Security Books
Browse our extensive library of books and Book Summaries.
-
Book
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd EditionIn this book, you'll learn Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations, and Software Development Security.
By Darril Gibson, David Seidl, James Michael Stewart, Mike Chapple
-
Book
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests, Second EditionGiving you the advantage of full and complete preparation, this in-depth study guide provides 1,300 unique questions with detailed answers and explanations to help you solidify your knowledge in advance of taking the CISSP exam.
By David Seidl, Mike Chapple
-
Book
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 9th EditionIn this book, you'll learn to prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more.
By Darril Gibson, James Michael Stewart, Mike Chapple
-
Book
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice TestsWith two complete practice tests to assess your readiness to take the exam, this book covers each of the seven domains on the SSCP exam with sixty or more questions per domain, so you can focus your study efforts exactly where you need more review.
By David Seidl, Mike Chapple
-
Book
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests, 2nd EditionThis book's first seven chapters cover each of the seven domains on the SSCP exam with sixty or more questions per domain, so you can focus your study efforts exactly where you need more review.
By David Seidl, Mike Chapple
-
Book
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd EditionThe SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures.
By Michael S. Wills
-
Book
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, Second EditionIf you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this guide gets you prepared to pass the exam and enter the information security workforce with confidence.
By Mike Wills
-
Book
10 Dont's on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and PrivacyThrough ten vignettes told in accessible language and illustrated with helpful screenshots, this engaging book teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy.
By Daniel G. Bachrach, Eric J. Rzeszut
-
Book
70 Tips and Tricks for Mastering the CISSP ExamLearn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter.
By R. Sarma Danturthi
-
Book
8 Steps to Better Security: A Simple Cyber Resilience Guide for BusinessPerfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.
By Kim Crawley
-
Book
802.11 Wireless Networks: Security and AnalysisDemonstrating how to configure equipment in order to implement various network solutions, this unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards.
By Alan Holt, Chi-Yu Huang
-
Book
802.11 WLANs and IP Networking: Security, QoS, and MobilityFully addressing the most critical WLAN and Wireless IP issues today, this practical book provides guidance on deployment, insights on interworking with 3G mobile communications systems, and discussions on the market and business aspects of WLANs.
By Anand R. Prasad, Neeli R. Prasad
-
Book
A Classical Introduction to Cryptography: Applications for Communications SecurityBy providing appropriate mathematical concepts to prove or break the security of cryptographic schemes, this advanced-level text introduces fundamentals of information and communication security.
By Serge Vaudenay
-
Book
A Complete Guide to Burp Suite: Learn to Detect Application VulnerabilitiesUse this comprehensive guide to learn the practical aspects of Burp Suite-from the basics to more advanced topics. This book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps.
By Sagar Rahalkar
-
Book
A Comprehensive Guide for Web3 Security: From Technology, Economic and Legal AspectsThis book highlights the security related to foundational Web3 building blocks such as blockchain, crypto wallets, smart contracts, and token economics, and describes recommended security processes and procedures for Web3 application development such as DevSecOps, data analytics, and data authenticity via the oracle.
By Dyma Budorin, Ken Huang, Lisa JY Tan, Winston Ma, Zhijun William Zhang
-
Book
A Comprehensive Guide to 5G SecurityProviding a comprehensive guide to state-of-the-art in 5G security theory and practice, this insightful resource covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks.
By Ahmed Bux Abro, Andrei Gurtov (eds), Ijaz Ahmad, Madhusanka Liyanage, Mika Ylianttila
-
Book
A Comprehensive Look at Fraud Identification and PreventionPresenting proven tips, advice, and recommendations for fraud awareness, protection, and prevention, this book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.
By James R. Youngblood
-
Book
A Dictionary of Information Security Terms, Abbreviations and AcronymsIf you don't know the difference between a cookie and a worm, or war-chalking and digital watermarking, this enlightening guide will provide you with authoritative explanations of those information security terms that are used across the ISO framework.
By Alan Calder, Steve G. Watkins
-
Book
A Guide to Effective Internal Management System Audits: Implementing Internal Audits as a Risk Management ToolProviding a model for the management and implementation of internal audits, this book shows how you can transform your internal auditing process to become a tool for development and continual improvement in your management systems.
By Andrew W. Nichols
-
Book
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)Presenting a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0, this book details the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly.
By Anne Kohnke, Dan Shoemaker, Ken Sigler
-
Book
A Machine Learning Approach to Phishing Detection and DefenseHelping your business or organization avoid costly damage from phishing sources, this thorough guide demonstrates how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats.
By Elahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi
-
Book
A Practical Guide to Security AssessmentsWith a focus on the fundamental process areas of security, this step-by-step text provides a methodology for security practitioners to uncover security weaknesses in existing business processes.
By Sudhanshu Kairab
-
Book
A Practical Guide to the Payment Card Industry Data Security Standard (PCI DSS)Preview Chapter 1 of A Practical Guide to the Payment Card Industry Data Security Standard (PCI DSS). This sample content provides an overview the PCI DSS and features the full first chapter titled "Understanding the Payment Card Industry."
By ISACA
-
Book
A Semantic Web Primer, Third EditionIncluding exercises, project descriptions, and annotated references to relevant materials, this text provides an introduction to the continuously evolving field of the Semantic Web, and describes its key ideas, languages, and technologies.
By Frank van Harmelen, Grigoris Antoniou, Paul Groth, Rinke Hoekstra
-
Book
AAA Identity Management SecurityPresenting pitfalls, warnings, and tips throughout, this book is a complete, authoritative, single-source guide to implementing, configuring, and managing AAA identity management with CiscoSecure Access Control Server (ACS) 4 and 5.
By Brandon J. Carroll, Premdeep Banga, Vivek Santuka
-
Book
Access Control Systems: Security, Identity Management and Trust ModelsDetailing access control mechanisms that are emerging with the latest Internet programming technologies, this thorough text provides an introduction to the foundations of programming systems security, identity management, trust models, and much more.
By Messaoud Benantar
-
Book
Adaptive Autonomous Secure Cyber Systemsk establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment.
By Sushil Jajodia
-
Book
Advanced Malware AnalysisA critical resource for every information security professional's anti-malware arsenal, this must-read guide offers proven troubleshooting techniques and will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware.
By Christopher C. Elisan
-
Book
Advanced Penetration Testing with Kali Linux: Unlocking Industry-Oriented VAPT TacticsThis book is a comprehensive guide to Vulnerability Assessment and Penetration Testing (VAPT), designed to teach and empower readers of all cybersecurity backgrounds.
By Ummed Meel
-
Book
Advanced Penetration Testing: Hacking the World's Most Secure NetworksFeaturing techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments.
By Wil Allsopp
-
Book
Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction StrategiesUsing such recent high profile cases as Target, Sony, and Home Depot, this important book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.
By Araceli Treu Gomes, Ira Winkler
-
Book
Advanced Persistent Threat: Understanding the Danger and How to Protect Your OrganizationDiscussing the critical information that readers need to know about Advanced Persistent Threat (APT) and how to avoid being a victim, this book reveals how attackers are breaking into systems and what to do to protect and defend against these intrusions.
By Eric Cole
-
Book
Advanced Persistent Training: Take Your Security Awareness Program to the Next LevelSecurity policies and procedures are often times inconvenient, technically complex, and hard to understand. This unique resource provides numerous tips from a wide range of disciplines to handle these especially difficult situations.
By Jordan Schroeder
-
Book
Advances in Biometrics for Secure Human Authentication and RecognitionFilled with comprehensive graphical and modular illustrations, this text provides an up-to-date review of intelligence techniques and theories used in biometric technologies for secure human authentication and identification.
By Dakshina Ranjan Kisku, Jamuna Kanta Sing (eds), Phalguni Gupta
-
Book
Advances in Face Presentation Attack Detection, 2nd Edition 2023This book revises and expands upon the prior edition of Multi-Modal Face Presentation Attack Detection. The authors begin with fundamental and foundational information on face spoofing attack detection, explaining why the computer vision community has intensively studied it for the last decade.
By Guodong Guo, Hugo Jair Escalante, Jun Wan, Sergio Escalera, Stan Z. Li
-
Book
Agile Governance and Audit: An Overview for Auditors and Agile TeamsBridging the gap between traditional auditing approaches and the requirements of Agile methodologies, this book tells Agile teams what auditors and risk professionals need, and the sort of questions they are likely to ask.
By Christopher Wright
-
Book
Algorithms and Data Structures for Massive DatasetsAlgorithms and Data Structures for Massive Datasets reveals a toolbox of new methods that are perfect for handling modern big data applications.
By Dzejla Medjedovic, Emin Tahirovic, Ines Dedovic
-
Book
All-in-One CCIE Security V5.0: Written Exam 400-251 Cert Guide, 3rd EditionIncluding Exam Essentials sections in each chapter to help reinforce key concepts, this all-purpose CCIE study guide methodically and precisely covers all of the objectives of the CCIE Security Written 400-251 V5.0 exam.
By Paul Adam
-
Book
All-in-One Implementing and Operating Cisco Security Core Technologies: SCOR 350-701 V1.0 Core ExamIncluding all of the topics from Cisco's official exam blueprint, this book carefully covers the content with core concepts, code snippets and topic summaries to help you master the skills so you can confidently face the pressures of the Cisco exam as well as their real-world application.
By Muhammad Afaq Khan
-
Book
Android Security Internals: An In-Depth Guide to Android's Security ArchitectureTaking us under the hood of the Android security system, this book describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.
By Nikolay Elenkov
-
Book
Anti-Spam Techniques Based on Artificial Immune SystemIntroducing research on anti-spam techniques based on the artificial immune system (AIS) to identify and filter spam, this authoritative book provides a centralized source of detailed information on efficient models and algorithms of AIS-based anti-spam techniques
By Ying Tan
-
Book
Application Security in the ISO 27001:2013 Environment, 2nd EditionDescribing the methods used by criminal hackers to attack organizations via their web applications, this book explains how organisations can implement and maintain effective security practices to protect their web applications - and the servers on which they reside - as part of a wider information security management system.
By Vinod Vasudevan, et al.
-
Book
Application Security Program Handbook: A Guide for Software Engineers and Team LeadersThe Application Security Program Handbook delivers effective guidance on establishing and maturing a comprehensive software security plan. In it, you'll master techniques for assessing your current application security, determining whether vendor tools are delivering what you need, and modeling risks and threats.
By Derek Fisher
-
Book
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 20th Anniversary EditionIncluding source-code listings and extensive advice, this definitive reference covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms.
By Bruce Schneier
-
Book
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureProviding an in-depth explanation of the potential of the Smart Grid, this insightful resource provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
By Eric D. Knapp, Raj Samani
-
Book
Applied Incident ResponseThis book discusses effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them.
By Steve Anson
-
Book
Applied Network Security Monitoring: Collection, Detection, and AnalysisProviding an essential guide to becoming a Network Security Monitoring (NSM) analyst from the ground up, this practical book takes a fundamental approach, complete with real-world examples that teach you the key concepts of NSM.
By Chris Sanders, Jason Smith
-
Book
Architecture & Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children, Second EditionUsing the concept of design patterns, this book presents dozens of visual models documenting challenging problems in integrating IT management, showing how process, data, and IT management systems must work together to enable IT and its business partners.
By Charles Betz
-
Book
ASN.1 CompleteA technical guide and reference to ASN.1, a standard language often used to describe data protocols.
By John Larmouth
-
Book
Assessing Information Security: Strategies, Tactics, Logic and Framework, Second EditionProviding expert guidance on information security, underpinned by a profound understanding of human conflict, this book draws on the work of Clausewitz and Sun Tzu, and applies it to the understanding of information security.
By Andrew Vladimirov, Andriej Michajlowski, Konstantin Gavrilenko
-
Book
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect OrganizationsHelping you to get ahead of threats and protect your organization with an effective asset protection strategy, this essential resource will help you build a vulnerability management program designed to work in the modern threat environment.
By Brad Hibbert, Morey J. Haber
-
Book
Asset Protection Through Security AwarenessSupplying a high-level overview of how to protect your company's physical and intangible assets, this concise guide explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks.
By Tyler Justin Speed
-
Book
Asterisk For DummiesPresenting essential tools to create and maintain an economical Asterisk phone system from scratch, this invaluable guide shows how to choose and install the right hardware, handle necessary programming to set up the system, and keep it running smoothly.
By Brady Kirby, Stephen P. Olejniczak
-
Book
Asterisk HackingWith power tips that show how to make the most out of the phone system, this guide teaches readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat.
By Ben Chapman, Champ Clark
-
Book
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and ExploitationA deep dive into network protocol security, this comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities.
By James Forshaw
-
Book
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-EspionageThis book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind.
By Dr. Timo Steffens
-
Book
Audit Effectiveness: Meeting the IT ChallengeShedding light on practical subjects such as audit automation, continuous online auditing and computer auditing, this book introduces some theory that helps explain the motivation for the use of new tools and techniques, and assists understanding of their impact on the quality of audit judgment.
By Kamil Omoteso
-
Book
Auditing IT Infrastructures for Compliance, Third EditionThis book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure business and consumer privacy data. Using examples and exercises, this book incorporates hands-on activities to prepare readers to skillfully complete IT compliance auditing.
By Marty Weiss, Michael G. Solomon, Robert Johnson
-
Book
Auditor's Guide to Information Systems AuditingEmphasizing the practical implementation of principles and techniques through the use of realistic case studies, this book was written for those who need to gain a working knowledge of the risks and control opportunities within an IP environment.
