-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition
CISSP Study Guide - fully updated for the 2021 CISSP Body of Knowledge (ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exa.... -
Author Ric Messier
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book cov....
Release Date 2018/07 -
Cybersecurity - Attack and Defense Strategies
Author Erdal Ozkaya , Yuri Diogenes
Enhance your organization's secure posture by improving your attack and defense strategiesAbout This BookGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.Learn to unique te....
Release Date 2018/01 -
CCNA Cybersecurity Operations Companion Guide, First Edition
Author Cisco Networking Academy
CCNA Cybersecurity Operations Companion Guide is the official supplemental textbook for the Cisco Networking Academy CCNA Cybersecurity Operations course.The course emphasizes real-world practical application, while providing opportunities for you to gain the skill....
Release Date 2018/06 -
Author Ron Taylor , Omar Santos
Learn, prepare, and practice for CompTIA Pentest+ PT0-001 exam success with this CompTIA Cert Guide from Pearson IT Certification, a leader in IT Certification.Master CompTIA Pentest+ PT0-001 exam topicsAssess your knowledge with chapter-ending quizzesReview key co....
Release Date 2019/01 -
Computer Forensics JumpStart, Second Edition
Author Diane Barrett , Neil Broom , Ed Tittel , K Rudolph , Michael G. Solomon
Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer....
Release Date 2011/03 -
Author Ric Messier
Intensively hands-on training for real-world network forensicsNetwork Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, y....
Release Date 2017/08 -
Hands-On Application Penetration Testing with Burp Suite
Author Riyaz Ahemed Walikar , Dhruv Shah , Carlos A. Lozano
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilitiesKey FeaturesMaster the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intru....
Release Date 2019/02 -
Introduction to Cryptography with Coding Theory, 3rd Edition
Author Lawrence C. Washington , Wade Trappe
None Show and hide more
Release Date -0001/11 -
Modern Control System Theory and Design, 2nd Edition
Author Stanley M. Shinners
The definitive guide to control system designModern Control System Theory and Design, Second Edition offers the most comprehensive treatment of control systems available today. Its unique text/software combination integrates classical and modern control system theor....
Release Date 1998/05 -
Author Doug Barth , Evan Gilman
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar ....
Release Date 2017/07 -
CISSP®: Certified Information Systems Security Professional Study Guide, Fifth Edition
Author Mike Chapple , Ed Tittel , James Michael Stewart
Totally updated for 2011, here's the ultimate study guide for the CISSP examConsidered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive stu....
Release Date 2011/01 -
Systems Leadership, 2nd Edition
Author Karl Stewart , Catherine Burke , Ian Macdonald
The new edition of this influential and bestselling book is concerned with how people come together to achieve a productive purpose. Survival and success in business and social terms have always depended upon our ability to form and sustain social organisations. Pe....
Release Date 2018/05 -
Scene of the Cybercrime, 2nd Edition
Author Michael Cross , Debra Littlejohn Shinder
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the firs....
Release Date 2008/07 -
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us
Author Eugene H. Spafford , Leigh Metcalf , Josiah Dykstra
175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct ThemCybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the wor....
Release Date 2023/02 -
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Author Sagar Rahalkar
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanni....
Release Date 2018/11 -
CompTIA Security+ Certification Study Guide: Network Security Essentials
Author Ahmed F. Sheikh
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and yo....
Release Date 2020/09 -
Principles of Data Management - Facilitating information sharing Second edition
Author Keith Gordon
Data is a valuable corporate asset and its effective management can be vital to an organisation's success. This professional guide covers all the key areas of data management, including database development and corporate data modelling. It is business-focused, prov....
Release Date 2013/11 -
Practical Mobile Forensics - Third Edition
Author Heather Mahalik , Satish Bommisetty , Oleg Skulkin , Rohit Tamma
Investigate, analyze, and report iOS, Android, and Windows devicesAbout This BookGet hands-on experience in performing simple to complex mobile forensics techniques.Retrieve and analyze data stored not only on mobile devices but also through the cloud and other conn....
Release Date 2018/01 -
Mobile Location Services: The Definitive Guide
Author Andrew Jagoe
The first comprehensive guide to building and deploying mobile location-based servicesDetailed coverage of mobile location servers, client platforms, protocols, and standardsMapping, geocoding, mobile positioning, security, personalization, privacy, and moreForeword....
Release Date 2002/12 -
TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
Author Shawn Porter , Debra Littlejohn Shinder , Mike Chapple
TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at individuals with 2 or more years of computer security experience or training equivalent to 48 hours in a 24 month period. TICSA represents base l....
Release Date 2002/09 -
CISSP Exam Cram, Second Edition
Author Michael Gregg
Updated for 2009Covers the critical information you’ll need to know to score higher on your CISSP exam!Build and manage an effective, integrated security architectureSystematically protect your physical facilities and the IT resources they containImplement and admin....
Release Date 2009/03 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002, Second Edition
Author Michael Gregg
CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 examCASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition of the bestselling book covering the CASP certificat....
Release Date 2014/10 -
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
Author Darril Gibson , James M Stewart , Mike Chapple
CISSP Study Guide - fully updated for the 2018 CISSP Body of KnowledgeCISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex....
Release Date 2018/05 -
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests
Author David Seidl , Mike Chapple
Smarter, faster prep for the SSCP exam(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests is the only (ISC)2-endorsed set of questions for the SSCP exam. With SSCP certification, you will meet Department of Defense requirements for entry-lev....
Release Date 2019/01 -
A Complete Guide to Burp Suite : Learn to Detect Application Vulnerabilities
Author Sagar Rahalkar
Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps.Burp Suite is a simple, yet powerful, tool used for a....
Release Date 2020/11 -
Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the im....