-
Kali Linux - An Ethical Hacker's Cookbook
Author Himanshu Sharma
Over 120 recipes to perform advanced penetration testing with Kali LinuxAbout This BookPractical recipes to conduct effective penetration testing using the powerful Kali LinuxLeverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities wi....
Release Date 2017/10 -
Author Adolfo Eloy Nascimento
Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies.About This BookInteract with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google.Use Spring Security and Spring Securit....
Release Date 2017/10 -
Author Pascal Ackerman
Your one-step guide to understanding industrial cyber security, its control systems, and its operations.About This BookLearn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devicesFilled ....
Release Date 2017/10 -
Nine Steps to Success: North American edition - An ISO 27001 Implementation Overview
Author Alan Calder
Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard....
Release Date 2017/10 -
Healthcare Information Technology Exam Guide for CHTS and CAHIMS Certifications, 2nd Edition
Author John Mattison , Brian Gugerty , Kathleen A. McCormick
This effective study resource delivers complete coverage of all topics on the newest versions of these challenging HIT examsThis comprehensive self-study guide fully prepares candidates for the Certified Associate in Healthcare Information and Management Systems (C....
Release Date 2017/09 -
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001)
Author Brent Chapman , Fernando Maymi
This comprehensive self-study guide offers complete coverage of the new CompTIA Cybersecurity Analyst+ certification examNote: This guide has been updated to reflect CompTIA's exam acronym CySA+.This highly effective self-study system provides complete coverage of....
Release Date 2017/09 -
Ethical Hacking and Penetration Testing Guide
Author Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret ....
Release Date 2017/09 -
Author Douglas B. Laney
Many senior executives talk about information as one of their most important assets, but few behave as if it is. They report to the board on the health of their workforce, their financials, their customers, and their partnerships, but rarely the health of their inf....
Release Date 2017/09 -
Author Laura Bell , Jim Bird , Rich Smith , Michael Brunton-Spall
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren’t up to speed in their understandin....
Release Date 2017/09 -
Network Security Through Data Analysis, 2nd Edition
Author Michael Collins
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for col....
Release Date 2017/09 -
Python Digital Forensics Cookbook
Author Chapin Bryce , Preston Miller
Over 60 recipes to help you learn digital forensics and leverage Python scripts to amplify your examinationsAbout This BookDevelop code that extracts vital information from everyday forensic acquisitions.Increase the quality and efficiency of your forensic analysis....
Release Date 2017/09 -
Kali Linux Cookbook - Second Edition
Author Bob Perciaccante , Corey P. Schultz
Over 80 recipes to effectively test your network and boost your career in securityAbout This BookLearn how to scan networks to find vulnerable computers and serversHack into devices to control them, steal their data, and make them yoursTarget wireless networks, dat....
Release Date 2017/09 -
Social dilemmas, institutions, and the evolution of cooperation
Author Wojtek Przepiorka , Ben Jann
The question of how cooperation and social order can evolve from a Hobbesian state of nature of a “war of all against all” has always been at the core of social scientific inquiry. Social dilemmas are the main analytical paradigm used by social scientists to explai....
Release Date 2017/09 -
Author Ric Messier
Intensively hands-on training for real-world network forensicsNetwork Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, y....
Release Date 2017/08 -
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501), 3rd Edition
Author Glen E. Clarke , Daniel Lachance
This fully updated, exam-focused study aid covers everything you need to know and shows you how to prepare for the CompTIA Security+ examWith hundreds of practice exam questions, including difficult performance-based questions, CompTIA Security+® Certification Stud....
Release Date 2017/08 -
System Forensics, Investigation, and Response, 3rd Edition
Author Chuck Easttom
Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! System Forensics, Investigation, and Response, Third Edition examines the fundamentals concepts readers must know as they prepare for a career in the cutting-edge field of syste....
Release Date 2017/08 -
Intelligence-Driven Incident Response
Author Scott J. Roberts , Rebekah Brown
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly und....
Release Date 2017/08 -
Author Scar de Courcier , Oleg Skulkin
Maximize the power of Windows Forensics to perform highly effective forensic investigationsAbout This BookPrepare and perform investigations using powerful tools for Windows,Collect and validate evidence from suspects and computers and uncover clues that are otherw....
Release Date 2017/08 -
Linux Hardening in Hostile Networks: Server Security from TLS to Tor
Author Kyle Rankin
Implement Industrial-Strength Security on Any Linux ServerIn an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-fa....
Release Date 2017/07 -
Author André Årnes
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical fieldWritten by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab)....
Release Date 2017/07 -
What's Wrong with Damn Near Everything!
Author Larry Winget
The Pitbull of Personal Development® Takes on Damn Near Everything!Larry Winget does not mince words, and in this latest addition to his straight-talking brand, one of the most iconic leaders of the personal development industry puts down in black and white, What'....
Release Date 2017/07 -
High-Speed Precision Motion Control
Author Justin Khiang Pang , Mitsuo Hirata , Takashi Yamaguchi
Edited by Takashi Yamaguchi, Mitsuo Hirate, and Chee Khiang Pang, with contributions from pioneers known for their ground-breaking work, High-Speed Precision Motion Control discusses high-precision and fast servo controls in hard disk drives (HDDs). The chapter auth....
Release Date 2017/07 -
Author Le Nguyen Binh
With coherent mixing in the optical domain and processing in the digital domain, advanced receiving techniques employing ultra-high speed sampling rates have progressed tremendously over the last few years. These advances have brought coherent reception systems for ....
Release Date 2017/07 -
Incident Management for Operations
Author Rob Schnepp , Chris Hawley , Ron Vidal
Are you satisfied with the way your company responds to IT incidents? How prepared is your response team to handle critical, time-sensitive events such as service disruptions and security breaches? IT professionals looking for effective response models have successf....
Release Date 2017/07 -
Author Doug Barth , Evan Gilman
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar ....
Release Date 2017/07 -
Educating Social Entrepreneurs, Volume I
Author Maria Aggestam , Paul Miesing
Educating Social Entrepreneurs: From Idea Generation to Business Plan Formulation appears at a time of unprecedented environmental disasters, natural resources depletion, and significant failure of governments and global businesses to attend to worldwide social pro....
Release Date 2017/07 -
Educating Social Entrepreneurs, Volume II
Author Maria Aggestam , Paul Miesing
Educating Social Entrepreneurs: From Business Plan Formulation to Implementation appears at a time of unprecedented environmental disasters, natural resources depletion, and significant failure of governments and global businesses to attend to worldwide social prob....
Release Date 2017/07 -
Digital Forensics and Incident Response
Author Gerard Johansen
A practical guide to deploying digital forensic techniques in response to cyber security incidentsAbout This BookLearn incident response fundamentals and create an effective incident response frameworkMaster forensics investigation utilizing digital investigative t....
Release Date 2017/07 -
Author Sagar Rahalkar
An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics.About This BookCarry out penetration testing in highly-secured envir....
Release Date 2017/07 -
A Primer on Corporate Governance
Author Alessandro Zattoni , Andrea Melis
This book provides an understanding of the characteristics of corporate governance in Italy, one of the most developed countries in the world, symbol of the family capitalism. The text presents the main peculiarities of the Italian corporate governance system, its ....
Release Date 2017/06