By Richard E. Cascarino
-
Book
Authentication and Access Control: Practical Cryptography Methods and ToolsDiscussing fundamental mistakes and vulnerabilities from classic authentication protocols and the future of authentication technologies, this book shows you how authentication technologies work and how they can help reduce the risks of being a victim of attacks.
By Sirapat Boonkrong
-
Book
Automated Secure Computing for Next-Generation SystemsThis book provides cutting-edge chapters on machine-empowered solutions for next-generation systems for today's society.
By Amit Kumar Tyagi
-
Book
Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive GuideThis book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA).
By Alexander Kott
-
Book
Basic Guide to System Safety, Second EditionDesigned to familiarize readers with the application of scientific and engineering principles for timely identification of hazards, this book efficiently outlines the essentials of system safety and its impact on day-to-day occupational safety and health.
By Jeffrey W. Vincoli
-
Book
Bayesian Inference for Probabilistic Risk Assessment: A Practitioner's GuidebookEmploying a modern computational approach known as Markov chain Monte Carlo (MCMC), this book provides an analytical structure for combining data and information from various sources to generate estimates of the parameters of uncertainty distributions used in risk and reliability models.
By Curtis Smith, Dana Kelly
-
Book
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security IssuesWhether you are new to ethical hacking or a seasoned veteran, this book will help you understand and master many of the powerful and useful hacking-related tools of Kali Linux and the techniques that are widely used in the industry today.
By Sanjib Sinha
-
Book
Beginning Ethical Hacking with PythonTeaching you the basics of ethical hacking and offering insights into the logic, algorithms, and syntax of Python, this book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future.
By Sanjib Sinha
-
Book
Beyond Cybersecurity: Protecting Your Digital BusinessAn essential resource for business leaders who want to protect their organizations against cyber-attacks, this book arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise.
By Alan Marcus, Chris Rezek, Derek O'Halloran, James M. Kaplan, Tucker Bailey
-
Book
Big Breaches: Cybersecurity Lessons for EveryoneIn engaging and exciting fashion, this book covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more.
By Moudy Elbayadi, Neil Daswani
-
Book
Big Data Analytics for Cyber SecurityAuthored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article documents and discusses such examples where big data analytics techniques can be used to tackle some of the difficult security challenges like Advanced Persistent Threat (APT), big ticket breaches plaguing both private and public sectors today.
By Bharath Krishnappa
-
Book
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code FingerprintingThis book addresses automated software fingerprinting in binary code, especially for cybersecurity applications.
By Aiman Hanna, Amr Youssef, Ashkan Rahimian, Djedjiga Mouheb, He Huang, Lina Nouh, Lingyu Wang, Mourad Debbabi, Paria Shirani, Saed Alrabaee
-
Book
Blackhatonomics: An Inside Look at the Economics of CybercrimeUsing cases and extensive interviews that place you right into the mindset of the cyber criminal, this unique guide explains the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world.
By Daniel Molina, John Pirc, Nick Selby, Will Gragido
-
Book
Bluetooth Security Attacks: Comparative Analysis, Attacks, and CountermeasuresProviding an overview of Bluetooth security, this clear and thorough guide examines network vulnerabilities and provides a literature-review comparative analysis of recent security attacks.
By Keijo Haataja, Konstantin Hyppönen, Pekka Toivanen, Sanna Pasanen
-
Book
BotnetsBotnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. This book provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts.
By Elmar Gerhards-Padilla, Heli Tiirmaa-Klaar, Jan Gassen, Peter Martini
-
Book
Breaking into Information Security: Crafting a Custom Career Path to Get the Job You Really WantWhether you want to break into information security, move from one job to another, or transition into management, this practical book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role.
By Anthony J. Stieber, Chris Liu, Josh More
-
Book
Buffer Overflow Attacks: Detect, Exploit, PreventWritten by a computer security professional, this informative text shows Internet developers how to defend against buffer overflow attacks by implementing a comprehensive design, coding, and test plan.
By James C. Foster, et al.
-
Book
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web Sites and ApplicationsTaking a close look at the types of tools available to you, this book explains how learning to find vulnerabilities in websites will help you become a better penetration tester.
By Sanjib Sinha
-
Book
Build a Security CultureUsing the psychology of group behaviour and explaining how and why people follow social and cultural norms, this book highlights the underlying cause for many successful and easily preventable attacks.
By Kai Roer
-
Book
Build Your Own Cybersecurity Testing Lab: Low-Cost Solutions for Testing in Virtual and Cloud-Based EnvironmentsProviding some inspiration and guidance about how to go about solving some of the issues that arise from putting a lab together, this hands-on guide shows clearly how to administer an effective cybersecurity testing lab using affordable technologies and cloud resources.
By Ric Messier
-
Book
Building a Comprehensive IT Security Program: Practical Guidelines and Best PracticesExplaining the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups, this book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.
By Jeremy Wittkop
-
Book
Building a Digital Forensic Laboratory: Establishing and Managing a Successful FacilityDesigned to meet the needs of IT professionals and law enforcement, as well as consultants, this timely, non-technical book explores the establishment and management of a computer forensics laboratory and its subsequent support to successfully conduct computer-related crime investigations.
By Andy Jones, Craig Valli
-
Book
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health InformationFocusing on a specific requirement within the Administrative Safeguards of the HIPAA Security, this detailed guide shows readers how to build a cybersecurity program to achieve compliance while attempting to protect health information.
By Eric C. Thompson
-
Book
Building an Effective Cybersecurity Program, 2nd EditionIncluding numerous design templates and self-study questions, this book instructs security architects, security managers, and security engineers how to properly construct effective cybersecurity programs using contemporary architectures, frameworks, and models.
By Tari Schreider
-
Book
Building an Information Security Awareness Program: Defending against Social Engineering Hacks and Technical ThreatsFeaturing real-world examples that show how cyber criminals commit their crimes, this practical guide walks you through the process of developing an engaging and successful training program that will help you and your staff defend your systems, networks, mobile devices, and data.
By Bill Gardner, Valerie Thomas
-
Book
Building an Intelligence-Led Security ProgramHelping you to understand your network in-depth so that you can protect it in the best possible way, this practical book will show you how to implement a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence.
By Allan Liska
-
Book
Building Effective Cybersecurity Programs: A Security Manager's HandbookIntended to give you the knowledge and guidance that will allow you to choose wisely and avoid pitfalls, this practical resource lays out a step-by-step roadmap you can follow as you build or enhance your cybersecurity program.
By Tari Schreider
-
Book
Business Continuity Management Systems: Implementation and Certification to ISO 22301Enriched with checklists, worksheets and invaluable top tips, this practical guide will fully equip those new to business continuity management or to management systems with survival skills for the ups and downs of the journey.
By Hilary Estall
-
Book
Case Study: Real World Effects of Cyber-AttacksLooking at mechanisms of advanced cyber-attacks and their effect on production companies, this case study analyzes actions which production companies can take to secure their systems and provides the reader with examples of how to prevent cyber-attacks in the future.
By Lucian Tipi
-
Book
Case Study: The Nuclear Effect of Computer MalwareAimed at students on operations management, supply chain, logistics and business systems courses, this fascinating case study focuses on the destructive malware that is specifically designed to target the industrial computer-controlled systems.
By Lucian Tipi
-
Book
CASP CompTIA Advanced Security Practitioner Study Guide (Exam CAS-001)Detailing the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments, this CompTIA Authorized study guide includes examples and insights drawn from real-world experience to help you not only prepare for the exam, but also your career.
By Billy Haines, Michael Gregg
-
Book
CASP CompTIA Advanced Security Practitioner Study Guide, Second Edition (Exam CAS-002)Containing practical examples and insights drawn from real-world experience, this comprehensive guide covers all of the CASP exam objectives with clear, concise, thorough information on crucial security topics, and will eliminate any surprises on exam day.
By Michael Gregg
-
Book
CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003)Designed to help you pass the exam with ease, this definitive volume provides complete coverage of every topic on the exam and also serves as an essential on-the-job reference.
By Dwayne Williams, Gregory White, Nicholas Lane, Wm. Arthur Conklin
-
Book
CC Certified in Cybersecurity All-in-One Exam GuideThis new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam
By Jordan Genung, Steven Bennett
-
Book
CC Certified in Cybersecurity Study GuideA clear and effective pathway to the Certified in Cybersecurity credential, as well as a fresh career in cybersecurity, the Certified in Cybersecurity Study Guide offers the foundational knowledge, skills, and abilities you need to get started in an exciting and rewarding career.
By Mike Chapple
-
Book
CCISO Certified Chief Information Security Officer All-in-One Exam GuideTake the challenging CCISO exam with confidence using the comprehensive information contained in this effective study guide.
By Jordan Genung, Steven Bennett
-
Book
CDPSE Certified Data Privacy Solutions Engineer All-in-One Exam GuideDesigned to help you pass the CDPSE exam, this comprehensive guide also serves as an essential on-the-job reference for new and established privacy and security professionals.
By Peter H. Gregory
-
Book
CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth EditionThis book is Up-to-date coverage of every topic on the CEH v11 exam.
By Matt Walker
-
Book
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth EditionThoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v10 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam.
By Matt Walker
-
Book
CEH Certified Ethical Hacker All-in-One Exam Guide, Second EditionDesigned to help you pass the EC-Council's Certified Ethical Hacker exam with ease, this authoritative, comprehensive guide features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
By Matt Walker
-
Book
CEH Certified Ethical Hacker All-in-One Exam Guide, Third EditionThoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam.
By Matt Walker
-
Book
CEH Certified Ethical Hacker Practice Exams, Fifth EditionFully updated for the CEH v11 exam objectives, this practical guide contains more than 550 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam.
By Matt Walker
-
Book
CEH Certified Ethical Hacker Practice Exams, Fourth EditionContaining more than 650 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam, this practical guide offers in-depth explanations of both the correct and incorrect answers provided to aid in your understanding of the material.
By Matt Walker
-
Book
CEH Certified Ethical Hacker Practice Exams, Third EditionContaining more than 650 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam, this practical guide offers in-depth explanations of both the correct and incorrect answers provided to aid in your understanding of the material.
By Matt Walker
-
Book
CEH v10 Certified Ethical Hacker Study GuideOffering a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction, this book provides practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles.
By Ric Messier
-
Book
CEH v11 Certified Ethical Hacker Study GuideThis book offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress.
By Ric Messier
-
Book
CEH v11: Certified Ethical Hacker Version 11 Practice Tests, 2nd EditionThe ideal companion for the Sybex CEH v11 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification.
By Ric Messier
-
Book
CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test QuestionsThe CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy.
By Ric Messier
-
Book
CEHv9: Certified Ethical Hacker Version 9 Study Guide (Exam 312-50)Designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material, this comprehensive, in-depth study guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material.
By Sean-Philip Oriyano
-
Book
Certification Exam Preparation Course in a Book for Passing the GSEC: The How To Pass on Your First Try Certification Study Guide, Second EditionIncluding numerous questions and detailed answers modeled after the actual exam, this no-gimmicks, no-nonsense book offers concise yet comprehensive coverage of each topic included in the GSEC exam so you can pass on your first try.
By William Manning
-
Book
Certified Ethical Hacker (CEH) Foundation GuideWith hands-on exercises, and practical real-world scenarios and examples, this book will help you prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization.
By Sagar Ajay Rahalkar
-
Book
Certified Exam Preparation Course in a Book for Passing the GCIH: The How to Pass on Your First Try Certification Study Guide, 2nd EditionOffering numerous sample questions, critical time-saving tips, plus exercises, this self-study exam prep guide is designed to strengthen your understanding of GCIH concepts and prepare you for exam success on the first attempt.
By David Evans
-
Book
Check Point NGX R65 Security AdministrationCovering Check Point's new, flagship NGX R65 Firewall/VPN, this guide provides all you need to know about this underlying security software platform for all of your company's enterprise firewall, VPN and management solutions.
By Ralph Bonnell
-
Book
CIPM Certified Information Privacy Manager All-in-One Exam GuideDesigned to help you pass the CIPM exam, this comprehensive guide also serves as an essential on-the-job reference for new and established privacy and security professionals.
By Peter H. Gregory
-
Book
CISA Certified Information Systems Auditor All-In-One Exam GuideDesigned to help you pass the CISA exam with ease, this definitive, authoritative volume covers all six exam domains developed by the Information Systems Audit and Control Association (ISACA).
By Peter H. Gregory
-
Book
CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth EditionDesigned to help you pass the CISA exam with ease, this comprehensive guide also serves as an essential on-the-job reference for new and established IS auditors.
By Peter H. Gregory
-
Book
CISA Certified Information Systems Auditor All-in-One Exam Guide, Third EditionCovering all five exam domains developed by the Information Systems Audit and Control Association (ISACA), this effective self-study system features learning objectives at the beginning of each chapter, in-depth explanations of each topic, and accurate practice questions.
By Peter H. Gregory
-
Book
CISA Certified Information Systems Auditor Practice ExamsDesigned to help you pass the test with greater confidence, this highly effective self-study guide is filled with discussions, details, and real-life examples throughout the CISA domains and the world of professional auditing.
By Peter H. Gregory
-
Book
CISA: Certified Information Systems Auditor Study Guide, 3rd EditionCovering the very latest version CISA exam, this practical guide is packed with instruction on all CISA knowledge areas, as well as the most up-to-date standards, regulations, information system auditing best practices, and compliances.
By David L. Cannon
-
Book
CISA: Certified Information Systems Auditor Study Guide, Fourth EditionIncluding chapter summary highlights and review questions to help you gauge your understanding of the material, this complete resource provides guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples.
By Allen Keele, Brian T. O'Hara, David Cannon
-
Book
Cisco ASA, PIX and FWSM Firewall Handbook, Second EditionWhether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, this book helps you achieve maximum protection of your network resources.
