-
CompTIA PenTest+ Certification Passport (Exam PT0-001)
Author Heather Linn
This effective self-study guide serves as an accelerated review of all exam objectives for the CompTIA PenTest+ certification examThis concise, quick-review test preparation guide offers 100% coverage of all exam objectives for the new CompTIA PenTest+ exam. Design....
Release Date 2020/02 -
CompTIA Cloud Essentials+ Certification Study Guide, Second Edition (Exam CLO-002), 2nd Edition
Author Daniel Lachance
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The best IT certification exam study system availableFilled with hands-on ex....
Release Date 2020/02 -
Author Eric C. Thompson
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecu....
Release Date 2020/02 -
Security Operations in Practice
Author Mike Sheward
This book walks you through how to establish and grow a strong security operations team, including hiring the right people, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a ....
Release Date 2020/02 -
Mastering Linux Security and Hardening - Second Edition
Author Donald A. Tevault
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a L....
Release Date 2020/02 -
Cyber Warfare - Truth, Tactics, and Strategies
Author Dr. Chase Cunningham , Gregory J. Touhill
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy based on current and past ....
Release Date 2020/02 -
Tribe of Hackers Security Leaders
Author Marcus J. Carey , Jennifer Jin
Tribal Knowledge from the Best in Cybersecurity LeadershipThe Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential securit....
Release Date 2020/03 -
CISA Certified Information Systems Auditor Practice Exams
Author Peter H. Gregory
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Hundreds of accurate practice questions that cover every topic on the latest versio....
Release Date 2020/03 -
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
Author Graham Thompson
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This effective study guide provides 100% coverage of every topic on the challenging....
Release Date 2020/03 -
Cybersecurity for Space: Protecting the Final Frontier
Author Jacob G. Oakley
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must ....
Release Date 2020/03 -
Author Stephen Bussey
Give users the real-time experience they expect, by using Elixir and Phoenix Channels to build applications that instantly react to changes and reflect the application's true state. Learn how Elixir and Phoenix make it easy and enjoyable to create real-time applications ....
Release Date 2020/03 -
Cyber Security: Essential principles to secure your organisation
Author Alan Calder
Cyber Security – Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks.
Release Date 2020/03 -
Cybersecurity Attacks – Red Team Strategies
Author Johann Rehberger
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team program Leve....
Release Date 2020/03 -
31 Days Before your CCNA Exam: A Day-By-Day Review Guide for the CCNA 200-301 Certification Exam
Author Allan Johnson
31 Days Before Your CCNA Exam: A Day-By-Day Review Guide for the CCNA 200-301 Certification Exam is the friendliest, most practical way to understand the CCNA Routing & Switching certification process, commit to taking your CCNA 200-301 exam, and finish your pr....
Release Date 2020/04 -
Author Heather E. McGowan , Chris Shipley , Thomas L. Friedma
A guide for individuals and organizations navigating the complex and ambiguous Future of WorkForeword by New York Times columnist and best-selling author Thomas L. FriedmanTechnology is changing work as we know it. Cultural norms are undergoing tectonic shifts. A global p....
Release Date 2020/04 -
Securing Cloud Services - A pragmatic approach, second edition
Author Lee Newcombe
Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated wi....
Release Date 2020/04 -
Digital Forensics with Kali Linux - Second Edition
Author Shiva V. N. Parasram
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety o....
Release Date 2020/04 -
Practical Mobile Forensics - Fourth Edition
Author Rohit Tamma , Oleg Skulkin , Heather Mahalik
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenariosKey FeaturesApply advanced forensic techniques to recover deleted data from mobile devices Retrieve and analyze data ....
Release Date 2020/04 -
Author William Oettinger
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensics to acquire and secure digital evidence skillfully Conduct a digital fo....
Release Date 2020/04 -
Metasploit 5.0 for Beginners - Second Edition
Author Sagar Rahalkar
A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilitiesKey FeaturesPerform pentesting in highly secured environments with Metasploit 5.0 Become well-versed with th....
Release Date 2020/04 -
The Handbook of Board Governance, 2nd Edition
Author Richard Leblanc
The revised new edition of the must-read guide for executives—provides comprehensive coverage of topics in corporate governance by leading subject-matter expertsThe Handbook of Board Governance is the marketing-leading text on public, nonprofit, and private board governan....
Release Date 2020/05 -
Penetration Testing For Dummies
Author Robert Shimonski
Target, test, analyze, and report on security vulnerabilities with pen testingPen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It ....
Release Date 2020/05 -
Hands-On Web Penetration Testing with Metasploit
Author Harpreet Singh , Himanshu Sharma
Identify, exploit, and test web application security with easeKey FeaturesGet up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerab....
Release Date 2020/05 -
Cybersecurity Threats, Malware Trends, and Strategies
Author Tim Rains
After scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor provides unique insights on the evolution of the threat landscape and how enterprises can address modern cybersecurity challenges.Key FeaturesProtect your organization ....
Release Date 2020/05 -
Author Malcolm McDonald
The world has changed. Today, every time you make a site live, you’re opening it up to attack.A first-time developer can easily be discouraged by the difficulties involved with properly securing a website. But have hope: an army of security researchers is out there discov....
Release Date 2020/06 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Morey J. Haber
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization wi....
Release Date 2020/06 -
Author Andrew Hoffman
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both defensive and offensive security concepts that software engineers can easily ....
Release Date 2020/06 -
ISO22301: 2019 - An introduction to a business continuity management system (BCMS)
Author Alan Calder
Understand the basics of business continuity and ISO 22301:2019 with this concise pocket guide, which will help you ensure your organisation can continue to operate in the event of a disruption.
Release Date 2020/06 -
Mastering Metasploit - Fourth Edition
Author Nipun Jaswal
Discover the next level of network defense and penetration testing with the Metasploit 5.0 frameworkKey FeaturesMake your network robust and resilient with this updated edition covering the latest pentesting techniques Explore a variety of entry points to compromise a sy....
Release Date 2020/06