-
Author Brian Honan , Jim Reavis , Raj Samani
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).For many years the CSA has been at the forefront of researc....
Release Date 2014/09 -
CSI Exam Cram™ 2 (Exam 642-541)
Author Annlee Hines
Security is Cisco's top priority in 2003 and few other resources are available for exam preparation on this topic!Industry experts expect the CCSP to be one of the most popular certifications in 2003.The CSI exam is the fifth and final exam required to obtain a CCS....
Release Date 2003/11 -
CSSLP Certification All-in-One Exam Guide
Author Daniel Shoemaker , Wm. Arthur Conklin
Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam. CSSLP All-in-One Exam Guide covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC2). Y....
Release Date 2013/12 -
CSSLP Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Daniel Paul Shoemaker , Wm. Arthur Conklin
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This self-study guide delivers 100% coverage of all domainsin the the CSSLP ....
Release Date 2019/03 -
CSSLP SECURE SOFTWARE LIFECYCLE PROFESSIONAL ALL-IN-ONE EXAM GUIDE, Third Edition, 3rd Edition
Author Wm. Arthur Conklin , Daniel Paul Shoemaker
Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the examCSSLP Certification All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certific....
Release Date 2022/02 -
CTS-D Certified Technology Specialist-Design Exam Guide
Author InfoComm International , Brad Grimes
Exclusively from McGraw-Hill Professional and InfoComm International, this exam guide covers the latest Certified Technology Specialist Design exam for AV professionals.CTS-D Certified Technology Specialist Design Exam Guide is a complete study system for the leadi....
Release Date 2016/04 -
CTS-I Certified Technology Specialist-Installation Exam Guide
Author InfoComm International
The Most Complete CTS-I Exam Study SystemPublished with InfoComm International, CTS-I Certified Technology Specialist-Installation Exam Guide provides comprehensive coverage of all exam objectives on the leading internationally recognized certification for audiovisu....
Release Date 2015/03 -
CTS-I Certified Technology Specialist-Installation Exam Guide, Second Edition, 2nd Edition
The Most Complete, Up-to-Date CTS-I Exam Study System Published with AVIXA™, CTS®-I Certified Technology Specialist-Installation Exam Guide, Second Edition provides comprehensive coverage of all exam objectives on the leading internationally recognized certification for audiovisual installation pr.... -
Author Iqbal Muhardianto , Digit Oktavianto
Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skillsUnderstand the risk of the rise of document-based malwareEnhance your malware analysis concepts through illustrations, tips and tricks, step-by-s....
Release Date 2013/10 -
Author Shane Green
HACK YOUR WORKPLACE CULTURE FOR GREATER PROFITS AND PRODUCTIVITY"I LOVE THIS BOOK!" —CHESTER ELTON, New York Times bestselling author of All In and What Motivates Me "When companies focus on culture, the positive effects ripple outward, benefiting not just employee....
Release Date 2017/04 -
Author Karen Pearlman
How does a film editor make decisions about where and when to cut in order to make a film 'feel right'? Generally speaking, the answer is, 'it's intuitive', which is accurate but leaves one wanting to know more. Cutting Rhythms breaks down the definition of int....
Release Date 2012/08 -
Author Karen Pearlman
There are many books on the technical aspects of film and video editing. Much rarer are books on how editors think and make creative decisions.Filled with timeless principles and thought-provoking examples from a variety of international films, the second edition o....
Release Date 2015/12 -
Author Wanda Pina , Norma Davila
Managers are flooded with theories, concepts, and ideas for how to improve employee engagement—but what works, and what doesn’t? This book helps managers cut through the clutter of all those strategies and find the one that works for them. Beginning with the myths a....
Release Date 2013/12 -
CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, 3rd Edition
Author David A. Westcott , David D. Coleman
Newly updated edition of this top-selling CWNA study guideSybex is the official publisher for CWNP, Inc., the organization behind the the CWNA certification. The new edition of Sybex's top-selling CWNA Study Guide covers the latest CWNA Exam, PW0-105. If you're pr....
Release Date 2012/05 -
Author Bryan E. Harkins , David A. Westcott , David D. Coleman
The most detailed, comprehensive coverage of CWSP-205 exam objectivesCWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objecti....
Release Date 2016/09 -
Cyber Breach Response That Actually Works
Author Andrew Gorecki
You will be breached—the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But....
Release Date 2020/07 -
Cyber Conflict: Competing National Perspectives
Author Daniel Ventre
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace cou....
Release Date 2012/05 -
Cyber Crime and Cyber Terrorism Investigator's Handbook
Author Francesca Bosco , Andrew Staniforth , Babak Akhgar
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become ....
Release Date 2014/07 -
Cyber Forensics: From Data to Digital Evidence
Author Albert J. Marcella , Frederic Guillossou
An explanation of the basic principles of dataThis book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operati....
Release Date 2012/05 -
Cyber Mayday and the Day After
Author Daniel Lohrmann , Shamane Tan
Successfully lead your company through the worst crises with this first-hand look at emergency leadershipCyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event....
Release Date 2021/11 -
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Author Mike O'Leary
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and....
Release Date 2019/03 -
Cyber Reconnaissance, Surveillance and Defense
Author Robert Shimonski
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being ....
Release Date 2014/10 -
Cyber resilience - Defence-in-depth principles
Author Alan Calder
This book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project.
Release Date 2023/08 -
Cyber Security and Digital Forensics
Author Mangesh M. Ghonge , Sabyasachi Pramanik , Ramchandra Mangrulkar , Dac-Nhuong Le
CYBER SECURITY AND DIGITAL FORENSICSCyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.Cur....
Release Date 2022/03 -
Cyber Security and IT Infrastructure Protection
Author John R. Vacca
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It ....
Release Date 2013/08 -
Cyber Security and Network Security
Author Sabyasachi Pramanik , Debabrata Samanta , M. Vinay , Abhijit Guha
CYBER SECUTIRY AND NETWORK SECURITYWritten and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly....
Release Date 2022/04 -
Cyber Security Engineering: A Practical Approach for Systems and Software Assurance
Author Carol C. Woody , Nancy R. Mead
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensi....
Release Date 2016/10 -
Cyber Security Policy Guidebook
Author Joseph Weiss , Jeffrey Schmidt , Marcus H. Sachs , Paul Rohmeyer , Jason Healey , Jen
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers ....
Release Date 2012/04 -
Author David Sutton
Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Release Date 2022/12 -
Cyber Security: Essential principles to secure your organisation
Author Alan Calder
Cyber Security – Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks.
Release Date 2020/03