-
Enterprise Mobility Suite Managing BYOD and Company-Owned Devices
Author Yuri Diogenes , Jeff Gilbert
Manage all the mobile devices your workforce relies on Learn how to use Microsoft’s breakthrough Enterprise Mobility Suite to help securely manage all your BYOD and company-owned mobile devices: Windows, iOS, and Android. Two of the leading mobile device management ....
Release Date 2015/04 -
Fundamentals of Information Systems Security
Author Michael G. Solomon , David Kim
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems....
Release Date 2010/11 -
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Author Eric C. Thompson
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and....
Release Date 2018/09 -
Theoretical Cybersecurity: Principles and Advanced Concepts
Author Jacob G. Oakley , Michael Butler , Wayne York , Matthew Puckett , J. Louis Sewell
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract an....
Release Date 2022/07 -
Author Steven Bolt
XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evide....
Release Date 2011/02 -
Author Larry Cor , Jack Foster
Innovative, original ideas are a company's most powerful competitive advantage. Nathan Mhyrvold, former chief technology officer at Microsoft, has said that a great employee is worth 1,000 times more than an average one simply because of his or her ideas. In I....
Release Date 2001/11 -
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. -
Hands-On Cryptography with Python
Author Samuel Bowne
Learn to evaluate and compare data encryption methods and attack cryptographic systemsAbout This BookExplore popular and important cryptographic methodsCompare cryptographic modes and understand their limitationsLearn to perform attacks on cryptographic systemsWho ....
Release Date 2018/06 -
Building Internet Firewalls, 2nd Edition
Author D. Brent Chapman , Simon Cooper , Elizabeth D. Zwicky
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their product....
Release Date 2000/06 -
Cryptography InfoSec Pro Guide
Author Sean-Philip Oriyano
Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques.
Release Date 2013/07 -
Application of Big Data for National Security
Author Babak Akhgar , Gregory B. Saathoff , Hamid R. Arabnia , Richard Hill , Andrew Stanif
Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combin....
Release Date 2015/02 -
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+™ Skills, Third Edition
Author Michael Gregg , David R. Miller
A step-by-step guide to the tasks involved in security administrationIf you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by s....
Release Date 2011/06 -
CBRN and Hazmat Incidents at Major Public Events: Planning and Response
Author Dan Kaszeta
Sets forth what to do and what not to do to keep people and property safeBased on the author's more than two decades of managing core facets of emergency planning and response, this book enables readers to minimize the possibility of a chemical, biological, radiolo....
Release Date 2012/11 -
CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition
This up-to-date study aid contains hundreds of accurate practice questions and detailed answer explanationsCompTIA Security+™ Certification Practice Exams, Fourth Edition (Exam SY0-601) is filled with more than 1000 realistic practice questions—including new performance-based questions—to prepare yo.... -
Author Tim Strazzere , Jose Andre Morales , Manu Quintans , Shane Hartman , Ken Dunham
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach t....
Release Date 2014/10 -
Author Kimi Ziemski , Kathleen B. Hass , Richard VanderHorst , Lori Lindbergh
Become equipped with the principles, knowledge, practices, and tools need to assume a leadership role in an organization. From Analyst to Leader: Elevating the Role of the Business Analyst uncovers the unique challenges for the business analyst to transition from a....
Release Date 2007/12 -
Author Ryan Lindfield
CCSP SNAA Quick Reference (Digital Short Cut)Ryan LindfieldISBN-10: 1-58705-877-4ISBN-13: 978-1-58705-877-6As a final exam preparation tool, the CCSP SNAA Quick Reference provides a concise review of all objectives on the SNAA exam (642-515). This digital Short Cut ....
Release Date 2009/02 -
Author Alexandre M.S.P Moraes
Cisco FirewallsConcepts, design and deployment for Cisco Stateful Firewall solutions¿“ In this book, Alexandre proposes a totally different approach to the important subject of firewalls: Instead of just presenting configuration models, he uses a set of carefully c....
Release Date 2011/06 -
Author Joseph L. Badaracco Jr.
When Business and Personal Values CollideDefining moments” occur when managers face business decisions that trigger conflicts with their personal values. These moments test a person’s commitment to those values and ultimately shape their character. But these are a....
Release Date 2016/08 -
Fully Compliant: Compliance Training to Change Behavior
Author Travis Waugh
A Better Kind of Compliance TrainingCompliance training succeeds when you balance the needs of not just the organization but also the employees who you hope will learn and change their behavior. In Fully Compliant, Travis Waugh challenges traditional compliance tr....
Release Date 2019/06 -
Author Chris McNab
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of sy....
Release Date 2004/03 -
Author Christian Collberg , Jasvir Nagra
“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.” —Mikhail Atallah, Distinguished Professor of Computer Sci....
Release Date 2009/07 -
The CERT® C Secure Coding Standard
Author Robert C. Seacord
“I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CER....
Release Date 2008/10 -
Author Steve Cockram , Jeremie Kubicek
Become the leader others want to followForget everything you know about motivating others and building a harmonious workplace. If you want to get the best out of people, you must be willing to fight. But, that doesn't mean you become a dominator, nor does coddling....
Release Date 2019/03 -
CCSP Certified Cloud Security Professional Practice Exams
Author Daniel Carter
Don’t Let the Real Test Be Your First Test!This highly effective self-study guide covers all six domains of the challenging Certified Cloud Security Professional exam as well as the CCSP Common Body of Knowledge, developed by the International Information Systems S....
Release Date 2018/03 -
Author Dwayne Williams , Gregory B. White , Wm. Arthur Conklin , Nicholas Lane
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Complete coverage of every topic on the CompTIA Advanced Security Practition....
Release Date 2019/05 -
Cracking Security Misconceptions
Author Andrew Peterson
As stories continue to mount about security breaches in organizations and government agencies—such as the 2016 US Department of Justice hack—many people believe there’s really nothing they can do about it. Fact is, you can do quite a bit. In this report, security p....
Release Date 2016/09 -
Security Monitoring with Cisco Security MARS
Author Greg Kellogg , Gary Halleen
Security Monitoring with Cisco Security MARSThreat mitigation system deploymentGary HalleenGreg KelloggNetworks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worm....
Release Date 2007/07 -
A Primer on Corporate Governance
Author Alessandro Zattoni , Andrea Melis
This book provides an understanding of the characteristics of corporate governance in Italy, one of the most developed countries in the world, symbol of the family capitalism. The text presents the main peculiarities of the Italian corporate governance system, its ....
Release Date 2017/06 -
Hands-on Incident Response and Digital Forensics
Author Mike Sheward
Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what follows - a scientific investigation into the causes o....
Release Date 2018/07