-
Ransomware and Cyber Extortion: Response and Prevention
Author Sherri Davidoff , Matt Durrin , Karen Sprenger
Protect Your Organization from Devastating Ransomware and Cyber Extortion AttacksRansomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after a....
Release Date 2022/11 -
Author Timothy Gallo , Allan Liska
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what st....
Release Date 2016/12 -
Author Jonathan Hassell
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protoc....
Release Date 2002/10 -
Quicken 2015 The Official Guide, 3rd Edition
Author Bobbi Sandberg
The ONLY official guide to the 2015 release of the #1 bestselling personal finance software“Intuit-approved and loaded with secrets, this book provides you with recipes for financial success.” –Scott Cook, Co-Founder, Intuit, Inc.Quicken 2015: The Official Guide sho....
Release Date 2014/11 -
Quicken 2014 The Official Guide, 2nd Edition
Author Bobbi Sandberg
The Only Official Guide to the #1 Personal Finance Software“Intuit-approved and loaded with secrets, this book provides you with recipes for financial success.” –Scott Cook, Co-Founder, Intuit, Inc.Organize your finances and assets with ease using the expert techniq....
Release Date 2013/11 -
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Author Sagar Rahalkar
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanni....
Release Date 2018/11 -
Author Jeromy Hopgood
Used from Broadway to Britain’s West End, QLab software is the tool of choice for many of the world’s most prominent sound, projection, and integrated media designers. QLab 3 Show Control: Projects for Live Performances & Installations is a project-based book on....
Release Date 2013/11 -
Python: Penetration Testing for Developers
Author Dave Mound , Benjamin May , Andrew Mabbitt , Terry Ip , Cameron Buchanan , Mohit , Chr
Unleash the power of Python scripting to execute effective and efficient penetration testsAbout This BookSharpen your pentesting skills with PythonDevelop your fluency with Python to write sharper scripts for rigorous security testingGet stuck into some of the most....
Release Date 2016/10 -
Python Web Penetration Testing Cookbook
Author Dave Mound , Benjamin May , Andrew Mabbitt , Terry Ip , Cameron Buchanan
Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testingIn DetailThis book gives you an arsenal of Python scripts perfect to use or to customize your needs for each stage of the testing process. Each chapter t....
Release Date 2015/06 -
Python Penetration Testing Essentials
Author Mohit
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.About This BookDetect and avoid various attack types that put the privacy of a ....
Release Date 2018/05 -
Author Hussam Khrais
Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming languageAbout This BookComprehensive information on building a web application penetration testing framework using PythonMaster....
Release Date 2018/04 -
Python Ethical Hacking from Scratch
Explore the world of practical ethical hacking by developing custom network scanning and remote access tools that will help you test the system security of your organizationKey FeaturesGet hands-on with ethical hacking and learn to think like a real-life hackerBuild practical ethical hacking tools f.... -
Python Digital Forensics Cookbook
Author Chapin Bryce , Preston Miller
Over 60 recipes to help you learn digital forensics and leverage Python scripts to amplify your examinationsAbout This BookDevelop code that extracts vital information from everyday forensic acquisitions.Increase the quality and efficiency of your forensic analysis....
Release Date 2017/09 -
Author David Routin , Simon Thoores , Samuel Rossier
Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniquesKey FeaturesApply real-world strategies to strengthen the capabilities of your organization's security systemLearn t....
Release Date 2022/06 -
Protective Security: Creating Military-Grade Defenses for Your Digital Business
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-crit.... -
Protecting Your Web Applications
Author Ken Hess , Gary Sloper
Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical eboo....
Release Date 2019/06 -
Author Deborah E. Bouchoux
You can't touch it or feel it. Sometimes you can't even see it. Yet, intellectual property continues to soar in value, comprising an increasingly greater portion of a typical company's assets. In the age of instant global communication, understanding what intelle....
Release Date 2001/04 -
Protecting Your Company's Intellectual Property
Author Deborah E. Bouchoux
A company’s most valuable assets may not be physical. This book shows how to protect them without fences or security guards! You can’t touch it or feel it. Sometimes you can’t even see it. Yet, intellectual property continues to soar in value, comprising an increas....
Release Date 2006/02 -
Protect Your Wealth from the Ravages of Inflation: A Three-Step Method
Author Paul M. King
Protect Your Wealth from the Ravages of Inflation is for people who have financial assets to protect in an unpredictable, inflationary environment. Maybe you have tried traditional financial advice, financial planning, and passive investment management techniques an....
Release Date 2011/08 -
Author George Finney , John Kindervag
Implement Zero Trust initiatives efficiently and effectivelyIn Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Pr....
Release Date 2022/10 -
Programming Mobile Devices: An Introduction for Practitioners
Author Tommi Mikkonen
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems.Learn how to programme the mobile devices of the future!The importance of mobile systems programming has emerged over the recent years as a new domain in software development. The design of ....
Release Date 2007/03 -
Programming and Customizing the Multicore Propeller Microcontroller: The Official Guide
Author Parallax
The Only Official Guide to the Parallax Multicore Propeller MicrocontrollerWritten by a team of Propeller experts, this authoritative guide shows you how to realize your design concepts by taking full advantage of the multicore Propeller microcontroller's unique ar....
Release Date 2010/02 -
Profit + Purpose: How Social Innovation Is Transforming Business for Good
Author Kyle Westaway
World-changing ideas become reality with practical, effective planningProfit + Purpose: Tools to Structure, Fund, and Run a Social Enterprise is a practical step-by step guide to creating a successful socially-oriented business venture. With practical, actionable gu....
Release Date 2014/09 -
Professional Penetration Testing, 2nd Edition
Author Thomas Wilhelm
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of....
Release Date 2013/06 -
Professional Penetration Testing
Author Thomas Wilhelm
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability iden....
Release Date 2015/08 -
Procuring Penetration Testing Services
Author CREST
Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat to key systems is ever increasing and the probability of a security weakness being accidentally exposed or malicious....
Release Date 2014/05 -
Process Systems Engineering for Biofuels Development
A comprehensive overview of current developments and applications in biofuels production Process Systems Engineering for Biofuels Development brings together the latest and most cutting-edge research on the production of biofuels. As the first book specifically devoted to process syst.... -
Pro Encryption in SQL Server 2022: Provide the Highest Level of Protection for Your Data
Author Matthew McGiffen
This in-depth look at the encryption tools available in SQL Server shows you how to protect data by encrypting it at rest with Transparent Data Encryption (TDE) and in transit with Transport Level Security (TLS). You will know how to add the highest levels of protection for sensitive data using Alwa....
Release Date 2022/11 -
Pro Business Activity Monitoring in BizTalk 2009
Author Geoff Snowman , Jeff Sanders
Business Activity Monitoring, or BAM, provides real-time business intelligence by capturing data as it flows through a business system. By using BAM, you can monitor a business process in real time and generate alerts when the process needs human intervention. Pro B....
Release Date 2009/07