By David Hucaby
-
Book
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance: Identify, Mitigate, and Respond to Network Attacks, Second EditionOffering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples, this book provides an authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA.
By Jazib Frahim, Omar Santos
-
Book
Cisco Firewalls: Concepts, Design and Deployment for Cisco Stateful Firewall SolutionsUsing step-by-step examples that demonstrate theory in action, this unique guide thoroughly explains each of the leading Cisco firewall products, features, and solutions, and shows how they can add value to any network security design or operation.
By Alexandre M.S.P. Moraes
-
Book
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASAFor beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.
By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson
-
Book
Cisco PIX Firewalls: Configure, Manage, & TroubleshootCovering Cisco PIX Security Appliance Software Version 7.0, as well as the entire family of Cisco PIX 500 Series Firewalls, this book clearly explains how to leverage the integrated remote access and site-to-site VPN capabilities found in PIX Firewalls.
By Daniel Kligerman, et al.
-
Book
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network ActivityDevoted to forensic analysis of routers and switches, this book details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony.
By Dale Liu
-
Book
Cisco Secure Firewall Services Module (FWSM)Comprehensively answering how and why the FWSM functions as it does, this book provides practical examples throughout and enables you to successfully deploy the FWSM and gain the greatest functional benefit from your deployment.
By Arvind Durai, Ray Blair
-
Book
CISM Certified Information Security Manager All-in-One Exam Guide, Second EditionThis integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence.
By Peter H. Gregory
-
Book
CISM Certified Information Security Manager Practice Exams, Second EditionCISM Certified Information Security Manager Practice Exams, Second Edition supplements the CISM All-in-One Exam Guide and completely covers every objective of the 2022 exam release. In total, the book contains more than 300 realistic practice questions.
By Peter H. Gregory
-
Book
CISM Certified Information Security Manager Study GuideIn Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam.
By Mike Chapple
-
Book
CISO Leadership: Essential Principles for SuccessCapturing years of hard knocks, success stories, and failures, this practical book delineates information needed by security leaders and includes from-the-trenches advice on how to have a successful career in the field.
By Micki Krause (eds), Todd Fitzgerald
-
Book
CISSP All-in-One Exam Guide, 7th EditionWritten by leading experts in IT security certification and training, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference.
By Fernando Maymí, Shon Harris
-
Book
CISSP All-in-One Exam Guide, Eighth EditionFeaturing learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanation, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference.
By Fernando Maymí, Shon Harris
-
Book
CISSP All-in-One Exam Guide, Ninth EditionThis book features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations.
By Fernando Maymi
-
Book
CISSP Exam Certification Companion: 1000+ Practice Questions and Expert Strategies for Passing the CISSP ExamThis is a comprehensive guide for individuals preparing for the Certified Information Systems Security Professional (CISSP) exam. The book's main focus is to provide readers with a wealth of practice questions and expert tips to help them pass the CISSP exam.
By Mohamed Aly Bouke
-
Book
CISSP For Dummies, 4th EditionTaking a down-to-earth approach, this popular guide covers all the latest CISSP Body of Knowlege updates, includes various self-assessment tools to help you gauge your progress, and offers test-taking tips so you approach the exam with confidence and earn your certification.
By Lawrence Miller, Peter H. Gregory
-
Book
CISSP for Dummies, 6th EditionIf you're a security professional seeking your CISSP certification, this expert guide is a perfect way to prepare for the exam.
By Lawrence C. Miller, Peter H. Gregory
-
Book
CISSP Official (ISC)2 Practice TestsOffering 1300 unique practice questions, as well as two 250-question practice exams to help you master the material, this official study guide is your secret weapon for success, and your ticket to achieving the prestigious CISSP certification by helping you test what you know against what you need to know.
By David Seidl, Mike Chapple
-
Book
CISSP Passport, 1st EditionThis quick review study guide offers 100% coverage of every topic on the latest version of the CISSP exam.
By Bobby E. Rogers
-
Book
CISSP Practice Exams, Fifth EditionDesigned to help you pass the test with ease, this thorough resource offers complete coverage of all eight CISSP exam domains and each chapter features practice exam questions, a quick answer key, and in-depth answer explanations to reinforce what you've learned.
By Jonathan Ham, Shon Harris
-
Book
CISSP Practice Exams, Fourth EditionFully updated and featuring new exam question formats, this in-depth self-study tool contains more than 1250 realistic practice exam questions and offers 100% coverage of the 2015 CISSP Common Body of Knowledge.
By Jonathan Ham, Shon Harris
-
Book
CISSP Practice Exams, Third EditionFully updated throughout and featuring new question types, this self-study guide contains more than 1250 realistic practice exam questions covering all ten CISSP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2.
By Shon Harris
-
Book
CISSP Study Guide, Fourth EditionCISSP(r) Study Guide, Fourth Edition provides the latest updates on CISSP(r) certification, the most prestigious, globally-recognized, vendor neutral exam for information security professionals.
By Eric Conrad, Joshua Feldman, Seth Misenar
-
Book
CISSP Study Guide, Third EditionWith clearly-stated exam objectives, unique terms and definitions, exam warnings, "learning by example" modules, hands-on exercises, and chapter-end questions, this book provides a complete and effective study guide to prepare users for passing the CISSP exam.
By Eric Conrad, Joshua Feldman, Seth Misenar
-
Book
CISSP: Certified Information Systems Security Professional Study Guide, Eighth EditionCovering 100% of all exam objectives, this book will help you prepare for the exam smarter and faster thanks to expert content, real-world examples, advice on passing each section of the exam, and much more.
By Darril Gibson, James Michael Stewart, Mike Chapple
-
Book
CISSP: Certified Information Systems Security Professional Study Guide, Seventh EditionWith expert content, real-world examples, and advice on passing each section of the exam, this completely updated study guide will be your one-stop resource for complete coverage of the 2015 CISSP Body of Knowledge.
By Darril Gibson, James Michael Stewart, Mike Chapple
-
Book
CISSP: Certified Information Systems Security Professional Study Guide, Sixth EditionIncluding changes made to the CISSP Body of Knowledge in 2012, this highly respected guide prepares you with both the knowledge and the confidence to pass each section of the CISSP exam.
By Darril Gibson, James M. Stewart, Mike Chapple
-
Book
Client-Side Attacks and DefenseDiscussing the most current type of attacks along with their delivery methods, this book presents a framework for defending your network against client-side attacks in an environment where it might seem impossible.
By Robert Shimonski, Sean-Philip Oriyano
-
Book
COBIT(r) 5 for Information Security (2013)Presenting a sample chapter from the full-text book, this publication examines COBIT 5 from a security view, placing a security lens over the concepts, enablers and principles within COBIT 5.
By ISACA
-
Book
Codebreaking: A Practical Guide, Expanded EditionSolve history's most hidden secrets alongside expert codebreakers Elonka Dunin and Klaus Schmeh, as they guide you through the world of encrypted texts.
By Elonka Dunin, Klaus Schmeh
-
Book
Coding for Penetration Testers: Building Better ToolsProviding an understanding of the scripting languages that are commonly used when developing tools for penetration testing, this book guides you through specific examples of custom tool development and the situations where such tools might be used.
By Jason Andress, Ryan Linn
-
Book
Collaborative Approaches for Cyber Security in Cyber-Physical SystemsThis book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.
By Fabio Martinelli, Javier Lopez, Theo Dimitrakos
-
Book
Combatting Cyber Terrorism: A Guide to Understanding the Cyber Threat Landscape and Incident Response Planning NEW!In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyzes the evolution of cyber terrorism and what organizations can do to mitigate this threat.
By Richard Bingley
-
Book
Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROIDefining 900+ ready to use metrics that measure compliance, resiliency, and ROI, this book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including SOX, HIPAA, and the Data Protection Act-UK.
By Debra S. Herrmann
-
Book
Complexity and Cryptography: An IntroductionCombining an informal style with rigorous proofs of the key results, this book provides knowledge of both computational complexity and a range of topics in pure mathematics necessary for understanding the principles on which cryptography is based.
By Dominic Welsh, John Talbot
-
Book
CompTIA CASP+ Advanced Security Practitioner Study Guide: Exam CAS-003, Third EditionCovering 100 percent of the exam objectives, this hands-on guide provides expert walk-throughs of essential security concepts and processes to help you tackle this challenging exam with full confidence.
By Jeff T. Parker, Michael Gregg
-
Book
CompTIA CASP+ CAS-004 Exam Guide: A-Z of Advanced Cybersecurity Concepts, Mock Exams, Real-world Scenarios with Expert TipsCompTIA CASP+ certification evaluates advanced technical security skills, such as security engineering and operations, enterprise-level risk assessments and IT governance, and the implementation of secure systems and network design and controls.
By Dr. Akashdeep Bhardwaj
-
Book
CompTIA CASP+ Study Guide: Exam CAS-004, Fourth EditionIn the newly updated Fourth Edition of CASP+ CompTIA Advanced Security Practitioner Study Guide Exam CAS-004, risk management and compliance expert Jeff Parker walks you through critical security topics and hands-on labs designed to prepare you for the new CompTIA Advanced Security Professional exam and a career in cybersecurity implementation.
By Jeff T. Parker, Nadean H. Tanner
-
Book
CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001Helping you focus on your review for the CSA+, this guide provides real-world examples drawn from experts, hands-on labs, insight on how to create your own cybersecurity toolkit, and end-of-chapter review questions to help you gauge your understanding each step of the way.
By David Seidl, Mike Chapple
-
Book
CompTIA Cybersecurity Analyst (CySA+) Study Guide: Exam CS0-001Helping you focus on your review for the CSA+, this guide provides real-world examples drawn from experts, hands-on labs, insight on how to create your own cybersecurity toolkit, and end-of-chapter review questions to help you gauge your understanding each step of the way.
By David Seidl, Mike Chapple
-
Book
CompTIA Cybersecurity Analyst (CySA+) Study Guide: Exam CS0-002, Second EditionThis updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics!
By David Seidl, Mike Chapple
-
Book
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002)This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CySA+ Cybersecurity Analyst exam.
By Brent Chapman, Fernando Maymi
-
Book
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Third Edition (Exam CS0-003)Prepare for the CompTIA CySA+(tm) certification exam using this fully updated self-study resource
By Brent Chapman, Fernando Maymi, Mya Heath, Bobby E
-
Book
CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-001)Pass the new Cybersecurity Analyst+ certification exam and obtain the latest security credential from CompTIA using the accurate practice questions contained in this effective self-study resource.
By Jeff T. Parker
-
Book
CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002)Prepare to pass the CySA+ Cybersecurity Analyst certification exam CS0-002 and obtain the latest security credential from CompTIA using the practice questions contained in this guide.
By Kelly Sparks
-
Book
CompTIA CySA+ Practice Tests: Exam CS0-003, Third EditionThe best way to prep for the CS0-003 CySA+ certification exam and hone your practical cybersecurity skillset
By David Seidl, Mike Chapple
-
Book
CompTIA CySA+ Study Guide with Online Labs: Exam CS0-002, 2nd EditionThis book provides clear and concise information on crucial security topics and verified 100% coverage of the revised CompTIA Cybersecurity Analyst+ (CySA+) exam objectives.
By Mike Chapple
-
Book
CompTIA CySA+ Study Guide: Exam CS0-003, Third EditionPrepare for the CompTIA CySA+ certification exam with the official and updated study guide for Exam CS0-003
By David Seidl, Mike Chapple
-
Book
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)With complete coverage of all the objectives included on the CompTIA PenTest+ exam, this definitive guide provides learning objectives, hands-on exercises, exam tips, and practice questions with in-depth answer explanations to help you pass the exam with ease.
By Ray Nutting
-
Book
CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002)Written by expert penetration testers, the book provides learning objectives at the beginning of each chapter, hands-on exercises, exam tips, and practice questions with in-depth explanations.
By Heather Linn, Raymond Nutting
-
Book
CompTIA PenTest+ Certification Passport: Exam PT0-001Featuring end of chapter review sections and accurate practice exam questions with in-depth answer explanations, this concise, quick-review test preparation guide offers 100% coverage of all exam objectives for the new CompTIA PenTest+ exam.
By Heather Linn
-
Book
CompTIA PenTest+ Certification Practice Exams (Exam PT0-001)Prepare for the challenging PenTest+ exam from CompTIA using this highly effective self-study guide. This book offers accurate practice questions for all exam objectives and includes a valuable pre-assessment test that enables you to tailor a course for study.
By Jonathan Ammerman
-
Book
CompTIA PenTest+ Practice Tests: Exam PT0-001Providing over 1,000 questions that cover the concepts of the CompTIA PenTest+ certification exam objectives, this book will help you determine what you need to focus more on prior to taking the actual exam.
By Crystal Panek, Robb Tracy
-
Book
CompTIA PenTest+ Study Guide: Exam PT0-001Whether you're just embarking on your certification journey or finalizing preparations for the big day, this invaluable resource helps you solidify your understanding of essential skills and concepts.
By David Seidl, Mike Chapple
-
Book
CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd EditionThis book deliver a comprehensive roadmap to the foundational and advanced skills every pentester (penetration tester) needs to secure their CompTIA PenTest+ certification.
By David Seidl, Mike Chapple
-
Book
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)Including exam tips, practice exam questions, and in-depth explanations, this authoritative guide addresses the skills required for securing a network and managing risk, and will help you pass the latest version of the CompTIA Security+ exam with complete confidence.
By Chuck Cothren, Dwayne Williams, Gregory White, Roger L. Davis, Wm. Arthur Conklin
-
Book
CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401)Designed to help you pass CompTIA Security+ exam SY0-401, this definitive guide offers exam tips, practice exam questions, and in-depth explanations and fully addresses the skills required for securing a network and managing risk.
