-
Kali Linux - An Ethical Hacker's Cookbook - Second Edition
Author Himanshu Sharma
Discover end-to-end penetration testing solutions to enhance your ethical hacking skillsKey FeaturesPractical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect....
Release Date 2019/03 -
Securing Network Infrastructure
Author Sagar Rahalkar , Sairam Jetty
Plug the gaps in your network's infrastructure with resilient network security modelsKey FeaturesDevelop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement n....
Release Date 2019/03 -
Author Imke Köhler
There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat,....
Release Date 2019/03 -
Author Soren Kenner , Imran Rashid
Authors Imran Rashid and Soren Kenner have sparked an international debate by revealing the “mind hacks” Facebook, Apple, Google, and Instagram use to get you and your children hooked on their products. In Offline, they deliver an eye-opening research-based journey....
Release Date 2019/02 -
CASP+ CompTIA Advanced Security Practitioner Study Guide, 3rd Edition
Author Michael Gregg , Jeff T. Parker
Comprehensive coverage of the new CASP+ exam, with hands-on practice and interactive study toolsThe CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition, offers invaluable preparation for exam CAS-003. Covering 100 percent of the ex....
Release Date 2019/02 -
Digital Forensics Basics: A Practical Guide Using Windows OS
Author Nihad A. Hassan
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gat....
Release Date 2019/02 -
Author Roman Zabicki
Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basic....
Release Date 2019/02 -
Hands-On Application Penetration Testing with Burp Suite
Author Riyaz Ahemed Walikar , Dhruv Shah , Carlos A. Lozano
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilitiesKey FeaturesMaster the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intru....
Release Date 2019/02 -
Author Giulio D'Agostino
Conversations in Cyberspace is a collection of insights on the current state of security and privacy in the Internet world.The book contains a brief introduction to some of the most used open-source intelligence (OSINT) tools and a selection of interviews with some....
Release Date 2019/02 -
Author Dr. Michael J. Urick
Many assumed characteristics of generational groupings are actually “myths,” meaning that generational stereotypes are not accurate across all members of a generation.This book explores the Generation Myth by highlighting the complexity of the “generation” concept ....
Release Date 2019/02 -
Author Ron Taylor , Omar Santos
Learn, prepare, and practice for CompTIA Pentest+ PT0-001 exam success with this CompTIA Cert Guide from Pearson IT Certification, a leader in IT Certification.Master CompTIA Pentest+ PT0-001 exam topicsAssess your knowledge with chapter-ending quizzesReview key co....
Release Date 2019/01 -
Author RJ Andrews
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.Creating Info We Trust is a craft that puts the world into forms tha....
Release Date 2019/01 -
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests
Author David Seidl , Mike Chapple
Smarter, faster prep for the SSCP exam(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests is the only (ISC)2-endorsed set of questions for the SSCP exam. With SSCP certification, you will meet Department of Defense requirements for entry-lev....
Release Date 2019/01 -
ISO 14001 Step by Step - A Practical Guide
Author Naeem Sadiq , Asif Hayat Khan
Take the first steps to ISO 14001 certification with this practical overview. This easy-to-follow book provides practical advice and sample documents to help you understand how to achieve compliance with ISO 14001:2015, the international standard for an EMS (envir....
Release Date 2019/01 -
Author Adrian Pruteanu
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker.Key FeaturesBuilds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Exa....
Release Date 2019/01 -
Hands-On Penetration Testing with Python
Author Furqan Khan
Implement defensive techniques in your ecosystem successfully with PythonKey FeaturesIdentify and expose vulnerabilities in your infrastructure with Python Learn custom exploit development . Make robust and powerful cybersecurity tools with Python W....
Release Date 2019/01 -
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
Author Robert Beggs , Vijay Kumar Velu
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key FeaturesEmploy advanced pentesting techniques with Kali Linux to build highly secured systems Discover various stealth techniques to remain....
Release Date 2019/01 -
SHRM-CP/SHRM-SCP Certification All-in-One Exam Guide
Author William D. Kelly , William H. Truesdell , Dory Willer
Take the SHRM-Certified Professional (SHRM-CP) and SHRM-Senior Certified Professional (SHRM-SCP) exams with complete confidenceThis integrated exam preparation system delivers 100% coverage of all topics for both the SHRM-Certified Professional (SHRM-CP) and SHRM-S....
Release Date 2018/12 -
Author Lee Reiber
Master the tools and techniques of mobile forensic investigationsConduct mobile forensic investigations that are legal, ethical, and highly effective using the detailed information contained in this practical guide. Mobile Forensic Investigations: A Guide to Eviden....
Release Date 2018/12 -
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Author Maciej Machulak , Michael Schwartz
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate y....
Release Date 2018/12 -
Reducing MTTD for High-Severity Incidents
Author Jordan Pritchard , Ramin Keene , Rodney Lester , Jay Holler , Michael Kehoe , Tammy B
For companies such as Amazon, Dropbox, and Gremlin, the term high severity incident (SEV) signifies drops in network availability, product feature issues, data loss, revenue loss, and security risks. These high-impact bugs occur when coding, automation, testing, an....
Release Date 2018/12 -
Author Stanley Siegel , Chris Williams , Scott Donaldson
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and busine....
Release Date 2018/12 -
Author Vimal Kumar , Amartya Sen , Sanjay Madria
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It ....
Release Date 2018/12 -
Microsoft System Center Data Protection Manager Cookbook
Author Patrick Lownds , Charbel Nemnom
Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPM Key FeaturesAdapt to the modern data center design challenges and improve storage efficiency Effective recipes to help you create your own robust architectural designs S....
Release Date 2018/12 -
Learning Android Forensics - Second Edition
Author Rohit Tamma , Donnie Tindall , Oleg Skulkin
A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifactsKey FeaturesGet up and running with modern mobile forensic strategies and techniques Analyze the most popular Android applications using free and open source foren....
Release Date 2018/12 -
CISSP Practice Exams, Fifth Edition, 5th Edition
Author Jonathan Ham , Shon Harris
Fully updated coverage of the 2018 CISSP exam, including 1250+ in-depth practice questionsTake the 2018 version of the challenging CISSP exam with confidence using this up-to-date, exam-focused study resource. Designed as a companion to CISSP All-in-One Exam Guide,....
Release Date 2018/11 -
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Author Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux....
Release Date 2018/11 -
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Author Sagar Rahalkar
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanni....
Release Date 2018/11 -
Understanding Government Contract Law, 2nd Edition
Author Terrence M. O'Connor
This updated classic offers clear and concise explanations of the basic legal concepts of government contract law for professionals at any stage of their career. Written in straightforward language for contracting officers, contract administrators, contractors,....
Release Date 2018/11 -
Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers
Author Alan Calder
This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them. Show and hide more
Release Date 2018/11