-
Author Iqbal Muhardianto , Digit Oktavianto
Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skillsUnderstand the risk of the rise of document-based malwareEnhance your malware analysis concepts through illustrations, tips and tricks, step-by-s....
Release Date 2013/10 -
Windows Malware Analysis Essentials
Author Victor Marak
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setAbout This BookSet the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malwareUnderstand ....
Release Date 2015/09 -
Nine Steps to Success: An ISO27001:2013 implementation overview
Author Alan Calder
In Nine Steps to Success – An ISO 27001 Implementation Overview, Alan provides a comprehensive overview of how to lead a successful ISO 27001-compliant ISMS implementation in just nine steps. Show and hide more
Release Date 2016/05 -
Author Morgan Jones
Valve Amplifiers has been recognized as the most comprehensive guide to valve amplifier design, analysis, modification and maintenance. It provides a detailed presentation of the rudiments of electronics and valve design for engineers and non-experts. The source als....
Release Date 2011/10 -
Environment Modeling-Based Requirements Engineering for Software Intensive Systems
Author Zhi Jin
Environment Modeling-Based Requirements Engineering for Software Intensive Systems provides a new and promising approach for engineering the requirements of software-intensive systems, presenting a systematic, promising approach to identifying, clarifying, modeling....
Release Date 2018/04 -
CISSP® Exam Cram, Fourth Edition
Author Michael Gregg
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the digital edition of the Cram Sheet is available through product registration at Pearson IT Certific....
Release Date 2016/08 -
Author Jean Claude Larreche
One of the most frequent challenges that managers and executives face today is: ‘How do I keep on growing and at the same time, make a profit?’ Based on the author’s extensive research on over 350 Fortune 1000 Firms, The Momentum Effect proves that the old method of....
Release Date 2013/09 -
Transitioning to Quantum-Safe Cryptography on IBM Z
Author Bill White , Didier Andre , Gregg Arquero , Ritu Bajaj , Joe Cronin , Anne Dames , Hen
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break cl....
Release Date 2023/04 -
CISM Certified Information Security Manager Practice Exams
Author Peter H. Gregory
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Don’t Let the Real Test Be Your First Test! Take the current version of the ....
Release Date 2019/07 -
Data Analyst - BCS Guides to IT Roles
Author Obi Umegbolu , Clare Stanier , Charles Joseph , Harish Gulati , Rune Rasmussen
Data is constantly increasing; everything from app usage, to sales, to customer surveys generate data in an average business. Out on the streets data is everywhere too, from speed and security cameras, weather monitoring and measuring footfall to name just a few ex....
Release Date 2019/03 -
CISSP in 21 Days - Second Edition
Author M. L. Srinivasan
Boost your confidence and get the competitive edge you need to crack the exam in just 21 days!About This BookDay-by-day plan to study and assimilate core concepts from CISSP CBKRevise and take a mock test at the end of every four chaptersA systematic study and revi....
Release Date 2016/06 -
Modern Cryptography for Cybersecurity Professionals
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at restCompare symmetric with asymmetric encryption .... -
Pearl Harbor Revisited: United States Navy Communications Intelligence, 1924-1941
Author Frederick D. Parker
The history of various aspects of the development of the U.S. Navy's communications intelligence structure and processes in the years leading up to the attack on Pearl Harbor. The history of various aspects of the deve....
Release Date 2013/10 -
Developing the Next Generation of Enterprise Leaders
Author M. Ellen Peebles , Douglas Ready
A survey of top business executives from major international organizations found that 79% said it was extremely important to have leaders who act on behalf of the entire organization, not just their units. The rest said it was very important. Nearly 65% said they e....
Release Date 2015/10 -
How to Choose the Right Digital Leader for Your Company
Author Nikolaus Obwegeser , Michael Wade
Striking the right balance between competence and credibility is essential to digital leaders’ success, but it depends on what a company expects its CDO to do. While external candidates can bring critical digital competence and experience to organizations seeking a....
Release Date 2019/05 -
Ransomware and Cyber Extortion: Response and Prevention
Author Sherri Davidoff , Matt Durrin , Karen Sprenger
Protect Your Organization from Devastating Ransomware and Cyber Extortion AttacksRansomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after a....
Release Date 2022/11 -
CISSP For Dummies, 6th Edition
Author Peter H. Gregory , Lawrence C. Miller
Secure your CISSP certification!If you’re a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass....
Release Date 2018/06 -
Author Leslie S. Hiraoka
He covers the anti-trust case against Microsoft; the successes of eBay, Amazon, Yahoo, and Google; road-kills along the information highway such as the forgotten eToys; as well as the Enron implosion and other corporate scandals. After tracing this amazing story he....
Release Date 2017/03 -
Unequal Protection, 2nd Edition
Author Thom Hartmann
Unequal taxes, unequal accountability for crime, unequal influence, unequal control of the media, unequal access to natural resources—corporations have gained these privileges and more by exploiting their legal status as persons. How did something so illogical ....
Release Date 2010/06 -
Author Dylan Shields
Running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS. In AWS Security you’ll learn how to: Securely grant access to AWS resources to coworkers and customersDevelop policies....
Release Date 2022/09 -
Author Thomas Kranz
A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. In Making Sense of Cybersecurity you will learn how to: Develop and incrementally improve your own cybersecurity strategyDetect rogue WiFi ....
Release Date 2022/10 -
Author Jeff Saperstein , Hunter Hastings
Given the rapid technological, organizational, and structural changes that challenge conventional institutions and economies, what is the future of work? The authors propose a path to seize opportunity for the individual worker and entrepreneur, who can be newly in....
Release Date 2018/06 -
CCNP Security Firewall 642-617 Quick Reference
Author Andrew Mason
As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Reference provides a concise review of all objectives on the new CCNP Security Firewall exam (642-617). This eBook provides you with detailed, graphical-based information, highlighting only t....
Release Date 2011/01 -
CCNA® Cisco Certified Network Associate: Study Guide, Seventh Edition
Author Todd Lammle
Learn from the Best - Cisco Networking Authority Todd LammleWritten by Cisco networking authority Todd Lammle, this comprehensive guide has been completely updated to reflect the latest CCNA 640-802 exam. Todd's straightforward style provides lively examples, hands....
Release Date 2011/04 -
Author Helen Q Huang
Character Sketch outlines a theory of costume rendering that explores how a designer conceptualizes and creates a character on the page. Beginning with how to develop a sense of character through active, gestural poses, this book explores and explains the process o....
Release Date 2018/02 -
Information Governance for Healthcare Professionals
Author Robert F. Smallwood
Like other critical organizational assets, information is a strategic asset that requires high level of oversight in order to be able to effectively use it for organizational decision-making, performance improvement, cost management, and risk mitigation.Adopting an....
Release Date 2018/09 -
Advanced API Security: OAuth 2.0 and Beyond
Author Prabath Siriwardena
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is conv....
Release Date 2019/12 -
Change Manager - Careers in IT service management
Author Tracey Torble
Change management is about the control of all changes that have an effect on the IT services and hence, the business of an organisation. This practical book describes the change manager role in depth including purpose, typical responsibilities and required skills. ....
Release Date 2019/07 -
Information Security Risk Management for ISO 27001/ISO 27002, third edition
Author Alan Calder , Steve Watkins
Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework f....
Release Date 2019/08 -
ISO 27001 controls – A guide to implementing and auditing
Author Bridget Kenyon
Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001. Show and h....
Release Date 2019/09