By Chuck Cothren, Dwayne Williams, Gregory White, Roger L. Davis, Wm. Arthur Conklin
-
Book
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)Including exam tips, practice exam questions, and in-depth explanations, this authoritative guide addresses the skills required for securing a network and managing risk, and will help you pass the latest version of the CompTIA Security+ exam with complete confidence.
By Gregory White, Wm. Arthur Conklin
-
Book
CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601)Providing hundreds of accurate practice questions and detailed answer explanations, this fully updated, exam-focused study aid covers everything you need to know and shows you how to prepare for the CompTIA Security+ exam.
By Daniel Lachance, Glen E. Clarke
-
Book
CompTIA Security+ Certification Practice Exams, Second Edition (Exam SY0-401)With practice questions to test your knowledge of specific exam objectives, this practical guide covers all official objectives for Exam SY0-401 and will give you the competitive edge on exam day.
By Daniel Lachance, Glen E. Clarke
-
Book
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)Providing a battery of practice test questions organized by the official exam objectives, this fully updated, exam-focused study aid covers everything you need to know and shows you how to prepare for the CompTIA Security+ exam.
By Daniel Lachance, Glen E. Clarke
-
Book
CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601)This book covers what you need to know-and shows you how to prepare-for this challenging exam.
By Glen Clarke
-
Book
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401)Providing a fully integrated study system for the CompTIA Security+ exam, this book offers complete coverage of all official objectives, two-minute drills for quick review at the end of every chapter and simulated exam questions that match the format, topics, and difficulty of the actual exam.
By Glen E. Clarke
-
Book
CompTIA Security+ Certification Study Guide, Third Edition (Exam SY0-501)With hundreds of practice exam questions, including difficult performance-based ones, this fully updated, exam-focused study aid covers everything you need to know and shows you how to prepare for the CompTIA Security+ exam.
By Glen E. Clarke
-
Book
CompTIA Security+ Certification Study Guide: Network Security EssentialsIncluding lesson objectives and instruction that succinctly review each major topic, this book will help you prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT.
By Ahmed F. Sheikh
-
Book
CompTIA Security+ Deluxe Study Guide: Exam SY0-501, Fourth EditionFully updated to cover 100% of the latest exam, this book is packed with essential information on critical security concepts including architecture and design, attacks and vulnerabilities, identity and access management, cryptography and PKI, risk management, and more.
By Emmett Dulaney
-
Book
CompTIA Security+ Practice Tests: Exam SY0-501Offering invaluable practice for candidates preparing for Exam SY0-501, this book covers 100% of the exam objectives and provides 1,000 practice questions to help you test your knowledge and maximize your performance well in advance of exam day.
By Chuck Easttom, S. Russell Christy
-
Book
CompTIA Security+ Practice Tests: Exam SY0-601, 2nd EditionThis book guides you through CompTIA Security+ SY0-601 Exam with one practice exam and domain-by-domain questions. With a total of 1,000 practice questions, you'll be as prepared as possible to take Exam SY0-601.
By David Seidl
-
Book
CompTIA Security+ Practice Tests: Exam SY0-701, Third EditionYou'll find 1000 practice questions on topics like general security concepts, threats, vulnerabilities, mitigations, security architecture, security operations, and security program oversight.
By David Seidl
-
Book
CompTIA Security+ Review Guide: Exam SY0-301, Second EditionA concise and focused exam review, this guide covers all six domains of exam SY0-301, all exam objectives, and includes a helpful "Exam Essentials" section after each domain to help you zero in on what you need to know for the exam.
By James M. Stewart
-
Book
CompTIA Security+ Review Guide: Exam SY0-501, Fourth EditionGiving you a secret weapon for passing certification Exam SY0-501, this practical book provides tight, concise reviews of all essential topics throughout each of the exam's six domains to help you reinforce what you know.
By James Michael Stewart
-
Book
CompTIA Security+ Review Guide: Exam SY0-601, 5th EditionThis book helps you to efficiently review for the leading IT security certification-CompTIA Security+ SY0-601.
By James Michael Stewart
-
Book
CompTIA Security+ Study Guide with Online Labs: Exam SY0-501, 7th EditionThis book covers 100% of the exam objectives with clear and concise explanations. Discover how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while gaining and understanding the role of architecture and design.
By Chuck Easttom, Emmett Dulaney, James Michael Stewart, S. Russell Christy
-
Book
CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701, 9th EditionYou'll explore general security concepts, threats, vulnerabilities, mitigations, security architecture and operations, as well as security program management and oversight.
By David Seidl, Mike Chapple
-
Book
CompTIA Security+ Study Guide, Sixth Edition (SY0-401)Including insight from industry experts on a wide range of IT security topics, this clear and concise resource covers the latest changes to the Security+ certification exam and provides everything you need to prepare for the exam and jump-start your security career.
By Chuck Easttom, Emmett Dulaney
-
Book
CompTIA Security+ Study Guide: Exam SY0-501, Seventh EditionFrom everyday tasks like identity and access management to complex topics like risk management and cryptography, this invaluable study guide helps you consolidate your knowledge base in preparation for the Security+ exam.
By Chuck Easttom, Emmett Dulaney
-
Book
CompTIA Security+ Study Guide: Exam SY0-601, 8th EditionThe Eighth Edition of the CompTIA Security+ Study Guide Exam SY0-601 efficiently and comprehensively prepares you for the SY0-601 Exam.
By David Seidl, Mike Chapple
-
Book
Computer and Cyber Security: Principles, Algorithm, Applications, and PerspectivesComprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques.
By Brij B. Gupta, Dharma P. Agrawal, Haoxiang Wang (eds)
-
Book
Computer and Information Security Handbook, Second EditionExploring practical solutions to a wide range of security issues, this comprehensive guide offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advancements.
By John R. Vacca (ed)
-
Book
Computer Forensics For DummiesIncluding lists of things that everyone interested in computer forensics should know, do, and build, this book explains the basics of computer forensics, from digging out electronic evidence to solving the case.
By Linda Volonino, Reynaldo Anzaldua
-
Book
Computer Forensics InfoSec Pro GuideFilled with real-world case studies that demonstrate the concepts covered in the book, this guide explains what it takes to transition from an IT professional to a computer forensic examiner in the private sector, and will help you excel in the field of computer forensics investigations.
By David Cowen
-
Book
Computer Forensics JumpStart, Second EditionUpdated to cover the latest tools, practices, and core information you need to launch a career in this rapidly growing field, this book discusses the essentials of computer forensics and can be applied to both criminal investigations and corporate incident response.
By Diane Barrett, Ed Tittel, K. Rudolph, Michael G. Solomon, Neil Broom
-
Book
Computer Forensics, Second EditionEntering into the world of cybercrime to explore what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence, this book introduces the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining, and storing electronic evidence.
By Marie-Helen Maras
-
Book
Computer Forensics: A Pocket GuideHow would your organisation cope with a cyber attack? This guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation.
By Nathan Clarke
-
Book
Computer Forensics: An Essential Guide for Accountants, Lawyers, and ManagersWritten for the nontechnical professional in business and law, this book offers a solid understanding of how computers facilitate fraud and financial crime, and explains how they can be used to investigate, prosecute, and prevent these crimes.
By Michael Sheetz
-
Book
Computer Forensics: Computer Crime Scene InvestigationThis title will be removed from the Skillsoft library on May 24, 2024.
By John R. Vacca
-
Book
Computer Fraud Casebook: The Bytes that BiteConsisting of actual cases written by fraud examiners out in the field, this comprehensive book reveals the wealth of resources available to snare criminals and, even more importantly, prevent fraud from happening in the first place.
By Joseph T. Wells (ed)
-
Book
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident ResponseIncluding tools, references, and research sources, this book provides security professionals with the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.
By Leighton R. Johnson III
-
Book
Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at RiskPresenting expert information to reinforce your organization's security posture, this tactical guide shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size.
By N. K. McCarthy
-
Book
Computer Network SecurityDeveloped in collaboration with a training and certification team from Cisco, this book is an exploration of the state-of-the-art and good practices in setting up a secure computer system.
By Ali Sadiqui
-
Book
Computer Security and Encryption, 2nd EditionThis book has been developed for data security, network security and Internet security.
By Dr Surender Jangra, Sumant Raj Chauhan
-
Book
Computer Security and Encryption: An IntroductionDesigned to meet the needs of beginners as well as more advanced readers, this book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems.
By S. Jangra, S. R. Chauhan
-
Book
Computer Security Handbook, Sixth EditionA compilation of advice from top professionals working in the real world about how to minimize the possibility of computer security breaches, this book provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more.
By Eric Whyne (eds), Michel E. Kabay, Seymour Bosworth
-
Book
Computer-Aided Fraud Prevention and Detection: A Step by Step GuideIncluding case studies, theory and examples, this guide will help those interested in improving their ability to access data and use data-extraction and analysis software to detect and deter fraud and wasteful practices.
By David Coderre
-
Book
Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your CareerGiving you a clear overview of the world of cyber security, this jargon-busting guide is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security.
By Jessica Barker
-
Book
Confident Cyber Security: The Essential Insights and How to Protect from Threats, Second EditionThe world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career.
By Jessica Barker
-
Book
Configuring Symantec AntiVirus, Corporate EditionWhether you are managing an existing NAVCE 7.6 configuration or implementing SAVCE version 8.x, this book will help you get the most out of your software installation.
By Robert J. Shimonski, et al.
-
Book
Confronting Cyber Risk: An Embedded Endurance Strategy for CybersecurityConfronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership guidebook outlining a new strategy for improving organizational cybersecurity and mitigating cyber risk.
By Eric Rosenbach, Gregory J. Falco
-
Book
Controller-Based Wireless LAN Fundamentals: An End-to-End Reference Guide to Design, Deploy, Manage, and Secure 802.11 Wireless NetworksWritten by senior Cisco wireless experts, this guide presents all the practical and conceptual knowledge professionals need to confidently design, configure, deploy, manage, and troubleshoot 802.11n networks with Cisco Unified Wireless Network (CUWN) technologies.
By Jake Woodhams, Jeff Smith, Robert Marg
-
Book
Counterintelligence in a Cyber WorldThis book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain.
By Paul A. Watters
-
Book
Cracking the Cybersecurity Interview: Essential Strategies and Learn Concepts NEW!This book establishes a strong foundation by explaining core concepts like operating systems, networking, and databases. Understanding these systems forms the bedrock for comprehending security threats and vulnerabilities. The book gives aspiring information security professionals the knowledge and skills to confidently land their dream job in this dynamic field.
By Karl Gilbert, Sayanta Sen
-
Book
Creating the Secure Managed Desktop: Using Group Policy, SoftGrid, Microsoft Deployment Toolkit, and Other Management ToolsPacked with techniques, tips, and best practices, this guide will help you understand the tools and technologies you need to create a more secure network and manage, diagnose, configure, update, and protect multiple desktops in Active Directory.
By Jeremy Moskowitz
-
Book
CRISC Certified in Risk and Information Systems Control All-in-One Exam GuideServing as a test preparation tool and an on-the-job reference that will serve you well beyond the examination, this reference guide covers all four exam domains effective as of June 2015 and contains hundreds of realistic practice exam questions.
By Bobby E. Rogers, Dawn Dunkerley
-
Book
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide, Second Edition"CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide, Second Edition" features learning objectives, explanations, exam tips, and hundreds of practice questions.
By Bobby E. Rogers, Dawn Dunkerley, Peter H. Gregory
-
Book
Critical Incident ManagementThis text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.
By Alan B. Sterneckert
-
Book
Critical Infrastructure System Security and ResiliencyFocusing on the design of protection strategies to enhance the robustness of the infrastructure components, this book presents risk assessment tools and necessary metrics to offer guidance to decision-makers in applying sometimes limited resources to reduce risk and ensure operational resiliency.
By Betty E. Biringer, Drake E. Warren, Eric D. Vugrin
-
Book
Cryptography and Network SecurityThis book will cover:•What is Confidentiality, Integrity, Availability•Security Incident Events and Monitoring•Security Terminologies, Security Zones•TCP SYN Flood attack.
By Hugo Hoffman
-
Book
Cryptography and Network Security: A Practical ApproachNetwork security is a set of protocols that allows us to use the internet comfortably without worrying about security attacks, and the most common tool for providing network security is cryptography. This book provides a practical survey of the principles of cryptography and network security.
By K. Haribaskar
-
Book
Cryptography and Network Security: An IntroductionThis book is an introduction to fundamental concepts in the fields of cryptography and network security.
By R. Achary
-
Book
Cryptography and Secure CommunicationBringing together a fascinating mixture of topics in engineering, mathematics, computer science, and informatics, this book presents the timeless mathematical theory underpinning cryptosystems both old and new.
By Richard E. Blahut
-
Book
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's CryptoProviding a simple quantum mechanics primer, this book is an indispensable resource for every IT and InfoSec professional responsible for making appropriate decisions to meet the challenges of the coming quantum-computing revolution.
By Roger A. Grimes
-
Book
Cryptography Engineering: Design Principles and Practical ApplicationsWritten by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management.
By Bruce Schneier, Niels Ferguson, Tadayoshi Kohno
-
Book
Cryptography For DummiesThis guide to keeping your data safe offers the latest security techniques and advice on choosing and using cryptography products. It covers terminology, specific encryption technologies, pros and cons of different implementations, and more.
By Chey Cobb
-
Book
Cryptography InfoSec Pro GuideFeaturing examples of how security is improved industry-wide by encryption techniques, this complete and practical resource provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field.
