-
Author Scar de Courcier , Oleg Skulkin
Maximize the power of Windows Forensics to perform highly effective forensic investigationsAbout This BookPrepare and perform investigations using powerful tools for Windows,Collect and validate evidence from suspects and computers and uncover clues that are otherw....
Release Date 2017/08 -
Cisco Certified CyberOps Associate 200-201 Certification Guide
Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certificationKey FeaturesReceive expert guidance on how to kickstart your career in the cybersecurity industryGain hands-on experience while studying for the Cisco Certified CyberOps Associa.... -
Outsourcing Dilemma: The Search for Competitiveness, The
Author J. Brian Heywood
Outsourcing of some business functions pre-dates the technological revolution of the latter part of the 20th century. Nevertheless, 99 percent of outsourcing would not be logical or necessary if it were not for the constantly changing and improving technology.Despit....
Release Date 2001/09 -
Healthcare Information Technology Exam Guide for CHTS and CAHIMS Certifications, 2nd Edition
Author John Mattison , Brian Gugerty , Kathleen A. McCormick
This effective study resource delivers complete coverage of all topics on the newest versions of these challenging HIT examsThis comprehensive self-study guide fully prepares candidates for the Certified Associate in Healthcare Information and Management Systems (C....
Release Date 2017/09 -
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501), 2nd Edition
Author Scott Jernigan , Mike Meyers
A fully updated CompTIA Security+ exam guide from training and exam preparation expert Mike MeyersTake the CompTIA Security+ exam (exam SY0-501) with confidence using the comprehensive information contained in this highly effective study resource. Like the exam, th....
Release Date 2017/12 -
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
Author Shakeel Ali , Tedi Heriyanto , Lee Allen , Gerard Johansen , Damian Boodoo , Alex Sam
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth editionKey FeaturesRely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-....
Release Date 2018/10 -
Social Ontology of Whoness, 3rd Edition
Author Michael Eldred
How are core social phenomena to be understood as modes of being? This book offers an alternative approach to social ontology. Recent interest in social ontology on the part of mainstream philosophy and the social sciences presupposes from the outset that the human....
Release Date 2018/10 -
Author Robin Abernathy , Troy McMillan
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.Learn, prepare, and practice for CISSP exam success with the CISSP Cert Guide from Pearson IT Certification, a lea....
Release Date 2013/11 -
Author Peter Yaworski
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbu....
Release Date 2019/06 -
CEH: Certified Ethical Hacker Version 8 Study Guide
Author Sean-Philip Oriyano
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guideSecurity professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study....
Release Date 2014/08 -
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition, 4th Edition
Author Matt Walker
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Up-to-date coverage of every topic on the CEH v10 examThoroughly updated for....
Release Date 2019/03 -
Benefit Corporation Law and Governance
Author Frederick Alexander
Corporations with a ConscienceCorporations today are embedded in a system of shareholder primacy. Nonfinancial concerns—like worker well-being, environmental impact, and community health—are secondary to the imperative to maximize share price. Benefit corporat....
Release Date 2017/10 -
Demystifying Cryptography with OpenSSL 3.0
Author Alexei Khlebnikov , Jarle Adolfsen
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, digital signatures, SSL/TLS connectivity, and PKI handlingKey FeaturesSecure your applications against common network security threats using OpenSSLGet to grips with the ....
Release Date 2022/10 -
Reflexive Governance for Research and Innovative Knowledge
Author Marc Maesschalck
The governance theories that have developed over the past twenty years offer a new framework to consider and examine the collective conditions of a “Responsible Research and Innovation – RRI” linked up with the policy challenges of a society in transition in all ....
Release Date 2017/03 -
Author Nikhil Abraham
Coding For Dummies, (9781119293323) was previously published as Coding For Dummies, (9781118951309). While this version features a new Dummies cover and design, the content is the same as the prior release and should not be considered a new or updated product.Hands....
Release Date 2016/06 -
The Handbook of Board Governance, 2nd Edition
Author Richard Leblanc
The revised new edition of the must-read guide for executives—provides comprehensive coverage of topics in corporate governance by leading subject-matter expertsThe Handbook of Board Governance is the marketing-leading text on public, nonprofit, and private board governan....
Release Date 2020/05 -
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
Author Sanjib Sinha
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your....
Release Date 2019/11 -
70 Tips and Tricks for Mastering the CISSP Exam
Author R. Sarma Danturthi
Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick t....
Release Date 2020/11 -
Kali Linux Network Scanning Cookbook - Second Edition
Author Justin Hutchens , Michael Hixon
Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanningAbout This BookLearn the fundamentals behind commonly used scanning techniquesDeploy powerful scanning tools that are integrate....
Release Date 2017/05 -
Nine Steps to Success: North American edition - An ISO 27001 Implementation Overview
Author Alan Calder
Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard....
Release Date 2017/10 -
Hacker Techniques, Tools, and Incident Handling
Author Michael Gregg , Sean-Philip Oriyano
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about ....
Release Date 2010/10 -
Risk Management and ISO 31000 - A pocket guide
Author Alan Field
This pocket guide introduces the premise of RBT (risk-based thinking), exploring the principles outlined in the risk management standard, ISO 31000:2018. Understand the benefits of risk-based thinking and ISO 31000 with this pocket guide!
Release Date 2023/03 -
Learning Android Forensics - Second Edition
Author Rohit Tamma , Donnie Tindall , Oleg Skulkin
A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifactsKey FeaturesGet up and running with modern mobile forensic strategies and techniques Analyze the most popular Android applications using free and open source foren....
Release Date 2018/12 -
Adversarial Tradecraft in Cybersecurity
Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition.Key FeaturesGain an advantage against live hackers in a competition or real computing environmentUnderstand .... -
Mastering Windows Security and Hardening
Author Mark Dunkerley , Matt Tumbarello
Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and A....
Release Date 2020/07 -
Author Russell von Frank
Trust, it binds us together in our deepest most fulfilling relationships, attracts and retains the best employees, and turns clients into raving fans. Let me show you how to heal old wounds, become a sought out business leader to work for, and create a loyal following of ....
Release Date 2020/11 -
CompTIA Security+ Certification Practice Exams, Second Edition (Exam SY0-401), 2nd Edition
Author Glen E. Clarke , Daniel Lachance
Don't Let the Real Test Be Your First Test!Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.CompTI....
Release Date 2014/07 -
Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition
Author Aamir Lakhani , Joseph Muniz
Investigating the Cyber BreachThe Digital Forensics Guide for the Network EngineerUnderstand the realities of cybercrime and today’s attacksBuild a digital forensics lab to test tools and methods, and gain expertiseTake the right actions as soon as you discover a b....
Release Date 2018/02