-
Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition
Author Aamir Lakhani , Joseph Muniz
Investigating the Cyber BreachThe Digital Forensics Guide for the Network EngineerUnderstand the realities of cybercrime and today’s attacksBuild a digital forensics lab to test tools and methods, and gain expertiseTake the right actions as soon as you discover a b....
Release Date 2018/02 -
Author Darril Gibson
Assess your readiness for the CISSP Exam—and quickly identify where you need to focus and practice. This practical, streamlined guide provides objective overviews, exam tips, "need-to-know" checklists, review questions, and a list of valuable resources—all designed ....
Release Date 2012/12 -
Information Governance: Concepts, Strategies, and Best Practices
Author Robert F. Smallwood
Proven and emerging strategies for addressing document and records management risk within the framework of information governance principles and best practicesInformation Governance (IG) is a rapidly emerging "super discipline" and is now being applied to electronic....
Release Date 2014/04 -
CISSP Official (ISC)2 Practice Tests, 2nd Edition
Author David Seidl , Mike Chapple
Full-length practice tests covering all CISSP domains for the ultimate exam prepThe (ISC)2 CISSP Official Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain....
Release Date 2018/06 -
CISSP Practice Exams, Fifth Edition, 5th Edition
Author Jonathan Ham , Shon Harris
Fully updated coverage of the 2018 CISSP exam, including 1250+ in-depth practice questionsTake the 2018 version of the challenging CISSP exam with confidence using this up-to-date, exam-focused study resource. Designed as a companion to CISSP All-in-One Exam Guide,....
Release Date 2018/11 -
CompTIA Cloud+ Certification All-in-One Exam Guide (Exam CV0-003)
Complete coverage of every objective for the CompTIA Cloud+ examTake the CompTIA Cloud+ exam with confidence using this highly effective self-study guide. CompTIA Cloud+™ Certification All-in-One Exam Guide (Exam CV0-003) offers complete coverage of every topic on the latest version of the exam. You.... -
Auditing IT Infrastructures for Compliance, 3rd Edition
Author Robert Johnson , Marty Weiss , Michael G. Solomon
The third edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how t....
Release Date 2022/10 -
Penetration Testing: A Survival Guide
Author Mohammed A. Imran , Srinivasa Rao Kotipalli , Juned Ahmed Ansari , Bo Weaver , Wolf
A complete pentesting guide facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxGain a deep understanding of the flaws in web applications and exploit them ....
Release Date 2017/01 -
Establishing an occupational health & safety management system based on ISO 45001
Author Naeem Sadiq
This book provides a comprehensive explanation of the detailed requirements of ISO 45001. The author draws out key parts of the Standard, which can often be confusing for non-experts or newcomers to ISO standards, and explains what they mean and how to comply. ....
Release Date 2019/09 -
Author Kumaraguru Velmurugan , Mounir Hahad , Abhijit Mohanta
Your one-stop guide to know digital extortion and it's prevention.About This BookA complete guide to how ransomware worksBuild a security mechanism to prevent digital extortion.A practical approach to knowing about, and responding to, ransomware.Who This Book Is F....
Release Date 2018/03 -
Hands-On Software Engineering with Python
Author Brian Allbee
Explore various verticals in software engineering through high-end systems using PythonKey FeaturesMaster the tools and techniques used in software engineering Evaluates available database options and selects one for the final Central Office system-components Exper....
Release Date 2018/10 -
CompTIA Security+ Certification Guide
Author Ian Neil
This is a practical certification guide covering all the exam topics in an easy-to-follow manner backed with mock tests and self-assesment scenarios for better preparation.Key FeaturesLearn cryptography and various cryptography algorithms for real-world implementat....
Release Date 2018/09 -
iOS Forensics for Investigators
Author Gianluca Tiepolo
Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey FeaturesExplore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts, recover deleted mobile data, and investigate p....
Release Date 2022/05 -
Author Roberta Bragg - CISSP
The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multip....
Release Date 2002/11 -
Gray Hat Hacking The Ethical Hacker’s Handbook
Author Jonathan Ness , Chris Eagle , Shon Harris , Gideon Lenkey , Allen Harper , Terron Wil
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker'....
Release Date 2011/01 -
97 Things Every Information Security Professional Should Know
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn h.... -
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Author Maciej Machulak , Michael Schwartz
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate y....
Release Date 2018/12 -
Author Jean-Philippe Aumasson
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, bl....
Release Date 2017/11 -
How to Defeat Advanced Malware
Author Simon Cros , Henry Dalziel
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverage....
Release Date 2014/12 -
The Truth About Computer Scams
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.What you must know about Internet scams: from phishing and Trojan horses to fake death threats!After installed on your computer, T....
Release Date 2010/11 -
Author Omar Santos , John Stuppi
CCNA Security 210-260 Official Cert GuideCCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security exp....
Release Date 2015/09 -
E-Health Care Information Systems: An Introduction for Students and Professionals
Author Joseph Tan
E-Health Care Information Systems is a comprehensive collection written by leading experts from a range of disciplines including medicine, health sciences, engineering, business information systems, general science, and computing technology. This easily followed tex....
Release Date 2005/05 -
Cloud Native Application Security
Cloud native applications do more than just run on a different platform. The entire scope of these applications is different, including the methodologies and skills used to build them. Security practices for these applications need a transformation of equal magnitude. With this report, you'll learn.... -
Information Governance, 2nd Edition
Author Robert F. Smallwood
The essential guide to effective IG strategy and practiceInformation Governance is a highly practical and deeply informative handbook for the implementation of effective Information Governance (IG) procedures and strategies. A critical facet of any mid- to large-si....
Release Date 2019/12 -
CompTIA CySA+ Study Guide Exam CS0-002, 2nd Edition
Author Mike Chapple , David Seidl
This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics!Where can you find 100% coverage of the revised CompTIA Cybersecurity Analyst+ (CySA+) e....
Release Date 2020/07 -
Distributed Denial of Service (DDoS)
Author Rich Groves , Eric Chou
Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to ....
Release Date 2018/04 -
Author Jan Yager , Fred Yager
Along with Medicare, Social Security is one of the "rites of passage" as older Americans retire. After contributing funds to this program their entire working life, people are anxious to start getting their monthly checks. Following a brief look at why Social Secur....
Release Date 2015/04 -
Author Vimal Kumar , Amartya Sen , Sanjay Madria
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It ....
Release Date 2018/12