Mastering Metasploit - Third Edition
Author Nipun Jaswal
Discover the next level of network defense with the Metasploit frameworkAbout This BookGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop exploits, and generate modules ....
Release Date 2018/05 -
Mastering pfSense - Second Edition
Author David Zientara
Install and configure a pfSense router/firewall, and become a pfSense expert in the process.About This BookYou can always do more to secure your software ? so extend and customize your pfSense firewallBuild a high availability security system that's fault-tolerant....
Release Date 2018/05 -
Python Penetration Testing Essentials
Author Mohit
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.About This BookDetect and avoid various attack types that put the privacy of a ....
Release Date 2018/05 -
Doing Business in the United States
Author Andrew Rohm , Matthew Stefl , Anatoly Zhuplev
This book serves as a concise guide for businesses seeking to enter the U.S. market from an international perspective. The book examines how the United States is positioned in the global marketplace, the potential for businesses entering the U.S. market, and market....
Release Date 2018/05 -
Author Mark Redmond
Social decentering theory was developed in response to the confusion created by the use of the term empathy and to a lesser extent, perspective-taking, to reflect a wide and varied set of human cognitive processes and behaviors. Theory of Social Decentering: A Theo....
Release Date 2018/05 -
Environment Modeling-Based Requirements Engineering for Software Intensive Systems
Author Zhi Jin
Environment Modeling-Based Requirements Engineering for Software Intensive Systems provides a new and promising approach for engineering the requirements of software-intensive systems, presenting a systematic, promising approach to identifying, clarifying, modeling....
Release Date 2018/04 -
Network Defense and Countermeasures: Principles and Practices, Third edition
Author Chuck Easttom
All you need to know about defending networks, in one bookClearly explains concepts, terminology, challenges, tools, and skillsCovers key security standards and models for business and governmentThe perfect introduction for all network/computer security professiona....
Release Date 2018/04 -
Author Andrei Miroshnikov
Go deep into Windows security tools to implement more robust protocols and processesWindows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Microsoft security p....
Release Date 2018/04 -
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition
Author Stephen Sims , Ryan Linn , Branko Spasojevic , Jonathan Ness , Chris Eagle , Allen Ha
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker’s....
Release Date 2018/04 -
The Practitioner's Guide to POLCA
Author Rajan Suri
POLCA (Paired-cell Overlapping Loops of Cards with Authorization) is a card-based visual control system that manages the flow of jobs through the shop floor: at each operation, it controls which job should be worked on next to meet delivery targets. POLCA ensures t....
Release Date 2018/04 -
Distributed Denial of Service (DDoS)
Author Rich Groves , Eric Chou
Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to ....
Release Date 2018/04 -
Author Andy Still
Automated traffic is a major factor in the modern internet, especially for website owners. Bots, spiders, and scrapers now exceed the amount of traffic from human users, and this trend is expected to continue in the number and sophistication of bot types. With this....
Release Date 2018/04 -
Author Chad Russell
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security....
Release Date 2018/04 -
Author Dr. Erdal Ozkaya
Improve information security by learning Social Engineering.About This BookLearn to implement information security using social engineeringGet hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so onPractical approac....
Release Date 2018/04 -
Author Hussam Khrais
Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming languageAbout This BookComprehensive information on building a web application penetration testing framework using PythonMaster....
Release Date 2018/04 -
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits, First edition
Author William Easttom
The perfect introduction to pen testing for all IT professionals and studentsClearly explains key concepts, terminology, challenges, tools, and skillsCovers the latest penetration testing standards from NSA, PCI, and NISTWelcome to today’s most useful and practical....
Release Date 2018/03 -
Network Meta-Analysis for Decision-Making
Author Alexander J. Sutton , Jeroen P. Jansen , Nicky J. Welton , A. E. Ades , Sofia Dias
A practical guide to network meta-analysis with examples and codeIn the evaluation of healthcare, rigorous methods of quantitative assessment are necessary to establish which interventions are effective and cost-effective. Often a single study will not provide the ....
Release Date 2018/03 -
CISM Certified Information Security Manager All-in-One Exam Guide
Author Peter H. Gregory
This effective study guide provides 100% coverage of every topic on the latest version of the CISM examWritten by an information security executive consultant, experienced author, and university instructor, this highly effective integrated self-study system enables....
Release Date 2018/03 -
CCSP Certified Cloud Security Professional Practice Exams
Author Daniel Carter
Don’t Let the Real Test Be Your First Test!This highly effective self-study guide covers all six domains of the challenging Certified Cloud Security Professional exam as well as the CCSP Common Body of Knowledge, developed by the International Information Systems S....
Release Date 2018/03 -
The Routledge Companion to Trust
Author Sim B. Sitkin , Ann-Marie I. Nienaber , Rosalind H. Searle
In recent years, trust has enjoyed increasing interest from a wide range of parties, including organizations, policymakers, and the media. Perennially linked to turbulence and scandals, the damaging and rebuilding of trust is a contemporary concern affecting all are....
Release Date 2018/03 -
Trust Building and Boundary Spanning in Cross-Border Management
Author Michael Zhang
This edited book addresses two critical issues in international management: building trust and managing boundary spanning activities between international business partners. The duel-process of internationalization of multinational corporations (MNCs), through globalisati....
Release Date 2018/03 -
Author Kumaraguru Velmurugan , Mounir Hahad , Abhijit Mohanta
Your one-stop guide to know digital extortion and it's prevention.About This BookA complete guide to how ransomware worksBuild a security mechanism to prevent digital extortion.A practical approach to knowing about, and responding to, ransomware.Who This Book Is F....
Release Date 2018/03 -
Author Wilson Bautista Jr.
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.About This BookIntelligence processes and procedures for response mechanismsMaster F3EAD to drive processes based on intelligenceThreat modeling and intelligent framewo....
Release Date 2018/03