-
Successful Cybersecurity Professionals
Author Dr. Steven Brown
This book provides a unique perspective into the mindset of psychology and cybersecurity.It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals’ behavior, but our b....
Release Date 2020/09 -
Computers and Information Processing for Business
Author Sergio S. Ribeiro
This book is an introduction to computers covering relevant topics that include: computers and society, the Internet, social media, Microsoft Office 2019, and high-level programming.The main goals are to help students to define computers and information processing and des....
Release Date 2020/10 -
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Author Aaron Woland , Panos Kampanakis , Omar Santos
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network securit....
Release Date 2016/06 -
CompTIA Security+ SY0-201 Cert Guide
Author David L. Prowse
CompTIA® Security+ SY0-201 Cert GuideDavid L. ProwseDVD Features Complete Practice ExamMaster every topic on CompTIA’s new Security+ SY0-201 exam.Assess your knowledge and focus your learning.Get the practical workplace knowledge you need!Start-to-finish Security+ S....
Release Date 2010/11 -
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002, Second Edition
Author Michael Gregg
CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 examCASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition of the bestselling book covering the CASP certificat....
Release Date 2014/10 -
Legal and Privacy Issues in Information Security, 3rd Edition
Author Joanna Lyn Grama
Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information security. Information systems securi....
Release Date 2020/12 -
Windows Virus and Malware Troubleshooting
Author Mike Halsey , Andrew Bettany
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.Whatever version of Windows you're using, the threat of virus and malware infection is always a com....
Release Date 2017/03 -
Digital Forensics Basics: A Practical Guide Using Windows OS
Author Nihad A. Hassan
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gat....
Release Date 2019/02 -
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Author Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux....
Release Date 2018/11 -
Author Jennifer C. Wolfe
No boardroom in any industry is safe from new market threats in this time of rapid technological growth. We’ve all heard the stories of corruption by CEOs at WeWork and Theranos and witnessed whistleblowers revealing crises at Wells Fargo and Uber. The board’s responsibil....
Release Date 2020/08 -
The Enterprise Path to Service Mesh Architectures, 2nd Edition
Author Lee Calcote
Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This....
Release Date 2020/11 -
Cyber resilience - Defence-in-depth principles
Author Alan Calder
This book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project.
Release Date 2023/08 -
Author Nikhil Abraham
Hands-on exercises help you learn to code like a proNo coding experience is required for Coding For Dummies, your one-stop guide to building a foundation of knowledge in writing computer code for web, application, and software development. It doesn't matter if you....
Release Date 2015/02 -
Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the im.... -
Author Nipun Jaswal
Gain basic skills in network forensics and learn how to apply them effectively Key FeaturesInvestigate network threats with ease Practice forensics tasks such as intrusion detection, network analysis, and scanning Learn forensics investigation at the network levelB....
Release Date 2019/03 -
Certified Information Systems Auditor (CISA) Cert Guide
Author Robert Johnson , Michael Gregg
Certification allows you to succeed on the latest CISA exam the first time, mastering all the knowledge you need to earn CISA certification. Worldrenowned enterprise IT security leaders Michael Gregg and Rob Johnson share preparation hints and test-taking tips, hel....
Release Date 2017/11 -
The Law of Tax-Exempt Healthcare Organizations 2017 Cumulative Supplement, Fourth Edition + website
Author Bruce R. Hopkins , Thomas K. Hyatt
2017's must-have reference for nonprofit healthcare organizationsThe Law of Tax-Exempt Healthcare Organizations is a one-stop reference for organizations and their advisors, providing accessible explanations of the complex legal framework surrounding tax-exempt st....
Release Date 2017/03 -
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Edition
Author Mike Wills
The only SSCP study guide officially approved by (ISC)2The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT....
Release Date 2022/02 -
CompTIA Server+ Certification All-in-One Exam Guide, Second Edition (Exam SK0-005), 2nd Edition
This exam-focused study guide contains complete coverage of every topic on the current edition of the CompTIA Server+ certification exam This highly effective self-study resource fully prepares you for the latest version of CompTIA’s Server+ certification exam. The book shows how to implement serve.... -
31 Days Before Your CCNA Exam: A Day-by-Day Review Guide for the CCNA 640-802 Exam, Second Edition
Author Allan Johnson
31 Days Before your CCNA Exam, Second Edition, offers you a personable and practical way to understand the certification process, commit to taking the exam, and finish your preparation using a variety of Foundational and Supplemental study resources.The book breaks ....
Release Date 2008/11 -
Cybersecurity Attacks – Red Team Strategies
Author Johann Rehberger
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team program Leve....
Release Date 2020/03 -
Author Charles Bihis
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkAbout This BookLearn how to use the OAuth 2.0 protocol to interact with the world's most popular ....
Release Date 2015/12 -
Author Jamie Pride
The real-world secrets to startup successUnicorn Tears is the smart entrepreneur’s guide to startups. A full 92% of startups fail in the first three years — but failure is not inevitable. Most of these companies self-sabotage, unconsciously eliminating any chance a....
Release Date 2018/01 -
Interpretation and Application of IPSAS
Author Isabelle Andernack , Caroline Aggestam-Pontoppidan
Clear, practical IPSAS guidance, explanation, and examplesInterpretation and Application of IPSAS provides practical guidance on the implementation and application of the International Public Sector Accounting Standards. This book brings readers up to date on the s....
Release Date 2016/02 -
CISSP All-in-One Exam Guide, Eighth Edition, 8th Edition
Author Fernando Maymi , Shon Harris
A new edition of Shon Harris’ bestselling exam prep guide—fully updated for the new CISSP 2018 Common Body of KnowledgeThis effective self-study guide fully prepares you for the challenging CISSP exam and offers 100% coverage of all exam domains. This edition has b....
Release Date 2018/10 -
Author Joan C. Williams
"I recommend a book by Professor Williams, it is really worth a read, it's called White Working Class." -- Vice President Joe Biden on Pod Save AmericaAn Amazon Best Business and Leadership book of 2017Around the world, populist movements are gaining traction amon....
Release Date 2017/05 -
Securing Cloud Services - A pragmatic approach, second edition
Author Lee Newcombe
Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated wi....
Release Date 2020/04 -
Hands-On Web Penetration Testing with Metasploit
Author Harpreet Singh , Himanshu Sharma
Identify, exploit, and test web application security with easeKey FeaturesGet up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerab....
Release Date 2020/05 -
Hacking For Dummies, 6th Edition
Author Kevin Beaver
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penet....
Release Date 2018/07 -
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, 2nd Edition
Author Ben Malisow
The only official CCSP practice test product endorsed by (ISC)²With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the bi....
Release Date 2020/02