-
Author David Seidl , Mike Chapple
1,000 practice questions for smart CompTIA CySA+ preparationCompTIA CySA+ Practice Tests provides invaluable preparation for the Cybersecurity Analyst exam CS0-001. With 1,000 questions covering 100% of the exam objectives, this book offers a multitude of opportuni....
Release Date 2018/02 -
Elementary Information Security, 3rd Edition
Author Richard E. Smith
An ideal text for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cyber security and technology. Thoroughly updated with an increase....
Release Date 2019/09 -
Microservices Security in Action
Author Wajjakkara Kankanamge Anthony Nuwan Dias , Prabath Siriwardena
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you’ve learned i....
Release Date 2020/08 -
Author David Sutton
Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Release Date 2022/12 -
Mastering Metasploit - Third Edition
Author Nipun Jaswal
Discover the next level of network defense with the Metasploit frameworkAbout This BookGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop exploits, and generate modules ....
Release Date 2018/05 -
Web Penetration Testing with Kali Linux - Third Edition
Author Juned Ahmed Ansari , Gilberto Najera-Gutierrez
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holesAbout This BookKnow how to set up your lab with Kali LinuxDiscover the core concepts of web penetration testin....
Release Date 2018/02 -
CCNA Routing and Switching Complete Review Guide, 2nd Edition
Author Todd Lammle
Tight, focused CCNA review covering all three examsThe CCNA Routing and Switching Complete Review Guide offers clear, concise review for Exams 100-105, 200-105, and 200-125. Written by best-selling certification author and Cisco guru Todd Lammle, this guide is your....
Release Date 2016/12 -
Author Laura B. Madsen
Data governance is broken. It's time we fix it. Why is data governance so ineffective? The truth is data governance programs aren't designed for the way we run our data teams, they aren't even designed for a modern organization at all. They were designed ....
Release Date 2020/01 -
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless netwo....
Release Date 2019/11 -
The Complete Coding Interview Guide in Java
Author Anghel Leonard
Explore a wide variety of popular interview questions and learn various techniques for breaking down tricky bits of code and algorithms into manageable chunksKey FeaturesDiscover over 200 coding interview problems and their solutions to help you secure a job as a Java dev....
Release Date 2020/08 -
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance, Second Edition
Author Omar Santos , Jazib Frahim - CCIE No. 5459
For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide t....
Release Date 2009/12 -
Author Alexey Kleymenov , Amr Thabet
Master malware analysis to protect your systems from getting infectedKey FeaturesSet up and model solutions, investigate malware, and prevent it from occurring in future Learn core concepts of dynamic malware analysis, memory forensics, decryption, and much more A pract....
Release Date 2019/06 -
Author Eric C. Thompson
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecu....
Release Date 2020/02 -
Python Ethical Hacking from Scratch
Explore the world of practical ethical hacking by developing custom network scanning and remote access tools that will help you test the system security of your organizationKey FeaturesGet hands-on with ethical hacking and learn to think like a real-life hackerBuild practical ethical hacking tools f.... -
Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Author Andrew Ossipov , Omar Santos , Jazib Frahim
Cisco® ASAAll-in-One Next-Generation Firewall, IPS, and VPN Services, Third EditionIdentify, mitigate, and respond to today’s highly-sophisticated network attacks.Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA:....
Release Date 2014/04 -
Weirdos in the Workplace: The New Normal… Thriving in the Age of the Individual
Author John Putzier - M.S. , SPHR
“The author has hit on something here; particularly the fact that it is high time we quit thinking that treating everyone the same is somehow fair. Like it or not, the realities uncovered in this book are just that...real! And if you plan to be a significant player....
Release Date 2004/07 -
How Cybersecurity Really Works
You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversarie.... -
Author Mike Chapple
Ace the CompTIA Security+ exam with over 700 practice exam questions written using the style and format of the Security+ examKey FeaturesGet a detailed breakdown of the type of questions and the exam environmentDiscover a step-by-step process that guides you throug....
Release Date 2019/10 -
Author Chad Sullivan
Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention SystemSecure your endpoint systems with host IPSBuild and manipulate policies for the systems you wish to protectLearn how to use groups and hosts....
Release Date 2005/06 -
Exam Ref MS-500 Microsoft 365 Security Administration
Author Ed Fisher , Nate Chamberlain
Prepare for Microsoft Exam MS-500: Demonstrate your real-world knowledge of Microsoft 365 security implementation and administration, including identity, access, threat and information protection, governance, and compliance. Designed for professionals with Microsoft secur....
Release Date 2020/09 -
Author Mukund Chaudhary , Abhishek Chopra
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the tim....
Release Date 2019/12 -
Protecting Your Web Applications
Author Ken Hess , Gary Sloper
Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical eboo....
Release Date 2019/06 -
Data Protection and Compliance, 2nd Edition
Author Stewart Room , Michelle Maher , Niall O'Brien , Adam Panagiotopoulos , Shervin Nahid
This comprehensive guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to operationalise a truly risk-based approach to data protection and compliance, beyond just emphasis on regulatory frameworks and legalistic complia....
Release Date 2021/11 -
CISSP Cert Guide, Second Edition
Author Troy McMillian , Robin Abernathy
In this best-of-breed study guide, two leading experts help you master all the topics you need to know to succeed on your CISSP exam and advance your career in IT security. Their concise, focused approach explains every exam objective from a real-world perspective, ....
Release Date 2016/06 -
Author Lee Reiber
Master the tools and techniques of mobile forensic investigationsConduct mobile forensic investigations that are legal, ethical, and highly effective using the detailed information contained in this practical guide. Mobile Forensic Investigations: A Guide to Eviden....
Release Date 2018/12 -
The Trouble With Corporate Compliance Programs
Author Maurice E. Stucke , David Wasieleski , John Dienhart , Sean J. Griffith , Tom R. Tyl
Multinational corporations spend millions of dollars per year on compliance. In highly regulated industries, such as health care and finance, large companies spend much more, sometimes hiring hundreds or even thousands of compliance officers at a time. There is oft....
Release Date 2017/10 -
The Official (ISC)2 CCSP CBK Reference, 3rd Edition
The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated.Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the clou.... -
Author Aalseth
In clear and straightforward language, Medical Coding: What It Is and How It Works, Second Edition provides an overview of the evolution of medical coding and all the various coding systems, how they relate, and how they function. Reasoning and consequences of the d....
Release Date 2014/08 -
Official (ISC)2 Guide to the CSSLP
Author Mano Paul
As the global leader in information security education and certification, (ISC)2® has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP®) is a t....
Release Date 2015/09