-
Author Chris Brogan , Julien Smith
The 10th Anniversary Edition of Trust Agents helps companies get back on track in their efforts to build reputation, attention, and trust In the years since authors Chris Brogan and Julien Smith first released their groundbreaking book Trust Agents, social media....
Release Date 2020/07 -
Cyber Breach Response That Actually Works
Author Andrew Gorecki
You will be breached—the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But....
Release Date 2020/07 -
CompTIA CySA+ Study Guide Exam CS0-002, 2nd Edition
Author Mike Chapple , David Seidl
This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics!Where can you find 100% coverage of the revised CompTIA Cybersecurity Analyst+ (CySA+) e....
Release Date 2020/07 -
Author Theodore J. Sarenski
The long-term future of the American Social Security system which provides retirement, disability, and survivor benefits to millions, is uncertain. This is triggering big concerns for many workers who are paying into the system and need to make decisions about their retir....
Release Date 2020/07 -
Author Scott Davis , Carter Copeland , Rob Wertheimer
Three top Wall Street analysts reveal enduring lessons in sustainable success from the great industrial titans—the high-tech companies of their day—to the disruptors that now dominate the economy.Before Silicon Valley disrupted the world with new technologies and business....
Release Date 2020/07 -
Mastering Windows Security and Hardening
Author Mark Dunkerley , Matt Tumbarello
Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and A....
Release Date 2020/07 -
Author Chris Eagle , Kara Nance
The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency’s most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the wo....
Release Date 2020/08 -
Implementing Cryptography Using Python
Author Shannon W. Bray
Learn to deploy proven cryptographic tools in your applications and servicesCryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cr....
Release Date 2020/08 -
Author Charles Read
The Payroll Book is the only book that demystifies payroll with clear, concise, and real-world examples on how to tackle the process."The Payroll Book will be a valuable resource for the small business owner as well as for the entrepreneur planning a new venture. Thorough....
Release Date 2020/08 -
Author Tara Powers
Create a space for a healthy work–life balanceStay connected with Slack, Zoom, and Microsoft TeamsMaintain productivity and stay healthy and saneWorking from home is the new normalWorking from home was already on the rise, but when COVID-19 hijacked our reality, it became....
Release Date 2020/08 -
GCIH GIAC Certified Incident Handler All-in-One Exam Guide
Author Nick Mitropoulos
This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler examPrepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide. Written by a reco....
Release Date 2020/08 -
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will.... -
Author Jennifer C. Wolfe
No boardroom in any industry is safe from new market threats in this time of rapid technological growth. We’ve all heard the stories of corruption by CEOs at WeWork and Theranos and witnessed whistleblowers revealing crises at Wells Fargo and Uber. The board’s responsibil....
Release Date 2020/08 -
Microservices Security in Action
Author Wajjakkara Kankanamge Anthony Nuwan Dias , Prabath Siriwardena
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you’ve learned i....
Release Date 2020/08 -
CISA - Certified Information Systems Auditor Study Guide
Author Hemang Doshi
This CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA's latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questionsKey FeaturesGain tactical skills in auditing, con....
Release Date 2020/08 -
The Complete Coding Interview Guide in Java
Author Anghel Leonard
Explore a wide variety of popular interview questions and learn various techniques for breaking down tricky bits of code and algorithms into manageable chunksKey FeaturesDiscover over 200 coding interview problems and their solutions to help you secure a job as a Java dev....
Release Date 2020/08 -
Exam Ref MS-500 Microsoft 365 Security Administration
Author Ed Fisher , Nate Chamberlain
Prepare for Microsoft Exam MS-500: Demonstrate your real-world knowledge of Microsoft 365 security implementation and administration, including identity, access, threat and information protection, governance, and compliance. Designed for professionals with Microsoft secur....
Release Date 2020/09 -
Author Matthew Hickey , Jennifer Arcuri
A fast, hands-on introduction to offensive hacking techniquesHands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author....
Release Date 2020/09 -
CCSP For Dummies with Online Practice
Secure your CSSP certificationCCSP is the world’s leading Cloud Security certification. It covers the advanced technical skills and knowledge to design, manage, and secure data, applications, and infrastructure in the cloud using best practices, policies, and procedures. If you’re a cloud secur.... -
CompTIA CySA+ Practice Tests, 2nd Edition
Author Mike Chapple , David Seidl
Efficiently prepare yourself for the demanding CompTIA CySA+ examCompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition offers readers the fastest and best way to prepare for the CompTIA Cybersecurity Analyst exam. With five unique chapter tests and two additional practi....
Release Date 2020/09 -
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
Author Sean P. Murphy
HCISPP® HealthCare Information Security and Privacy Practitioner All-in-One Exam GuidePrepare for the current release of the HealthCare Information Security and Privacy Practitioner (HCISPP) exam using the detailed information contained in this effective self-study resour....
Release Date 2020/09 -
Author Abhijit Mohanta , Anoop Saldanha
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engi....
Release Date 2020/09 -
CompTIA Security+ Certification Study Guide: Network Security Essentials
Author Ahmed F. Sheikh
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and yo....
Release Date 2020/09 -
Author Matthew J. Coles , Izar Tarandach
Threat modeling is one of the most essential—and most misunderstood—parts of the development lifecycle. Whether you’re a security practitioner or application developer, this book will help you gain a better understanding of core concepts and how to apply them to yo....
Release Date 2020/09 -
Author Tom Piens
Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platformKey FeaturesUnderstand how to optimally use PAN-OS featuresBuild firewall solutions to safeguard local, cloud, and mobile networksProtec....
Release Date 2020/09 -
Successful Cybersecurity Professionals
Author Dr. Steven Brown
This book provides a unique perspective into the mindset of psychology and cybersecurity.It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals’ behavior, but our b....
Release Date 2020/09 -
A Practical Guide to Digital Forensics Investigations, 2nd Edition
Author Darren R. Hayes
THE DEFINITIVE GUIDE TO DIGITAL FORENSICSNOW THOROUGHLY UPDATED WITH NEW TECHNIQUES, TOOLS, AND SOLUTIONSComplete, practical coverage of both technical and investigative skillsThoroughly covers modern devices, networks, and the InternetAddresses online and lab investigati....
Release Date 2020/10 -
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2nd Edition
Author Troy McMillan
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide is a best-of-breed exam study guide. Expert technology instructor and certification author Troy McMillan shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your co....
Release Date 2020/10