By Sean-Philip Oriyano
-
Book
Cryptography Made SimpleExplaining the key topics in cryptography, this book takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout.
By Nigel P. Smart
-
Book
Cryptography Protocols and AlgorithmsLearn the basics of cryptography, as well as the various mathematical concepts that you use in cryptographic algorithms and protocols. Various encryption and authentication techniques that you use in cryptography are also addressed.
By
-
Book
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd EditionThis book is geared toward a broad audience. It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. It is also an authoritative overview for professionals working at financial institutions, law firms, and governments who need up-to-date information to make critical decisions.
By Aiden A. Bruen, James M. McQuillan, Mario A. Forcinito
-
Book
Cryptography: Algorithms, Protocols, and Standards for Computer SecurityThis book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come.
By Zoubir Z. Mammeri
-
Book
CSX Cybersecurity Fundamentals Study Guide 2015Preview Chapter 1 of the CSX Cybersecurity Fundamentals Study Guide. This sample content provides a description of the manual and features the full first chapter titled "Cybersecurity Introduction and Overview."
By ISACA
-
Book
Curve Benders: How Strategic Relationships Can Power Your Non-linear Growth in the Future of WorkThis book aims to provide you with a step-by-step guide for personal, professional, and organizational growth. The author highlights how certain relationships enable a non-linear growth trajectory. These relationships, in addition to augmenting what we can accomplish, often shape who we become. These relationships are "curve benders," and this book will show you who and where they are, how to find and engage them, and, equally valuable, how you can become a curve bender to impact the lives and livelihoods of others profoundly.
By David Nour, Lin Wilson
-
Book
CWSP Certified Wireless Security Professional Study Guide: Exam CWSP-205, Second EditionAn ideal companion for effective, efficient CWSP-205 preparation, this comprehensive study guide is your one-stop resource for complete coverage including 100% of all objectives, giving you the edge on exam day.
By Bryan Harkins, David A. Westcott, David D. Coleman
-
Book
CWSP: Certified Wireless Security Professional Official Study Guide (Exam PW0-204)With practical hands-on exercises, real-world scenarios and challenging review questions, this comprehensive resource provides full coverage of all exam objectives in a systematic approach, so you can be confident you're getting the instruction you need for the exam.
By Bryan E. Harkins, David A. Westcott, David D. Coleman, Shawn M. Jackman
-
Book
Cyber Attacks: Protecting National InfrastructureIncluding controversial themes such as the deliberate use of deception to trap intruders, this book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk.
By Edward G. Amoroso
-
Book
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual RiskLooking at big-picture planning and strategy that makes the most business impact, this book provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its effect on your enterprise.
By Andrew Gorecki
-
Book
Cyber Crime and Cyber Terrorism Investigator's HandbookAuthored by experts in cyber crime, digital investigations, and counter-terrorism, this invaluable resource describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them.
By Andrew Staniforth, Babak Akhgar, Francesca Bosco
-
Book
Cyber Crime InvestigationsExamining the difficulties, misconceptions, and flaws in the cyber investigative methodology, this guide provides you with all the information necessary to make educated and authoritative decisions when is comes to cyber crime investigative issues.
By Anthony Reyes, et al.
-
Book
Cyber Crime, Security and Digital IntelligenceWritten for the non-technical layman and the high-tech risk manager alike, this important work describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats.
By Mark Johnson
-
Book
Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber DefenseIncluding numerous detailed case studies, this book provides a framework to systematically implement cyber denial and deception active defenses which can immediately improve security posture.
By Alexander W. Tsow, Ben Schmoker, Frank J. Stech, Kristin E. Heckman, Roshan K. Thomas
-
Book
Cyber Essentials: A Guide to the Cyber Essentials and Cyber Essentials Plus CertificationsCyber attacks are a fact of life in the information age. For any organisation that connects to the Internet, the issue is not if an attack will come, but when.
By Alan Calder
-
Book
Cyber Essentials: A Pocket GuideWhether your goal is to reduce insurance premiums or to help improve investor and customer confidence, this concise guide explains how to achieve Cyber Essentials certification in a fast, effective, and cost-effective manner.
By Alan Calder
-
Book
Cyber Forensics Up and Running: A Hands-on Guide to Digital Forensics Tools and TechniqueThis book empowers you to become a digital detective, capable of uncovering data secrets, investigating networks, exploring volatile and non-volatile evidence, and understanding the intricacies of modern browsers and emails.
By Tarun Vashishth
-
Book
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second EditionDesigned as an introduction and overview to the field, this book guides you step-by-step through the basics of investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine.
By Albert J. Marcella, Jr., Doug Menendez
-
Book
Cyber Forensics: From Data to Digital EvidencePainting a broad picture of the field, this guide provides you with the specific knowledge you need to not only find key data in forensic investigations but also speak confidently about the validity of the data identified, accessed, and analyzed as part of a comprehensive cyber forensic investigation.
By Albert J. Marcella, Jr., Frederic Guillossou
-
Book
Cyber Fraud: Tactics, Techniques and ProceduresCombining the best of investigative journalism and technical analysis, this copiously illustrated book will help organizations and individuals better secure their systems and develop countermeasures to disrupt underground fraud.
By James Graham (ed)
-
Book
Cyber Guardians: Empowering Board Members for Effective CybersecurityA comprehensive overview for directors aiming to meet their cybersecurity responsibilities
By Bart R. McDonough
-
Book
Cyber GuerillaProviding valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors, this book takes readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats.
By Jelle van Haaster, Martijn Sprengers, Rickey Gevers
-
Book
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, Second EditionTeaching you how to set up, defend, and attack computer networks, this book will show you how to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure.
By Mike O'Leary
-
Book
Cyber Persistence Theory: Redefining National Security in CyberspaceIn Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result.
By Emily O. Goldman, Michael P. Fischerkeller, Richard J. Harknett
-
Book
Cyber Physical Systems: Architectures, Protocols, and ApplicationsHelping you understand the basic principles and key supporting standards of cyber physical systems (CPS), this thorough guide analyzes different CPS applications from the bottom up, extracting the common characters that form a vertical structure.
By Chi (Harold) Liu, Yan Zhang (eds)
-
Book
Cyber Reconnaissance, Surveillance and DefenseAt a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, this book gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.
By Robert Shimonski
-
Book
Cyber Resilience: Defence-In-Depth PrinciplesWe live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional.
By Alan Calder
-
Book
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply ControlsIncluding an introduction to threat modelling, this book presents a data-centric approach to cyber risk management based on business impact assessments, data classification, data flow modelling and assessing return on investment.
By Christopher Hodson
-
Book
Cyber Safety For EveryoneA must-read for every parent, teacher or child who wants to avoid the temptations and perils of cyberspace, this important book tells you the kind of trouble children can get into when they are online and suggests simple, yet effective ways to deal with such situations.
By Jaago Teens
-
Book
Cyber Safety for Everyone 2nd EditionBook is a step-by-step guide that handholds you through all the essential aspects of internet safety. The content is presented in a simple and easy-to-understand manner. True incidents, practical tips, survey results, conversation starters and teaching ideas given in the book, make the reading experience truly enriching.
By Jaago Teens
-
Book
Cyber Safety for Everyone: A comprehensive Guide to Online Safety, 3rd EditionThis book is a step-by-step guide that handholds you through all the essential aspects of internet safety. The content is presented in a simple and easy-to-understand manner.
By JaagoTeens
-
Book
Cyber SecurityFilled with anecdotes of real people, governments, and businesses, this book explains how cyber security plays a fundamental role in the way we live our lives, and understanding its basics is critical for everyone around the world.
By Edward Amoroso
-
Book
Cyber Security ABCs: Delivering Awareness, Behaviours and Culture ChangeCybersecurity issues, problems and incidents don't always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness (A), behaviour (B) and culture change (C).
By Adrian Davis, Bruce Hallas, Ciarán Mc Mahon, Jessica Barker
-
Book
Cyber Security and Digital Forensics: Challenges and Future TrendsCyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.
By Dac-Nhuong Le, Mangesh M. Ghonge, Ramchandra Mangrulkar, Sabyasachi Pramanik
-
Book
Cyber Security and IT Infrastructure ProtectionThrough hands-on exercises, worked examples, case studies, and questions and answers, this unique and comprehensive resource offers in-depth coverage of the theory, technology, and practice as they relate to cyber-physical security and IT infrastructure protection.
By John R. Vacca
-
Book
Cyber Security and Network SecurityThis outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security.
By Abhijit Guha, Debabrata Samanta, M. Vinay, Sabyasachi Pramanik
-
Book
Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and TrainingFocusing on countermeasures against orchestrated cyber-attacks, this research-based book provides information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place, and to arrange appropriate training interventions.
By David Upton, Peter Trim
-
Book
Cyber Security EssentialsIllustrating more than 75 key security concepts with short, easy-to-understand descriptions, this book explains the concepts behind today's most prevalent threats, tactics, and procedures and provides actionable advice for the mitigation of common vulnerabilities.
By James Graham, Richard Howard, Ryan Olson (eds)
-
Book
Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case StudiesThe main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field.
By DacNhuong Le, et al.
-
Book
Cyber Security Management: A Governance, Risk and Compliance FrameworkBy simplifying complex material, this book provides a multi-disciplinary perspective, and an explanation and interpretation of how managers can manage cyber threats in a proactive manner and work towards counteracting cyber threats both now and in the future.
By Peter Trim, Yang-Im Lee
-
Book
Cyber Security Policy GuidebookDrawing upon a wealth of experience from academia, industry, and government service, this book details and dissects, current organizational cyber security policy issues on a global scale-taking great care to educate readers on the history and current approaches to the security of cyberspace.
By Jennifer L. Bayuk, et al.
-
Book
Cyber Security, 2nd EditionThrough the medium of this book, we have tried to introduce you to this new world-its components, features and drawbacks. Crimes related to this are referred to as Cyber Crimes.
By Dr Krishan Kumar Goyal, Prof Amit Garg
-
Book
Cyber Security: Essential Principles to Secure Your OrganisationThis pocket guide will take you through the essentials of cyber security - the principles that underpin it, vulnerabilities and threats and the attackers who use them, and how to defend against them - so you can confidently develop a cyber security programme.
By Alan Calder
-
Book
Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT SecurityWith contributions from leading experts from industry, politics and research, this book discusses the status quo and future prospects of corporate cyber security and provides strategic perspective on IT and cyber security for corporations and other businesses.
By Ferri Abolhassan (ed)
-
Book
Cyber Threat IntelligenceCyber Threat Intelligence introduces the history, terminology, and techniques to be applied within cyber security, offering an overview of the current state of cyberattacks and stimulating readers to consider their own issues from a threat intelligence point of view.
By Martin Lee
-
Book
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security ManagersThis book covers the cybersecurity wild west, the merits and limitations of structured intelligence data, and how using structured intelligence data can, and should, be the standard practice for any intelligence team.
By Aaron Roberts
-
Book
Cyber Threat!: How to Manage the Growing Risk of Cyber AttacksWritten by one of the nation's most highly respected cyber risk analysts, this important book is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity.
By N. MacDonnell Ulsch
-
Book
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, Second EditionProviding concrete examples and real-world guidance on how to identify and defend your network against malicious attacks, this timely book details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result.
By Jason Andress, Steve Winterfeld
-
Book
Cyber-Risk ManagementProviding a brief and general introduction to cybersecurity and cyber-risk assessment, this highly pragmatic book is based on established international standards (including ISO 31000) as well as industrial best practices, explaining how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed.
By Atle Refsdal, Bjørnar Solhaug, Ketil Stølen
-
Book
Cyber-Security in Critical Infrastructures: A Game-Theoretic ApproachThe book provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.
By Quanyan Zhu, Sandra König, Stefan Rass, Stefan Schauer
-
Book
Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoTReviewing recent advances in cyber threat intelligence, trust management and risk analysis, this book gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems.
By Wiem Tounsi
-
Book
Cybercrime and CyberwarfareIn order to enable general understanding and to foster the implementation of necessary support measures in organizations, this straightforward book describes the fundamental and conceptual aspects of cyberspace abuse.
By Igor Bernik
-
Book
Cybercrime Incident Response and Digital ForensicsDescribing the threat posed by cybercrime and how to create a cyberresponse program, this publication provides an analysis of the type of risks and guidelines to prevent, detect and respond appropriately.
By ISACA
-
Book
Cybercrime Investigators HandbookProviding practical guidance with clear, easy-to-understand language, this essential resource is an innovative guide that approaches cybercrime investigation from the field-practitioner's perspective.
By Graeme Edwards
-
Book
Cybercrime: Protecting Your Business, Your Family and YourselfThis book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business, does fall victim to cybercrime.
By Todd Wade
-
Book
Cybercryptography: Applicable Cryptography for Cyberspace SecurityThis book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security.
By Song Y. Yan
-
Book
Cyberdanger: Understanding and Guarding Against CybercrimeWritten in an accessible, often humorous way about real-world cases in industry, this book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world.
By Eddy Willems
-
Book
Cyberjutsu: Cybersecurity for the Modern NinjaCyberjutsu is a practical cybersecurity field guide based on the techniques, tactics, and procedures of the ancient ninja.
By Ben McCarty
-
Book
Cyberpatterns: Unifying Design Patterns with Security and Attack PatternsBringing together different interdisciplinary areas under one roof, this important book provides an introduction to and coverage of the state-of-the-art of cyberpatterns, from a theoretical standpoint and via practical applications.
By Clive Blackwell, Hong Zhu (eds)
-
Book
Cybersecurity All-in-One For DummiesCybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in.
