-
Modern Cryptography: Applied Mathematics for Encryption and Information Security
Author Chuck Easttom
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise requiredCryptography underpins today’s cyber-security; however, few information security professionals....
Release Date 2015/10 -
Author Wallace Jackson
This book is a brief primer covering concepts central to digital imagery, digital audio and digital illustration using open source software packages such as GIMP, Audacity and Inkscape. These are used for this book because they are free for commercial use. The book....
Release Date 2015/10 -
Author Ugo Mattei , Fritjof Capra
WINNER OF THE 2015 IBPA BENJAMIN FRANKLIN AWARD IN POLITICS/CURRENT EVENTSThe Ecology of Law Fritjof Capra and Ugo Mattei argue that at the root of many of the environmental, economic, and social crises we face today is a legal system based on an obsolete world....
Release Date 2015/10 -
Author Dr. Johann Uhrmann , Dr. Michael Spreitzenbarth
Master the art of digital forensics and analysis with PythonAbout This BookLearn to perform forensic analysis and investigations with the help of Python, and gain an advanced understanding of the various Python libraries and frameworksAnalyze Python scripts to extr....
Release Date 2015/10 -
Application Security in the ISO 27001:2013 Environment
Author Vinod Vasudevan
Web application security as part of an ISO 27001-compliant information security management system Web application vulnerabilities are a common point of intrusion for cyber criminals. As cybersecurity threats proliferate and attacks escalate, and as applications pl....
Release Date 2015/10 -
Author Christopher Elisan
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting....
Release Date 2015/09 -
Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security
Author Omar Santos
A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber securityToday’s world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibil....
Release Date 2015/09 -
Author Omar Santos , John Stuppi
CCNA Security 210-260 Official Cert GuideCCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security exp....
Release Date 2015/09 -
The Antivirus Hacker's Handbook
Author Elias Bachaalany , Joxean Koret
Hack your antivirus software to stamp out future vulnerabilitiesThe Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future ....
Release Date 2015/09 -
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition
Author Darril Gibson , Mike Chapple , James M. Stewart
CISSP Study Guide - fully updated for the 2015 CISSP Body of KnowledgeCISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex....
Release Date 2015/09 -
SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide
Author George Murphy
Fully updated Study Guide for the SSCPThis guide prepares you for the SSCP, Systems Security Certified Practitioner certification examination by focusing on the Common Body of Knowledge (CBK) as determined by ISC2 in seven high level topics. This Sybex Study ....
Release Date 2015/09 -
Official (ISC)2 Guide to the CSSLP
Author Mano Paul
As the global leader in information security education and certification, (ISC)2® has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP®) is a t....
Release Date 2015/09 -
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition, 4th Edition
Author Adam Gordon
As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. ....
Release Date 2015/09 -
Enterprise Security Architecture
Author Nicholas A Sherwood
Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software—it requires a fr....
Release Date 2015/09 -
Windows Malware Analysis Essentials
Author Victor Marak
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setAbout This BookSet the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malwareUnderstand ....
Release Date 2015/09 -
Learning Penetration Testing with Python
Author Christopher Duffy
Utilize Python scripting to execute effective and efficient penetration tests About This BookUnderstand how and where Python scripts meet the need for penetration testingFamiliarise yourself with the process of highlighting a specific methodology to exploit an envi....
Release Date 2015/09 -
Author Subir Varma
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms.The field of congestion control has seen....
Release Date 2015/08 -
The Network Security Test Lab: A Step-by-Step Guide
Author Michael Gregg
The ultimate hands-on guide to IT security and proactive defenseThe Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential g....
Release Date 2015/08 -
Network Attacks and Exploitation
Author Matthew Monte
Incorporate offense and defense for a more effective network security strategyNetwork Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. ....
Release Date 2015/08 -
The Compliance Revolution: How Compliance Needs to Change to Survive
Author David Jackman
The Compliance Revolution—Practical, Powerful Changes for Strategic Organizational ValueCompliance is absolutely critical in creating a robust and resilient organization, one which is trusted by clients and contributes to market stability. Firms must approach compl....
Release Date 2015/08 -
Getting a Coding Job For Dummies®
Author Nikhil Abraham
Your friendly guide to getting a job in codingGetting a Coding Job For Dummies explains how a coder works in (or out of) an organization, the key skills any job requires, the basics of the technologies a coding pro will encounter, and how to find formal or informal....
Release Date 2015/08 -
Can't Not Do: The Compelling Social Drive that Changes Our World
Author Paul Shoemaker
With so many social challenges facing our world, trying to effect change feels daunting. The problems are complex, the politics murky, and the players innumerable. Yet, every day there are regular heroes making a significant impact on our most intractable social is....
Release Date 2015/08 -
Author Claudia St. John , SPHR , SHRM-SCP
Human resources and management consultants are frequently asked to help their clients address fundamental breakdowns within their organizations. More often than not, these breakdowns occur between conflicting functional areas, such as sales and customer service, sa....
Release Date 2015/08 -
Professional Penetration Testing
Author Thomas Wilhelm
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability iden....
Release Date 2015/08 -
Learning zANTI2 for Android Pentesting
Author Miroslav Vitula
Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2About This BookUnderstand the basics of wireless penetration testing and its importanceLearn the techniques to perform penetration te....
Release Date 2015/08 -
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)
Author Mike Meyers
An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike MeyersIn Mike Meyers’ CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effect....
Release Date 2015/07 -
Author Mary M. Somerville
By fostering principles of systems thinking and informed learning though an inclusive, participatory design process that advances information exchange, reflective dialogue, and knowledge creation, the Informed Systems Approach promotes conceptual change in workplace....
Release Date 2015/07 -
Author Jayson E Street
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the worl....
Release Date 2015/07 -
Author Brian Tayan , David Larcker
This is the most comprehensive and up-to-date reference for implementing and sustaining superior corporate governance. Stanford corporate governance experts David Larcker and Bryan Tayan carefully synthesize current academic and professional research, summarizing wh....
Release Date 2015/07 -
Transformational Governance: How Boards Achieve Extraordinary Change
Author Katha Kissman , Beth Gazley
There has never been so much pressure on nonprofit boards of directors to achieve a level of accountability that meets public and stakeholder expectations. Member-serving association boards may be especially challenged by their more complex affiliate structures and....
Release Date 2015/07