-
Author Deborah Hicks Midanek
Boards of directors are sitting ducks. Shareholders complain and even attack, management manipulates, and individual board members have little power, able to act only as part of the board as a whole. Governance issues are front and center, yet there is often little....
Release Date 2018/09 -
Data Analyst - BCS Guides to IT Roles
Author Obi Umegbolu , Clare Stanier , Charles Joseph , Harish Gulati , Rune Rasmussen
Data is constantly increasing; everything from app usage, to sales, to customer surveys generate data in an average business. Out on the streets data is everywhere too, from speed and security cameras, weather monitoring and measuring footfall to name just a few ex....
Release Date 2019/03 -
Author Everardo Reyes-Garcia
Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is rendered on the scr....
Release Date 2017/11 -
Cybersecurity - Attack and Defense Strategies
Author Yuri Diogenes , Dr. Erdal Ozkaya
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscapeKey FeaturesUpdated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and moreExplore the latest too....
Release Date 2022/09 -
Author Toomas Viira
"I loved the quotes at the beginning of each chapter – very interesting and thought-provoking. I also enjoyed the author’s style and his technical expertise shone through," Christopher Wright, Wright CandA Consulting Ltd. Protecting critical information infra....
Release Date 2018/01 -
CISSP® Exam Cram, Fourth Edition
Author Michael Gregg
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the digital edition of the Cram Sheet is available through product registration at Pearson IT Certific....
Release Date 2016/08 -
Ransomware and Cyber Extortion: Response and Prevention
Author Sherri Davidoff , Matt Durrin , Karen Sprenger
Protect Your Organization from Devastating Ransomware and Cyber Extortion AttacksRansomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after a....
Release Date 2022/11 -
CCNA® Cisco Certified Network Associate Review Guide
Author Todd Lammle
The leading quick-review guide to the number-one IT certificationThe Cisco Certified Network Associate (CCNA) certification is the first step for network administrators seeking to advance their careers. Part of the Sybex study-practice-review approach to certificati....
Release Date 2011/06 -
Author Amy Sample Ward , Afua Bruce
Changing the way we use, develop, and fund technology for social change is possible, and it starts with you. The Tech That Comes Next: How Changemakers, Philanthropists, and Technologists Can Build an Equitable World outlines a vision of a more equitable and just world along with practical steps to ....
Release Date 2022/03 -
Author Ric Messier
With nation-states, organized crime groups, and other attackers scouring systems to steal funds, information, or intellectual property, incident response has become one of today’s most important technology sectors. If you’re not familiar with incident response, thi....
Release Date 2019/12 -
Author Dylan Shields
Running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS. In AWS Security you’ll learn how to: Securely grant access to AWS resources to coworkers and customersDevelop policies....
Release Date 2022/09 -
A concise introduction to the NIS Directive - A pocket guide for digital service providers
Author Alan Calder
This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENIS....
Release Date 2018/11 -
Hands-On Penetration Testing with Python
Author Furqan Khan
Implement defensive techniques in your ecosystem successfully with PythonKey FeaturesIdentify and expose vulnerabilities in your infrastructure with Python Learn custom exploit development . Make robust and powerful cybersecurity tools with Python W....
Release Date 2019/01 -
VCP5-DT Official Cert Guide: VMware Certified Professional 5 - Desktop
Author Linus Bourque
The Publisher regrets that the companion CD/DVD content cannot be made available Online.The VCP5-DT Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizze....
Release Date 2013/08 -
The Essence of Software Engineering: Applying the SEMAT Kernel
Author Svante Lidman , Ian Spence , Paul E. McMahon , Pan-Wei Ng , Ivar Jacobson
SEMAT (Software Engineering Methods and Theory) is an international initiative designed to identify a common ground, or universal standard, for software engineering. It is supported by some of the most distinguished contributors to the field. Creating a simple langu....
Release Date 2013/01 -
Advanced Modern Control System Theory and Design
Author Stanley M. Shinners
The definitive guide toadvanced control system designAdvanced Modern Control System Theory and Design offers the most comprehensive treatment of advanced control systems available today. Superbly organized and easy to use, this book is designed for an advanced cours....
Release Date 1998/09 -
Building Secure Software: How to Avoid Security Problems the Right Way
Author Gary McGraw , John Viega
Most organizations have a firewall, antivirus software, and intrusion detection systems, all of which are intended to keep attackers out. So why is computer security a bigger problem today than ever before? The answer is simple--bad software lies at the heart of all....
Release Date 2001/09 -
Author Scott Davis , Carter Copeland , Rob Wertheimer
Three top Wall Street analysts reveal enduring lessons in sustainable success from the great industrial titans—the high-tech companies of their day—to the disruptors that now dominate the economy.Before Silicon Valley disrupted the world with new technologies and business....
Release Date 2020/07 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Brad Hibbert , Morey J. Haber
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breache....
Release Date 2017/12 -
Sourcing to Support the Green Initiative
Author Lisa Ellram , Wendy Tate
The “green” or environmental sustainability movement has taken hold throughout the world. Its staying power is confirmed by that fact that environmental emphasis in organizations did not decrease during the recent global recession, but rather increased. However, sin....
Release Date 2013/07 -
Modern Cryptography for Cybersecurity Professionals
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at restCompare symmetric with asymmetric encryption .... -
Author William Oettinger
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensics to acquire and secure digital evidence skillfully Conduct a digital fo....
Release Date 2020/04 -
Pearl Harbor Revisited: United States Navy Communications Intelligence, 1924-1941
Author Frederick D. Parker
The history of various aspects of the development of the U.S. Navy's communications intelligence structure and processes in the years leading up to the attack on Pearl Harbor. The history of various aspects of the deve....
Release Date 2013/10 -
Author Camille McCue
An easy-to-grasp introduction to coding concepts for kidsCoding For Kids For Dummies breaks coding into a series of small projects, each designed to teach elementary-to-middle-school-aged students a core concept to build a game, application, or other tool. In this h....
Release Date 2014/11 -
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition, 3rd Edition
Author Darril Gibson
This fully updated study guide offers complete coverage of every topic on the latest version of the SSCP examTake the 2018 edition of the challenging Systems Security Certified Practitioner (SSCP) exam with confidence using the detailed information contained in thi....
Release Date 2018/10 -
CIPM Certified Information Privacy Manager All-in-One Exam Guide
This self-study guide covers every topic on the Certified Information Privacy Manager exam Take IAPP’s rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candidates.... -
Author Robert G. Werner , James A. Bach
The H-1B visa is the gateway for the world's best and brightest to live and work in the United States as IT professionals, engineers, scientists, professors, doctors, nurses, and researchers. How to Secure Your H-1B Visa guides employees and employers alike through....
Release Date 2013/01 -
Author Timothy Gallo , Allan Liska
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what st....
Release Date 2016/12 -
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition
Author David Huca - CCIE No. 4594
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily config....
Release Date 2007/08