By Ira Winkler, Joseph Steinberg, Kevin Beaver, Ted Coombs
-
Book
Cybersecurity and Cyberwar: What Everyone Needs To KnowWritten in a lively, accessible style, filled with engaging stories and illustrative anecdotes, this definitive book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do?
By Allan Friedman, P.W. Singer
-
Book
Cybersecurity and Decision Makers: Data Security and Digital TrustIntended for anyone concerned about the protection of their data, as well as decision makers in any organization, this book presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world.
By Marie de Fréminville
-
Book
Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart EnvironmentsWith contributions by both academic and industrial researchers, this book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application.
By Aboul Ella Hassanien, Mohamed Elhoseny (eds)
-
Book
Cybersecurity Blue Team ToolkitDesigned to be an easily navigated tool for daily use, this handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise.
By Nadean H. Tanner
-
Book
Cybersecurity Career GuideCybersecurity Career Guide shows you how to turn your existing technical skills into an awesome career in information security. In this practical guide, you'll explore popular cybersecurity jobs, from penetration testing to running a Security Operations Center.
By Alyssa Miller
-
Book
Cybersecurity Crisis Management and Lessons Learned From the COVID-19 PandemicCybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic provides cutting-edge research on the best guidelines for preventing, detecting, and responding to cyber threats within educational, business, health, and governmental organizations during the COVID-19 pandemic.
By Aida Ben Chehida Douss, Ryma Abassi
-
Book
Cybersecurity EssentialsCybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
By Charles J. Brooks, Christopher Grow, Donald Short, Philip Craig
-
Book
Cybersecurity First Principles: A Reboot of Strategy and TacticsIn Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
By Rick Howard
-
Book
Cybersecurity for Business: OrganizationWide Strategies to Ensure Cyber Risk Is Not Just an IT IssueThis essential guide outlines the true nature of modern cyber risk, and how it can be assessed and managed using modern analytical tools to put cybersecurity in business terms.
By Larry Clinton
-
Book
Cybersecurity for DummiesIntroducing you to the basics of becoming cyber-secure, this practical book will teach you what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached.
By Joseph Steinberg
-
Book
Cybersecurity For Dummies, 2nd EditionCybersecurity For Dummies is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.
By Joseph Steinberg
-
Book
Cybersecurity for Executives: A Practical GuideThrough discussions of risk, strategy, policies, change and personnel management, and performance measures, this practical book provides relevant and timely information to help readers make better decisions regarding cybersecurity.
By C. Joseph Touhill, Gregory J. Touhill
-
Book
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and PreventionThe vulnerability of the medical equipment inside the hospital to cyber-attacks far eclipses the actual building equipment. This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities.
By Luis Ayala
-
Book
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SISExplaining how to develop and implement an effective cybersecurity program for ICS, this book provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
By Bryan Singer, Tyson Macaulay
-
Book
Cybersecurity for Space: Protecting the Final FrontierDiscussing the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. This book covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.
By Jacob G. Oakley
-
Book
Cybersecurity Guidance for Small and Medium-Sized EnterprisesAddressing the SME scenario and its typical resources, budget and technical-skills limitations, this sample content offers SMEs a practical and manageable tool for planning, implementing and maintaining good cybersecurity at affordable cost.
By ISACA
-
Book
Cybersecurity in the Electricity Sector: Managing Critical InfrastructureThis book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions.
By Rafał Leszczyna
-
Book
Cybersecurity LawWritten in an accessible manner, this definitive guide to cybersecurity law provides real-world examples and case studies to help readers understand the practical applications of the presented material.
By Jeff Kosseff
-
Book
Cybersecurity Law, Standards and Regulations, 2nd EditionIn a friendly, easy-to-understand style, this book offers real-world business examples supported by a wealth of court cases and covers the range of practical information you will need as you explore - and prepare to apply - cybersecurity law.
By Kristen Noakes-Fry, Tari Schreider
-
Book
Cybersecurity LexiconDescribing the threats and vulnerabilities of critical infrastructure to cybersecurity attack, this book provides definitions for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry.
By Luis Ayala
-
Book
Cybersecurity Measures for E-Government FrameworksCybersecurity Measures for E-Government Frameworks provides security techniques and measures to e-governance applications. It further discusses emerging technologies in the cybersecurity field as well as the specific uses they have to e-government technologies.
By Imdad Ali Shah, Noor Zaman, Samina Rajper
-
Book
Cybersecurity of Industrial SystemsHow to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems.
By Jean-Marie Flaus
-
Book
Cybersecurity Program Development for Business: The Essential Planning GuideFrom understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive.
By Chris Moschovitis
-
Book
Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity FrameworkThe book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack.
By Brian Haugli, Cynthia Brumfield
-
Book
Cybersecurity Training: A Pathway to ReadinessReaders learn to apply this proven project-oriented training approach to improve the probability of successful cybersecurity awareness and role-based training experiences. The reader is guided to initiate, plan, design, develop, pilot, implement and evaluate training and learning, followed by continual improvement sprints and projects.
By Chris Walker, Greg Skulmoski
-
Book
Cybersecurity: A Self-Teaching IntroductionWritten in an easy to understand, "self-teaching" format, this book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime.
By C. P. Gupta, K. K. Goyal
-
Book
Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsA comprehensive and authoritative look at the critical topic of cybersecurity from start to finish, this essential book addresses cybersecurity strategies that include identity management, risk management, and incident management.
By Thomas J. Mowbray
-
Book
Cybersecurity: Public Sector Threats and ResponsesFocusing on the convergence of globalization, connectivity, and the migration of public sector functions online, this practical book identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world.
By Kim Andreasson
-
Book
Cyberspace and CybersecuritySupplying complete coverage of cyberspace and cybersecurity, this important book not only emphasizes technologies but also pays close attention to human factors and organizational perspectives.
By George K. Kostopoulos
-
Book
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and ResponsesThis book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
By Reza Montasari
-
Book
Cyberterrorism: Understanding, Assessment, and ResponseWith contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, this book offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism.
By Lee Jarvis, Stuart Macdonald, Thomas M. Chen
-
Book
Cyberwar, Cyberterror, Cybercrime and Cyberactivism: An In-depth Guide to the Role of Security Standards in the Cybersecurity Environment. 2nd EditionEncouraging cybersecurity professionals to take a wider view of what cybersecurity means, this book explains how to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses.
By Julie E. Mehan
-
Book
Cyberwarfare: An Introduction to Information-Age ConflictConflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. This book provides an introduction to the underlying technologies, strategies, and policies that provide the venue for modern information-age conflict.
By Isaac R. Porche III
-
Book
Cyberwarfare: Information Operations in a Connected WorldIncluding detailed case studies drawn from actual cyberwarfare operations and tactics, this book explains the history of cyberwarfare, techniques used in both offensive and defensive information warfare, and how cyberwarfare is shaping military doctrine.
By David Seidl, Mike Chapple
-
Book
Cyberwarfare: Information Operations in a Connected World, Second EditionCyberwarfare: Information Operations in a Connected World, Second Edition puts students on the real-world battlefield of cyberspace! The text covers the role of cyberwarfare in modern military operations, where it has become almost impossible to separate cyberwarfare from traditional warfare.
By David Seidl, Mike Chapple
-
Book
Dark Web Pattern Recognition and Crime Analysis Using Machine IntelligenceDark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web.
By Om Kumar C.U., P. William, Romil Rawat, Shrikant Telang, Upinder Kaur
-
Book
Darkweb Cyber Threat Intelligence MiningAimed at both cybersecurity practitioners and researchers, this timely book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them.
By John Robertson, et al.
-
Book
Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and ApplicationsBringing together important lessons learned within a young, but surprisingly rapid field, this book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks.
By Harsha Kumara Kalutarage, Iván Palomares Carrascosa, Yan Huang (eds)
-
Book
Data Analytics for Internal AuditorsProviding a reference guide for IT and Internal Auditors as well as Fraud Examiners, this book presents information written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting data analytics.
By Richard E. Cascarino
-
Book
Data Governance: How to Design, Deploy, and Sustain an Effective Data Governance ProgramSpecifically aimed at managers who need to implement a data governance program at their company, this book provides a complete overview of the data governance lifecycle and includes case studies to detail 'do's' and 'don'ts' in real-world situations.
By John Ladley
-
Book
Data Leaks For DummiesNow more than ever, it's critical to keep your company data locked up tighter than Fort Knox. This guide has the scoop on what's at risk, how leaks happen, how to keep your data safe without being inflexible, and even what to do if the worst happens.
By Gareth Fraser-King, Guy Bunker
-
Book
Data Mining and Machine Learning in CybersecurityProviding a unified reference for specific machine learning solutions to cybersecurity problems, this book supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges detailing cutting-edge machine learning and data mining techniques.
By Sumeet Dua, Xian Du
-
Book
Data Privacy for the Smart GridProviding a clear description of the Smart Grid ecosystem, this thorough resource presents practical guidance about its privacy risks, and details the actions required to protect data generated by Smart Grid technologies.
By Christine Hertzog, Rebecca Herold
-
Book
Data Privacy Law: An International PerspectiveAlthough over 100 countries have developed data privacy laws, there is a lack of expert guidance on these laws. This text examines the fundamental aims and principles of data privacy law, along with the mechanisms for its enforcement in an international context.
By Lee A. Bygrave
-
Book
Data Privacy: A Runbook For EngineersThe book's constant awareness of business requirements will help you balance trade-offs, and ensure your user's privacy can be improved without spiraling time and resource costs.
By Nishant Bhajaria
-
Book
Data Protection and Compliance, Second editionThis book explores about data protection and compliance.
By Adam Panagiotopoulos, Ben Johnson, James Drury-Smith, Jamie Taylor, Mark Hendry, Michelle Maher, Niall O'Brien, Richard Hall, Shervin Nahid, Simon Davis, Stewart Room, Tuğhan Thuraisingam
-
Book
Data Protection OfficerThis book provides a practical guide to the DPO role, encompassing the key activities you'll need to manage to succeed in the role.
By Filip Johnssén, Sofia Edvardsen
-
Book
Data Security Breaches and Privacy in EuropeProviding a fruitful discussion on data security breaches, this book looks at whether a balance can be drawn by the current and proposed Data Protection framework to protect against data security breaches and considers what more needs to be achieved.
By Rebecca Wong
-
Book
Data Strategy: From definition to executionThis book is your essential guide to planning, developing and implementing such a strategy, presenting a framework which takes you from data strategy definition to successful strategy delivery and execution with support and engagement from stakeholders.
By Ian Wallis
-
Book
Deep Dive: Exploring the Real-world Value of Open Source IntelligenceIn Deep Dive: Exploring the Real-world Value of Open Source Intelligence, veteran open-source intelligence analyst Rae Baker explains how to use publicly available data to advance your investigative OSINT skills and how your adversaries are most likely to use publicly accessible data against you.
By Rae L. Baker
-
Book
Deep Learning Applications for Cyber SecurityFilling an important gap between deep learning and cyber security communities, this book addresses questions of how deep learning methods can be used to advance cyber security objectives.
By Mamoun Alazab, MingJian Tang (eds)
-
Book
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against ItOffering an insider's view of the secrets of hackers, this hands-on guide exposes methodologies hackers use to exploit physical access, network access, and wireless vectors, and shows you how you can outwit computer predators at their own game.
By Jesse Varsalone, Matthew McFadden, et al.
-
Book
Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions GuideUse this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution.
By Anahit Tarkhanyan, Jody Booth, Sunil Cheruvu, Werner Metz
-
Book
Design and Analysis of Security Protocol for CommunicationThis book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack.
By Dinesh Goyal
-
Book
Design and Evaluation of Physical Protection Systems, Second EditionDescribing the difference between safety and security to emphasize the difference between accidents or natural disasters and malevolent human attack, this book explores the process to protect targets against appropriate threats.
By Mary Lynn Garcia
-
Book
Design for Hackers: Reverse Engineering BeautyPacked with unique reverse engineering design examples, this book provides you with the framework for understanding good design and inspires and encourages you to discover and create new beauty in a variety of formats.
By David Kadavy
-
Book
Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and EventsDevelop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events.
By Eric C. Thompson
-
Book
Designing and Building Enterprise DMZsExplaining what an administrator needs to plan out and integrate a DMZ into a network for small, medium, and Enterprise networks, this unique book demonstrates how to make DMZs, utilizing the IT world's best of breed software and hardware products.
By C. Tate Baumrucker, et al.
-
Book
Detecting and Combating Malicious EmailDiscussing how and why malicious e-mail is used, this hands-on book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments.
By Cade Kamachi, Julie JCH Ryan
-
Book
Digital Earth: Cyber Threats, Privacy and Ethics In an Age of ParanoiaThe book offers a rational insight into technological threats that we will all encounter, and provides navigation in an increasingly technologically advanced world.
By Sarah Katz
-
Book
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Third EditionFeaturing coverage of the abuse of computer networks, and privacy and security issues on computer networks, this book explains how computers and networks function, how they can be involved in crimes, and how they can be used as evidence.
By Eoghan Casey
-
Book
Digital ForensicsFeaturing real-word examples and scenarios, including court cases and technical problems, this book is a definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field.
By André Årnes
-
Book
Digital Forensics Basics: A Practical Guide Using Windows OSDirected toward users with no experience in the digital forensics field, this hands-on book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime.
By Nihad A. Hassan
-
Book
Digital Forensics for Handheld DevicesConsidering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks.
By Eamon P. Doherty
-
Book
Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice RequirementsOffering a step-by-step guide to designing, building and using a digital forensics lab, this comprehensive book provides those who handle digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab.
By Andrew Jones, David Watson
-
Book
Digital Forensics with Open Source ToolsAuthored by world-renowned forensic practitioners, this technical procedural guide explains the use of open source tools on Linux and Windows systems as a platform for performing computer forensics.
