-
CISSP Official (ISC)2 Practice Tests, 2nd Edition
Author David Seidl , Mike Chapple
Full-length practice tests covering all CISSP domains for the ultimate exam prepThe (ISC)2 CISSP Official Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain....
Release Date 2018/06 -
CompTIA CySA+ Study Guide Exam CS0-002, 2nd Edition
Author Mike Chapple , David Seidl
This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics!Where can you find 100% coverage of the revised CompTIA Cybersecurity Analyst+ (CySA+) e....
Release Date 2020/07 -
70 Tips and Tricks for Mastering the CISSP Exam
Author R. Sarma Danturthi
Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick t....
Release Date 2020/11 -
CompTIA Security+ Certification Guide
Author Ian Neil
This is a practical certification guide covering all the exam topics in an easy-to-follow manner backed with mock tests and self-assesment scenarios for better preparation.Key FeaturesLearn cryptography and various cryptography algorithms for real-world implementat....
Release Date 2018/09 -
Mastering Windows Security and Hardening
Author Mark Dunkerley , Matt Tumbarello
Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and A....
Release Date 2020/07 -
CompTIA Security+ Certification Practice Exams, Second Edition (Exam SY0-401), 2nd Edition
Author Glen E. Clarke , Daniel Lachance
Don't Let the Real Test Be Your First Test!Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.CompTI....
Release Date 2014/07 -
Author Omar Santos , John Stuppi
CCNA Security 210-260 Official Cert GuideCCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security exp....
Release Date 2015/09 -
Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition
Author Aamir Lakhani , Joseph Muniz
Investigating the Cyber BreachThe Digital Forensics Guide for the Network EngineerUnderstand the realities of cybercrime and today’s attacksBuild a digital forensics lab to test tools and methods, and gain expertiseTake the right actions as soon as you discover a b....
Release Date 2018/02 -
Author Darril Gibson
Assess your readiness for the CISSP Exam—and quickly identify where you need to focus and practice. This practical, streamlined guide provides objective overviews, exam tips, "need-to-know" checklists, review questions, and a list of valuable resources—all designed ....
Release Date 2012/12 -
Hacker Techniques, Tools, and Incident Handling
Author Michael Gregg , Sean-Philip Oriyano
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about ....
Release Date 2010/10 -
CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition, 3rd Edition
Author Peter Gregory
This up-to-date self-study system offers 100% coverage of every topic on the 2016 version of the CISA examThe fully revised new edition delivers complete coverage of every topic on t....
Release Date 2016/10 -
Author Jan Yager , Fred Yager
Along with Medicare, Social Security is one of the "rites of passage" as older Americans retire. After contributing funds to this program their entire working life, people are anxious to start getting their monthly checks. Following a brief look at why Social Secur....
Release Date 2015/04 -
iOS Forensics for Investigators
Author Gianluca Tiepolo
Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey FeaturesExplore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts, recover deleted mobile data, and investigate p....
Release Date 2022/05 -
Building a Cyber Resilient Business
Author Dr. Magda Lilia Chelly , Shamane Tan , Hai Tran
Learn how to build a proactive cybersecurity culture together with the rest of your C-suite to effectively manage cyber risksKey FeaturesEnable business acceleration by preparing your organization against cyber risksDiscover tips and tricks to manage cyber risks in your organization and build a cybe....
Release Date 2022/11 -
Practical Mobile Forensics - Fourth Edition
Author Rohit Tamma , Oleg Skulkin , Heather Mahalik
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenariosKey FeaturesApply advanced forensic techniques to recover deleted data from mobile devices Retrieve and analyze data ....
Release Date 2020/04 -
Author Roberta Bragg - CISSP
The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multip....
Release Date 2002/11 -
Gray Hat Hacking The Ethical Hacker’s Handbook
Author Jonathan Ness , Chris Eagle , Shon Harris , Gideon Lenkey , Allen Harper , Terron Wil
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker'....
Release Date 2011/01 -
Getting Started with z/OS Data Set Encryption
Author Andy Coulson Bill White Jacky Doll , Brad Habbershaw , Cecilia Carranza Lewis , Tho
AbstractThis IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/O....
Release Date 2018/06 -
Information Governance: Concepts, Strategies, and Best Practices
Author Robert F. Smallwood
Proven and emerging strategies for addressing document and records management risk within the framework of information governance principles and best practicesInformation Governance (IG) is a rapidly emerging "super discipline" and is now being applied to electronic....
Release Date 2014/04 -
Workshop Mastery with Jimmy DiResta
Author John Baichtal , Jimmy DiResta
Jimmy DiResta has made a name for himself with his inventiveness and workshop skills, creating dozens of projects for YouTube videos and television shows such as Hammered and Against the Grain on the DIY network. In Make: Workshop Mastery With Jimmy DiResta, Jimmy ....
Release Date 2016/10 -
Distributed Denial of Service (DDoS)
Author Rich Groves , Eric Chou
Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to ....
Release Date 2018/04 -
Penetration Testing: A Survival Guide
Author Mohammed A. Imran , Srinivasa Rao Kotipalli , Juned Ahmed Ansari , Bo Weaver , Wolf
A complete pentesting guide facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxGain a deep understanding of the flaws in web applications and exploit them ....
Release Date 2017/01 -
Establishing an occupational health & safety management system based on ISO 45001
Author Naeem Sadiq
This book provides a comprehensive explanation of the detailed requirements of ISO 45001. The author draws out key parts of the Standard, which can often be confusing for non-experts or newcomers to ISO standards, and explains what they mean and how to comply. ....
Release Date 2019/09 -
Author Kumaraguru Velmurugan , Mounir Hahad , Abhijit Mohanta
Your one-stop guide to know digital extortion and it's prevention.About This BookA complete guide to how ransomware worksBuild a security mechanism to prevent digital extortion.A practical approach to knowing about, and responding to, ransomware.Who This Book Is F....
Release Date 2018/03 -
Hands-On Software Engineering with Python
Author Brian Allbee
Explore various verticals in software engineering through high-end systems using PythonKey FeaturesMaster the tools and techniques used in software engineering Evaluates available database options and selects one for the final Central Office system-components Exper....
Release Date 2018/10 -
Author Aditya Mukherjee
Build a resilient network and prevent advanced cyber attacks and breachesKey FeaturesExplore modern cybersecurity techniques to protect your networks from ever-evolving cyber threatsPrevent cyber attacks by using robust cybersecurity strategiesUnlock the secrets of networ....
Release Date 2020/11 -
How to Defeat Advanced Malware
Author Simon Cros , Henry Dalziel
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverage....
Release Date 2014/12 -
Author Jamie Sanbower , Mason Harris , Vivek Santuka , Aaron Woland
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protectionIntegrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in se....
Release Date 2018/07 -
Adobe ColdFusion 8 Web Application Construction Kit, Volume 1: Getting Started
Author Charlie Arehart , Raymond Camden , Ben Forta
The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time—the books that most ColdFusion developers used to learn the product. This Getting Started volume starts with Web and Internet fundamentals and database concepts and des....
Release Date 2007/09