-
GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Ric Messier
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Fully updated coverage of every topic on the current version of the GSEC exa....
Release Date 2019/08 -
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
Author Jesus Vigo , Jr.
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic to....
Release Date 2022/12 -
Governance of Portfolios, Programs, and Projects: A Practice Guide
Author Project Management Institute
Understanding governance as it applies to portfolios, programs, and projects is growing in importance to organizations, because appropriate governance is a factor in the success or failure of strategic initiatives and portfolios, as well as an organization’s ....
Release Date 2016/01 -
CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition
Author Matt Walker
Thoroughly revised for the latest release of the Certified Ethical Hacker (CEH) v8 certification examFully updated for the CEH v8 exam objectives, this comprehensive guide offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new editi....
Release Date 2014/04 -
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
Author Sanjib Sinha
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your....
Release Date 2019/11 -
Cybersecurity - Attack and Defense Strategies
Author Erdal Ozkaya , Yuri Diogenes
Enhance your organization's secure posture by improving your attack and defense strategiesAbout This BookGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.Learn to unique te....
Release Date 2018/01 -
Network Protocols for Security Professionals
Author Yoram Orzach , Deepanshu Khanna
Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey FeaturesExploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database, DNS, voice, video, and collaboration server attac....
Release Date 2022/10 -
Cisco Certified CyberOps Associate 200-201 Certification Guide
Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certificationKey FeaturesReceive expert guidance on how to kickstart your career in the cybersecurity industryGain hands-on experience while studying for the Cisco Certified CyberOps Associa.... -
Author Peter Yaworski
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbu....
Release Date 2019/06 -
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition, 4th Edition
Author Matt Walker
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Up-to-date coverage of every topic on the CEH v10 examThoroughly updated for....
Release Date 2019/03 -
Author Scar de Courcier , Oleg Skulkin
Maximize the power of Windows Forensics to perform highly effective forensic investigationsAbout This BookPrepare and perform investigations using powerful tools for Windows,Collect and validate evidence from suspects and computers and uncover clues that are otherw....
Release Date 2017/08 -
Nine Steps to Success: North American edition - An ISO 27001 Implementation Overview
Author Alan Calder
Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard....
Release Date 2017/10 -
Social Ontology of Whoness, 3rd Edition
Author Michael Eldred
How are core social phenomena to be understood as modes of being? This book offers an alternative approach to social ontology. Recent interest in social ontology on the part of mainstream philosophy and the social sciences presupposes from the outset that the human....
Release Date 2018/10 -
Outsourcing Dilemma: The Search for Competitiveness, The
Author J. Brian Heywood
Outsourcing of some business functions pre-dates the technological revolution of the latter part of the 20th century. Nevertheless, 99 percent of outsourcing would not be logical or necessary if it were not for the constantly changing and improving technology.Despit....
Release Date 2001/09 -
Healthcare Information Technology Exam Guide for CHTS and CAHIMS Certifications, 2nd Edition
Author John Mattison , Brian Gugerty , Kathleen A. McCormick
This effective study resource delivers complete coverage of all topics on the newest versions of these challenging HIT examsThis comprehensive self-study guide fully prepares candidates for the Certified Associate in Healthcare Information and Management Systems (C....
Release Date 2017/09 -
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501), 2nd Edition
Author Scott Jernigan , Mike Meyers
A fully updated CompTIA Security+ exam guide from training and exam preparation expert Mike MeyersTake the CompTIA Security+ exam (exam SY0-501) with confidence using the comprehensive information contained in this highly effective study resource. Like the exam, th....
Release Date 2017/12 -
CISSP Practice Exams, Fifth Edition, 5th Edition
Author Jonathan Ham , Shon Harris
Fully updated coverage of the 2018 CISSP exam, including 1250+ in-depth practice questionsTake the 2018 version of the challenging CISSP exam with confidence using this up-to-date, exam-focused study resource. Designed as a companion to CISSP All-in-One Exam Guide,....
Release Date 2018/11 -
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
Author Shakeel Ali , Tedi Heriyanto , Lee Allen , Gerard Johansen , Damian Boodoo , Alex Sam
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth editionKey FeaturesRely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-....
Release Date 2018/10 -
Reflexive Governance for Research and Innovative Knowledge
Author Marc Maesschalck
The governance theories that have developed over the past twenty years offer a new framework to consider and examine the collective conditions of a “Responsible Research and Innovation – RRI” linked up with the policy challenges of a society in transition in all ....
Release Date 2017/03 -
CEH: Certified Ethical Hacker Version 8 Study Guide
Author Sean-Philip Oriyano
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guideSecurity professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study....
Release Date 2014/08 -
CISSP Official (ISC)2 Practice Tests, 2nd Edition
Author David Seidl , Mike Chapple
Full-length practice tests covering all CISSP domains for the ultimate exam prepThe (ISC)2 CISSP Official Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain....
Release Date 2018/06 -
The Handbook of Board Governance, 2nd Edition
Author Richard Leblanc
The revised new edition of the must-read guide for executives—provides comprehensive coverage of topics in corporate governance by leading subject-matter expertsThe Handbook of Board Governance is the marketing-leading text on public, nonprofit, and private board governan....
Release Date 2020/05 -
CompTIA CySA+ Study Guide Exam CS0-002, 2nd Edition
Author Mike Chapple , David Seidl
This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics!Where can you find 100% coverage of the revised CompTIA Cybersecurity Analyst+ (CySA+) e....
Release Date 2020/07 -
CompTIA Cloud+ Certification All-in-One Exam Guide (Exam CV0-003)
Complete coverage of every objective for the CompTIA Cloud+ examTake the CompTIA Cloud+ exam with confidence using this highly effective self-study guide. CompTIA Cloud+™ Certification All-in-One Exam Guide (Exam CV0-003) offers complete coverage of every topic on the latest version of the exam. You.... -
70 Tips and Tricks for Mastering the CISSP Exam
Author R. Sarma Danturthi
Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick t....
Release Date 2020/11 -
Benefit Corporation Law and Governance
Author Frederick Alexander
Corporations with a ConscienceCorporations today are embedded in a system of shareholder primacy. Nonfinancial concerns—like worker well-being, environmental impact, and community health—are secondary to the imperative to maximize share price. Benefit corporat....
Release Date 2017/10 -
Kali Linux Network Scanning Cookbook - Second Edition
Author Justin Hutchens , Michael Hixon
Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanningAbout This BookLearn the fundamentals behind commonly used scanning techniquesDeploy powerful scanning tools that are integrate....
Release Date 2017/05 -
Learning Android Forensics - Second Edition
Author Rohit Tamma , Donnie Tindall , Oleg Skulkin
A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifactsKey FeaturesGet up and running with modern mobile forensic strategies and techniques Analyze the most popular Android applications using free and open source foren....
Release Date 2018/12 -
Adversarial Tradecraft in Cybersecurity
Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition.Key FeaturesGain an advantage against live hackers in a competition or real computing environmentUnderstand ....