By Cory Altheide, Harlan Carvey
-
Book
Digital Forensics, Investigation, and Response, Fourth EditionDigital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs.
By Chuck Easttom, PhD, DSc, MEd
-
Book
Digital Forensics: Threatscape and Best PracticesDelivering an incisive analysis and best practices from a panel of expert authors, this comprehensive book surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and ever changing technology.
By John Sammons
-
Book
Digital Media Law, Second EditionCovering the latest legal updates and rulings, this guide presents a comprehensive introduction to all the critical issues surrounding media law such as information access and protection, intellectual property, defamation, privacy, indecency, and commercial speech.
By Ashley Packard
-
Book
Digital Privacy: Theory, Technologies, and PracticesFeaturing contributions from experts in academia, industry, and government, this book provides information on state-of-the-art privacy technologies, best practices, and research results, as well as legal, regulatory, and ethical issues.
By Alessandro Acquisti, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (eds), Stefanos Gritzalis
-
Book
Digital Resilience: Is Your Company Ready for the Next Cyber Threat?Fascinating and highly readable, this powerful guide lays bare tactics used by hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks, but thriving even while under assault.
By Ray A. Rothrock
-
Book
Disclosure of Security VulnerabilitiesProviding readers with a comprehensive source of latest trends, cases, issues and research in this field, this jargon-free book considers both the ethical and legal issues involved with the disclosure of vulnerabilities and explores the ways in which law might respond to these challenges.
By Alana Maurushat
-
Book
Discovering Cybersecurity: A Technical Introduction for the Absolute BeginnerThis book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them.
By Seth James Nielson
-
Book
Distributed Denial of Service Attack and DefensePresenting the latest developments in this increasingly crucial field along with background context and survey material, this useful resource provides readers with a complete and self-contained resource for information about DDoS attacks and how to defend against them.
By Shui Yu
-
Book
E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation SupportExplaining key industry trends, especially the Federal Rules of Civil Procedure which are driving the adoption of e-discovery programs, this book will help your organization develop an effective electronic discovery program.
By Karen Schuler
-
Book
Effective Physical Security, Fifth EditionFeaturing terminology, references, websites, appendices to chapters, and checklists, this detailed guide is a best-practices compendium that details the essential elements and latest developments in physical security protection.
By Lawrence J. Fennelly
-
Book
Effective Physical Security, Fourth EditionContaining contributions from expert security specialists in the field, this book provides a wealth of practical information on physical security and the process of securing a facility - from electronic surveillance and wiretapping to fundamental perimeter security principles.
By Lawrence J. Fennelly
-
Book
Effective Security Management, Fifth EditionPresenting a time-tested blend of common sense, wisdom, and humor, this book offers the most accurately balanced picture of a security manager's duties while wittily illustrating the array of pitfalls a new manager must learn to avoid in order to lead effectively.
By Charles A. Sennewald
-
Book
Electronic Access ControlDescribing the full range of EAC devices, this comprehensive introduction presents an arcane and complex subject with a conversational and layered learning approach that results in a thorough understanding of each point.
By Thomas Norman
-
Book
Elementary Information Security, Second EditionProviding a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities.
By Richard E. Smith
-
Book
Elementary Information Security, Third EditionThoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Third Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.
By Richard E. Smith
-
Book
Eleventh Hour CISSP: Study Guide, Second EditionProviding a study guide keyed directly to the most current version of the CISSP exam, this complete and concise book is streamlined to include only core certification information and is presented for ease of last minute studying giving you the best possible chance of acing the exam.
By Eric Conrad, Joshua Feldman, Seth Misenar
-
Book
Eleventh Hour CISSP: Study Guide, Third EditionConcisely covering the main objectives of the exam with key concepts highlighted, this thorough book is streamlined for maximum efficiency of study, making it ideal for professionals updating their certification or for those taking the test for the first time.
By Eric Conrad, Joshua Feldman, Seth Misenar
-
Book
Email Security: A Pocket GuideConsidering e-mail in terms of its significance in a business context, this guide covers the main security issues affecting organizations that use e-mail, examining why effective security policy and safeguards are crucial in ensuring the company's viability.
By Paul Dowland, Steven Furnell
-
Book
EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide, Third EditionIncluding hands-on exercises, practice questions, and up-to-date legal information, this official Guidance-endorsed study guide prepares candidates for both Phase 1 and Phase 2 of the exam, as well as for practical use of the certification.
By Steve Bunting
-
Book
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum CryptographyCryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers.
By Robert Ciesla
-
Book
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First TimeProviding cutting-edge cybersecurity solutions to defend against the most sophisticated attacks, this step-by-step book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems.
By O. Sami Saydjari
-
Book
Ensuring Digital Accessibility through Process and PolicyProviding real-world examples throughout which highlight organizations that are doing an effective job with providing equal access to digital information for people with disabilities, this book serves as a one-stop guide to understanding digital accessibility, offering an overview of current laws, regulations, technical standards, evaluation techniques, as well as best practices and suggestions for implementing solutions and monitoring for compliance.
By Anne Taylor, Daniel Goldstein, Jonathan Lazar
-
Book
Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive AdvantageThis book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage.
By Bob Chaput
-
Book
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced ThreatsPresenting a comprehensive framework for coordinating an entire enterprise cybersecurity system, this book will teach you how to design, manage, and operate a balanced program that is pragmatic and realistic in the face of resource constraints and other real-world limitations.
By Abdul Aslam, Chris K. Williams, Scott E. Donaldson, Stanley G. Siegel
-
Book
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced ThreatsPresenting a comprehensive framework for managing all aspects of an enterprise cybersecurity program, this book empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks.
By Abdul Aslam, Chris K. Williams, Scott E. Donaldson, Stanley G. Siegel
-
Book
Enterprise Governance of Information Technology: Achieving Strategic Alignment and ValueFeaturing numerous case examples from companies around the world, this book integrates theoretical advances and empirical data with practical application, including in-depth discussion of such frameworks as COBIT and VALIT, which are used to measure and audit the value of IT investments.
By Steven De Haes, Wim Van Grembergen
-
Book
Enterprise Security Architecture: A Business-Driven ApproachBased around the SABSA layered framework, this book shows that having a comprehensive plan requires more than the purchase of security software-it requires a framework for developing and maintaining a system that is proactive.
By Andrew Clark, David Lynas, John Sherwood
-
Book
Enterprise Value: Governance of IT Investments: The Val IT Framework 2.0 ExtractAn introduction and primer for executives and senior management, this extract publication is an introduction to value management, based on "Enterprise Value: Governance of IT Investments, The Val IT Framework 2.0."
By IT Governance Institute
-
Book
Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain EnglishThis book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features.
By Denny Cherry
-
Book
Essential Skills for HackersPresenting a foundation for the skills required to be an elite hacker, this book delves into understanding what TCP/IP is, and discusses protocol analysis and how analyzing the protocol will enable you to determine exactly what is taking place on a network.
By Kevin Cardwell
-
Book
Ethical Data and Information Management: Concepts, Tools and MethodsWritten by global experts in the field, this book sets out, in a clear and structured way, the fundamentals of ethics, and provides practical and pragmatic methods for organizations to embed ethical principles and practices into their management and governance of information.
By Daragh O Brien, Katherine O’Keefe
-
Book
Ethical Hacker's Certification Guide (CEHv11)This book is intended for prospective and seasonal cybersecurity lovers who want to master cybersecurity and ethical hacking. It also assists software engineers, quality analysts, and penetration testing companies who want to keep up with changing cyber risks.
By Mohd Sohaib
-
Book
Ethical Hacker's Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless NetworksThis book is intended for pen testers, ethical hackers, security analysts, cyber professionals, security consultants, and anybody interested in learning about penetration testing, tools, and methodologies. Knowing concepts of penetration testing is preferable but not required.
By Samir Kumar Rakshit
-
Book
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malwareWhether you are a network/system administrator, network security engineer, security defender, QA engineer, ethical hacker or cybersecurity aspirant, this book helps you to see the invisible and understand the digital chatter that surrounds you.
By Manish Sharma
-
Book
Ethical Hacking and Penetration Testing GuideSupplying a simple and clean explanation of how to effectively utilize a wide range of tools, this accessible resource details a four-step methodology for conducting an effective penetration test or hack to provide you with a fundamental understanding of offensive security.
By Rafay Baloch
-
Book
Ethical Hacking: A Hands-on Introduction to Breaking InEthical Hacking is a crash course in modern hacking techniques. It's already being used to prepare the next generation of offensive security experts.
By Daniel G. Graham
-
Book
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth EditionEthical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.
By Michael G. Solomon, Sean-Philip Oriyano
-
Book
Ethically Hacking an Industrial Control System: Analyzing, Exploiting, Mitigating, and Safeguarding Industrial Processes for an Ethical HackerThis book begins by covering the fundamentals of industrial processes, then goes on to learn how to design and break them.
By Sharon Ferrone
-
Book
EU Annex 11 Guide to Computer Validation Compliance for the Worldwide Health Agency GMPIncluding examples from laboratory, clinical, and manufacturing computer systems, this book examines the implementation of computer systems compliance program based on EU Annex 11, and discusses electronic record integrity associated with stored information.
By Orlando López
-
Book
EU GDPR & EU-US Privacy Shield: A Pocket Guide, Second EditionThis concise guide is essential reading for US organizations wanting an easy to follow overview of the GDPR and the compliance obligations for handling data of EU citizens, including guidance on the EU-U.S. Privacy Shield.
By Alan Calder
-
Book
EU GDPR: A Pocket Guide, School's EditionA clear, concise primer on data protection in schools, this book is an essential resource for anyone in the education sector looking to get to grips with the key principles of data privacy and the EU General Data Protection Regulation.
By Alan Calder
-
Book
EU GDPR: A Pocket Guide, Second EditionThis book provides an accessible overview of the changes you need to make in your organization to comply with the new law.
By Alan Calder
-
Book
EU GDPR: An International Guide to ComplianceThis pocket guide will help you understand the Regulation, the broader principles of data protection, and what the GDPR means for businesses in Europe and beyond. Please visit https://www.itgovernancepublishing.co.uk/topic/uk-gdpr-supplemental-material to download your free Brexit supplement.
By Alan Calder
-
Book
EU General Data Protection Regulation (GDPR): An Implementation and Compliance GuideA clear and comprehensive guide to this new data protection law, this book explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties.
By IT Governance Privacy Team
-
Book
EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide, Fourth EditionThis bestselling guide is the ideal companion for anyone carrying out a GDPR (General Data Protection Regulation) compliance project. It provides comprehensive guidance and practical advice on complying with the Regulation. Visit https://www.itgovernancepublishing.co.uk/topic/uk-gdpr-supplemental-material to download your free Brexit supplement.
By IT Governance Privacy Team
-
Book
EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide, Second EditionA clear and comprehensive guide to this new data protection law, this book explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand.
By IT Governance Privacy Team
-
Book
EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide, Third EditionA clear and comprehensive guide to this new data protection law, this book explains the Regulation and sets out the obligations of data processors and controllers in simple terms and will help you understand how to achieve compliance with the GDPR.
By IT Governance Privacy Team
-
Book
Europrivacy: The First European Data Protection SealThe Europrivacy scheme embraces a broad range of data processing operations, including new technologies such as blockchain, the Internet of Things, automated cars, smart cities and AI.
By Alice Turley
-
Book
Evolution of Cyber Technologies and Operations to 2035Authored by leading experts in the field, this reference explores how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure.
By Misty Blowers (ed)
-
Book
Executive's Guide to Cyber Risk: Securing the Future TodayIn the Executive's Guide to Cyber Risk: Securing the Future Today, distinguished information security and data privacy expert Siegfried Moyo delivers an incisive and foundational guidance for executives tasked with making sound decisions regarding cyber risk management.
By Siegfried Moyo
-
Book
Exploding the Myths Surrounding ISO9000 : A Practical Implementation GuideDrawing on more than 25 years of the author's hands-on experience, this book debunks many of the common misconceptions about ISO9001, and provides clear, practical and up-to-date advice on how to implement a Quality Management System to maximum effect.
By Andrew W. Nichols
-
Book
Federated Identity PrimerExplaining the concepts of digital identity, this book describes the technology behind and implementation of federated identity systems and helps you decide if federated identity is good for your system or web service.
By Derrick Rountree
-
Book
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and InstitutionsExploring a range of cybersecurity topics impacting financial enterprises, this book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals.
By Jennifer L. Bayuk, Paul Rohmeyer
-
Book
Firewall Design and AnalysisDetailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject, this unique book presents scientifically sound and practically useful methods for designing and analyzing firewall policies.
By Alex X. Liu
-
Book
Firewall Policies and VPN ConfigurationsWith in-depth coverage of the top market-leading firewall products, this book focuses on creating policies that apply to multiple products and offers numerous tips for troubleshooting remote connections.
By Anne Henmi (ed)
-
Book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies, 5th EditionThe goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world.
By Carey Parker
-
Book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies, Fourth EditionRely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible.
By Carey Parker
-
Book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-TechiesComplete with checklists, step-by-step instructions, and pictures, this practical, end-to-end guide on cyber safety and online security gives you just what you need to protect yourself without judgment, and with as little jargon as possible.
By Carey Parker
-
Book
Firewalls For Dummies, 2nd EditionWith the handy tips and hints this book provides, you'll understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one for your home or business network.
By Brian Komar, Joern Wettern, Ronald Beekelaar
-
Book
FISMA Compliance Handbook, Second EditionIncluding coverage for both corporate and government IT managers, this authoritative book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish.
