-
Author Tsinghua University Tsinghua University Press , Dengguo Feng
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such ....
Release Date 2017/12 -
Author W. Curtis Preston
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quic....
Release Date 2002/02 -
Author Michael Gregg
A new edition of this title is available, ISBN-10: 0789738066 ISBN-13: 9780789738066Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam....
Release Date 2005/09 -
Network Forensics: Tracking Hackers through Cyberspace
Author Jonathan Ham , Sherri Davidoff
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadm....
Release Date 2012/06 -
Author Soren Kenner , Imran Rashid
Authors Imran Rashid and Soren Kenner have sparked an international debate by revealing the “mind hacks” Facebook, Apple, Google, and Instagram use to get you and your children hooked on their products. In Offline, they deliver an eye-opening research-based journey....
Release Date 2019/02 -
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
Author Ben Malisow
The only official study guide for the new CCSP examCCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare fas....
Release Date 2017/05 -
Author Allison Cerra
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can tak....
Release Date 2019/09 -
CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition, 2nd Edition
Author Daniel Carter
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Comprehensive coverage of every domain on the CCSP exam This highly effect....
Release Date 2019/12 -
Big Data Analytics with Applications in Insider Threat Detection
Author Latifur Khan , Mohammad Mehedy Masud , Pallabi Parveen , Bhavani Thuraisingham
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malwa....
Release Date 2017/11 -
Reducing MTTD for High-Severity Incidents
Author Jordan Pritchard , Ramin Keene , Rodney Lester , Jay Holler , Michael Kehoe , Tammy B
For companies such as Amazon, Dropbox, and Gremlin, the term high severity incident (SEV) signifies drops in network availability, product feature issues, data loss, revenue loss, and security risks. These high-impact bugs occur when coding, automation, testing, an....
Release Date 2018/12 -
Business Continuity and Disaster Recovery for InfoSec Managers
Author James F. Ransome , PhD , CISM , CISSP , John Rittinghouse , PhD , CISM
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses t....
Release Date 2005/09 -
Mastering Malware Analysis - Second Edition
Author Alexey Kleymenov , Amr Thabet
Learn effective malware analysis tactics to prevent your systems from getting infectedKey FeaturesInvestigate cyberattacks and prevent malware-related incidents from occurring in the futureLearn core concepts of static and dynamic malware analysis, memory forensics, decryption, and much moreGet prac....
Release Date 2022/09 -
Data Protection vs. Freedom of Information
Author Paul Ticher
How would you respond to a freedom of information request, whilst ensuring compliance with the Data Protection Act?Get clear and practical guidance on this key data governance issue!Freedom of information is often mentioned in the same breath as data protection. In ....
Release Date 2008/11 -
Validating Your Business Continuity Plan: Ensuring your BCP actually works
Author Robert Clark
75% of companies without a business continuity plan fail within three years. Disruptive incidents can affect any organization and occur at any moment. ICT outages, cyber attacks, natural disasters, terrorist attacks, pandemics, supply chain failures and other unex....
Release Date 2015/11 -
Author Pravir Chandra , Matt Messier , John Viega
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol fo....
Release Date 2002/06 -
CompTIA Security+ All-in-One Exam Guide (Exam SY0-401), 4th Edition
Author Greg White , Wm. Arthur Conklin , Chuck Cothren , Roger Davis , Dwayne Williams
Get complete coverage of all objectives included on the latest release of the CompTIA Security+ exam from this comprehensive resource. Cowritten by leading information security experts, this authoritative guide fully addresses the skills required for securing a netw....
Release Date 2014/12 -
A Practical Guide to Computer Forensics Investigations
Author Darren R. Hayes
All you need to know to succeed in digital forensics: technicalandinvestigative skills, in one bookComplete, practical, and up-to-dateThoroughly covers digital forensics for Windows, Mac, mobile, hardware, and networksAddresses online and lab investigations, documen....
Release Date 2014/12 -
Legal Competence in Environmental Health
Author Terence Moran
Legal Competence in Environmental Health assists the environmental health professional in understanding the operation of English law and navigating through some of its complexities. It covers those aspects of the work which are regulated by legal principles but not ....
Release Date 1997/11 -
Author William L. Sparks , Peter C. Browning
Directors: Improve Board PerformanceThe Director's Manual: A Framework for Board Governance offers current and aspiring board members essential up-to-date governance guidance that blends rigorous research-based information with the wisdom found only through practi....
Release Date 2016/02 -
Author Brad Hibbert , Morey J. Haber
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, ev....
Release Date 2018/06 -
Author Amanda Berlin , Lee Brotherston
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to ....
Release Date 2017/04 -
Author Michael Collins
Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company’s network. In many organizations, security analysts initiate threat hunting when they spot something weird—network conditions or activ....
Release Date 2018/05 -
Author Andrew Hoffman
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both defensive and offensive security concepts that software engineers can easily ....
Release Date 2020/06 -
Author Larry Cor , Jack Foster
Innovative, original ideas are a company's most powerful competitive advantage. Nathan Mhyrvold, former chief technology officer at Microsoft, has said that a great employee is worth 1,000 times more than an average one simply because of his or her ideas. In I....
Release Date 2001/11 -
The Social Leader: Redefining Leadership for the Complex Social Age
Author Sudhanshu Palsule , Frank Guglielmo
Technology, global economics, and demographics are colluding to create workspaces that thrive on communities rather than hierarchies. Our industrial paradigm with its roots in the military is swiftly being replaced by a paradigm based on networks that are held toget....
Release Date 2014/09 -
Digital Forensics and Incident Response - Second Edition
Author Gerard Johansen
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident r....
Release Date 2020/01 -
Author Alan Calder
An Introduction to IT GovernanceIf you are unsure what IT governance is, or how it is relevant to your business, this pocket guide is for you. It outlines the key drivers for IT governance in the modern global economy, with particular reference to corporate governan....
Release Date 2007/05 -
Author Dr Sabina Dosani , Infinite Ideas
Defeat depression tackles this greatly misunderstood condition head on with over 50 inspirational ideas from a psychiatrist who struggled with and overcame depression as a young adult. Defeat depression offers a real insight into the condition with practical, tried ....
Release Date 2011/12 -
Cryptography and Network Security
Author S. Bose , Ajay Kumar
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map th....
Release Date 2016/03 -
Hardware Hacking Projects for Geeks
Author Scott Fullam
Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and....
Release Date 2004/01