By Laura P. Taylor
-
Book
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations, 2nd EditionForensic Analytics reviews the methods and techniques that forensic accountants can use to detect intentional and unintentional errors, fraud, and biases.
By Mark J. Nigrini
-
Book
Forensic Radio Survey Techniques for Cell Site AnalysisIntended to be used both as a textbook and as an aide memoire handbook for forensic radio survey engineers, particularly those working for official police agencies, this book focuses on radio surveys, the various types of survey, the techniques employed for each survey type and the considerations and potential problems that can be encountered when surveying different types of network.
By Joseph Hoy
-
Book
Foundations of Coding: Compression, Encryption, Error CorrectionOffering a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations, this book is an invaluable resource for understanding the various ways information is structured for its secure and reliable transmission.
By Jean-Guillaume Dumas, Jean-Louis Roch, Sébastien Varrette, Éric Tannier
-
Book
From Hacking to Report Writing: An Introduction to Security and Penetration TestingTeaching you everything you need to know to become a professional security and penetration tester, this thorough book provides on-the-job stories that will give you a good understanding of how you can apply what you have learned to real-world situations.
By Robert Svensson
-
Book
Fundamental of Cyber SecurityUsing simple language, a crystal clear approach, and a straightforward presentation with examples and answered questions, this user-friendly book features the most current research findings in all aspects of information security.
By Aatif Jamshed, Mayank Bhushan, Rajkumar Singh Rathore
-
Book
Fundamentals of Information Risk Management Auditing: An Introduction for Managers and AuditorsProviding insight into information risk management auditing for those considering a career in information risk management, and an introduction for non-specialists, such as those managing technical specialists, this book discusses the risks and controls that you may encounter when performing an audit of information risk, together with suggested mitigation approaches based on those risks and controls.
By Christopher Wright
-
Book
Fundamentals of Information Security: A Complete Go-to Guide for Beginners to Understand All the Aspects of Information SecurityFor anyone who wants to make a career in Information Security, this book provides a roadmap for the technical and non-technical student and includes the skills and competencies required for each role in the field.
By Sanil Nadkarni
-
Book
Fundamentals of Information Systems Security, Fourth EditionFundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the concepts readers must know as they pursue careers in information systems security.
By David Kim, Michael G. Solomon
-
Book
Fundamentals of Information Systems Security, Second EditionFeaturing a practical, conversational writing style and step-by-step examples, this book discusses the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today.
By David Kim, Michael G. Solomon
-
Book
GCIH GIAC Certified Incident Handler All-in-One Exam GuideWritten by a recognized cybersecurity expert and seasoned author, this detailed study guide will help you prepare for the challenging GIAC Certified Incident Handler exam while also serving as an ideal on-the-job reference.
By Nick Mitropoulos
-
Book
Getting Started with HIPAAThis title will be removed from the Skillsoft library on May 24, 2024.
By Uday O. Ali Pabrai
-
Book
GIAC Security Leadership Certification (GSLC) Exam Preparation: The How To Pass on Your First Try Certification Study GuideOffering numerous sample questions and critical time-saving tips, this self-study guide features highly realistic sample questions and exercises designed to strengthen understanding of GSLC concepts to ensure exam success on your first attempt.
By William Manning
-
Book
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and DefenseGo H*ck Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach.
By Bryson Payne
-
Book
Google Hacking for Penetration Testers, Volume 2Written by the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums, this book provides all the information you need to protect yourself from Google hackers.
By Johnny Long
-
Book
Governance and Internal Controls for Cutting Edge ITBased on practical experience and real-life models, this book explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs, and will enable them to apply security and control methods that are suitable for their business.
By Karen F. Worstell
-
Book
Governance of IT: An Executive Guide to ISO/IEC 38500A practical approach to best practices in IT governance, this valuable book shows how to govern, protect and manage information and technology assets, and will help you reduce the risk involved in delivering business information systems.
By A. L. Holt
-
Book
GPEN GIAC Certified Penetration Tester All-in-One Exam GuideFeaturing exam-focused coverage of penetration testing methodologies, legal issues, and best practices, this effective self-study guide contains useful tips and tricks, real-world examples, and case studies drawn from authors' extensive experience.
By Bill MacCormack, Ray Nutting
-
Book
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth EditionOffering field-tested remedies, case studies, and ready-to-deploy testing labs, this cutting-edge book presents techniques for finding and fixing critical security flaws and explains how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers.
By Daniel Regalado, et al.
-
Book
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth EditionProviding cutting-edge techniques for finding and fixing critical security flaws, this state-of-the-art resource explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-try testing labs.
By Allen Harper, et al.
-
Book
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth EditionThis fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.
By Daniel Fernandez, Dr. Allen Harper, Huáscar Tejeda, Michael Baucom, Moses Frost, Ryan Linn, Stephen Sims
-
Book
Group Policy: Fundamentals, Security, and the Managed DesktopTeaching you the major categories of Group Policy, essential troubleshooting techniques, and how to manage your Windows desktops, this guide will get you up to speed on the latest Group Policy settings and more.
By Jeremy Moskowitz
-
Book
GSEC GIAC Security Essentials Certification All-in-One Exam GuideProviding learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations, this comprehensive resource will help you prepare for - and pass - the Global Information Assurance Certification's Security Essentials (GSEC) exam.
By Ric Messier
-
Book
GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second EditionGet complete coverage of all the objectives on Global Information Assurance Certification's Security Essentials (GSEC) exam inside this comprehensive resource.
By Ric Messier
-
Book
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and ServicesIn the face of relentless pressure to get things done faster, this book facilitates rapid forecasting of capacity requirements, based on opportunistic use of available performance data and tools so that management insight is expanded but production schedules are not.
By Neil J. Gunther
-
Book
Guide to Computer Network Security, Second EditionIncluding both quickly-workable questions and more thought-provoking advanced exercises, this book exposes the various security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security.
By Joseph Migga Kizza
-
Book
Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best PracticesIn today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach responses - is central to defending organizations' interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.
By Dietmar P.F. Möller
-
Book
Hacked: The Secrets Behind Cyber AttacksDiscover the strategies, secrets and stories behind the cyber attacks that target businesses and individuals across the world and learn how you can safeguard yourself against them.
By Jessica Barker
-
Book
Hacker Techniques, Tools, and Incident Handling, Second EditionProviding readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them, this book examines the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data.
By Sean-Philip Oriyano
-
Book
Hacker Techniques, Tools, and Incident Handling, Third EditionHacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams.
By Michael G. Solomon, Sean-Philip Oriyano
-
Book
Hacking and Penetration Testing with Low Power DevicesDesigned to keep you at the top of your game performing cutting-edge pen tests from anywhere in the world, this book shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered.
By Philip Polstra
-
Book
Hacking APIs: Breaking Web Application Programming InterfacesHacking APIs will teach you how to test web APIs for security vulnerabilities.
By Corey Ball
-
Book
Hacking ExposedRevealing the techniques and tools that are used by both criminal and ethical hackers, this book provides an in-depth discussion of what hacking is all about and dives deep into the basic security procedures one should follow to avoid being exploited.
By Soumya Ranjan Behera
-
Book
Hacking Exposed 7: Network Security Secrets & SolutionsFilled with case studies to expose hackers' latest devious methods and illustrate field-tested remedies, this guide will show you how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks.
By George Kurtz, Joel Scambray, Stuart McClure
-
Book
Hacking Exposed Cisco Networks: Cisco Security Secrets & SolutionsDefend against the sneakiest attacks by looking at your Cisco network through the eyes of the intruder. With the help of this step-by-step guide, you'll prevent catastrophes by learning how new flaws in Cisco-centered networks are discovered and abused.
By Andrei A. Mikhailovsky, Andrew A. Vladimirov, Janis N. Vizulis, Konstantin V. Gavrilenko
-
Book
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & SolutionsExposing the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries, this hands-on guide shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective.
By Aaron Shbeeb, Bryan L. Singer, Clint E. Bodungen, Kyle Wilhoit, Stephen Hilt
-
Book
Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second EditionProviding up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology, this thorough resource fully explains the hacker's latest methods alongside ready-to-deploy countermeasures.
By Aaron LeMasters, Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer
-
Book
Hacking Exposed Mobile Security Secrets & SolutionsHelping you identify and evade key threats across the expanding mobile risk landscape, this book covers the wide range of attacks to your mobile deployment, and provides ready-to-use countermeasures.
By Jason Rouse, Joel Scambray, Mike Stanfield, Neil Bergman
-
Book
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second EditionPacked with relevant case studies and examples, this comprehensive guide offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures so you can establish a holistic security stance by viewing your infrastructure through the eyes of the nefarious cyber-criminal.
By David Endler, Mark Collier
-
Book
Hacking Exposed Web Applications: Web Application Security Secrets and Solutions, Third EditionBased on the author's many years as a security professional hired to break into the world's largest IT infrastructures, this definitive guide shows you how to meet the challenges of online security with a two-pronged "attack-countermeasure" approach.
By Caleb Sima, Joel Scambray, Vincent Liu
-
Book
Hacking Exposed Wireless: Wireless Security Secrets & Solutions, Third EditionFeaturing expert coverage of ever-expanding threats that affect leading-edge technologies, this thorough guide will show innovative techniques that will enable you to exploit weaknesses in wireless network environments.
By Johnny Cache, Joshua Wright
-
Book
Hacking For Dummies, 5th EditionIs hacking something left up to the bad guys? Certainly not! This up-to-date resource will guide you in hacking your system to better protect your network against malicious attacks and recognize any vulnerabilities that are lurking in your system so you can fix them before someone else finds them.
By Kevin Beaver
-
Book
Hacking for Dummies, 6th EditionWhether you're worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently-with confidence and ease.
By Kevin Beaver
-
Book
Hacking for Dummies, 7th EditionHacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
By Kevin Beaver
-
Book
Hacking Point of Sale: Payment Application Secrets, Threats, and SolutionsA must-read guide for professionals responsible for securing credit and debit card transactions, this unique resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.
By Slava Gomzin
-
Book
Hacking the Hacker: Learn from the Experts Who Take Down HackersCybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.
By Roger A. Grimes
-
Book
Hacking Vim: A Cookbook to get the Most out of the Latest Vim EditorProviding recipes for easy-to-use hacks to customize and simplify your experience, this book explains basic changes that you can make to the appearance of the Vim editor and covers everything about using Vim scripts and scripting to extend functionality.
By Kim Schulz
-
Book
Hacking VoIP: Protocols, Attacks, and CountermeasuresRaising awareness of the importance of VoIP security, this book describes potential attacks, explains VoIP's biggest weaknesses, and offers solutions for protecting against potential exposure and attacks.
By Himanshu Dwivedi
-
Book
Hacking Web Apps: Detecting and Preventing Web Application Security ProblemsEnsuring that you are covering the most vicious attacks out there, this guide not only lets you in on the anatomy of these attacks, but also tells you how to get rid of worms, trojans, and botnets - and how to defend against them in the future.
By Mike Shema
-
Book
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and TechniquesShowing you how to dig into the Web and uncover the information many don't even know exists, this book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence.
By Nutan Kumar Panda, Sudhanshu Chauhan
-
Book
Hacking Wireless Access Points: Cracking, Tracking, and Signal JackingProviding a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems, this book presents concrete examples and real-world guidance on how to protect against wireless access point attacks.
By Jennifer Ann Kurtz
-
Book
Hacking with Kali: Practical Penetration Testing TechniquesWith hands-on exercises and detailed examples and explanations, this complete book will walk the reader through the penetration testing lifecycle using the most advanced live disk available today, Kali Linux.
By Andrew Bindner, James Broad
-
Book
Hacking: The Art of Exploitation, Second EditionSharing the art and science of hacking in a way that is accessible to everyone, this guide will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques.
By Jon Erickson
-
Book
Handbook of Biometric Anti-Spoofing: Trusted Biometrics Under Spoofing AttacksPresenting the latest work from a global selection of experts in the field, this thorough book reviews the state of the art in covert attacks against biometric systems and in deriving countermeasures to these attacks.
By Mark S. Nixon, Stan Z. Li (eds), Sébastien Marcel
-
Book
Handbook of Computer Networks and Cyber Security: Principles and ParadigmsThis handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook.
By Brij B. Gupta, Deepak Gupta, Dharma P. Agrawal, Gregorio Martínez Pérez
-
Book
Handbook of Digital Forensics and InvestigationProviding methodologies proven in practice for conducting digital investigations of all kinds , this unique guide offers case examples that give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations.
By Eoghan Casey, et al.
-
Book
Handbook of Digital Forensics of Multimedia Data and DevicesFocusing on the interface between digital forensics and multimedia forensics, this book brings two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation.
By Anthony T.S. Ho, Shujun Li (eds)
-
Book
Handbook of FPGA Design SecurityCombining theoretical underpinnings with a practical design approach and worked examples, this book on managing security in FPGA designs is for researchers and practitioners in the electronic design automation (EDA) and FPGA communities.
By Ted Huffmire, et al.
-
Book
Handbook of Loss Prevention and Crime Prevention, Fifth EditionA comprehensive overview of current approaches to security and crime prevention, this book provides the tools and technologies to put these approaches into action, and information on a wide range of specific areas within the field of physical security.
By Lawrence J. Fennelly
-
Book
Handbook of Surveillance Technologies, Third EditionUsing a narrative style and more than 950 illustrations, this handbook is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies-offering the latest in surveillance and privacy issues.
By J.K. Petersen
-
Book
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical SystemsPresenting an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives, this book ensures that the systems of these connected products operate safely, without creating hazards to us and those around us.
By Edward Griffor (ed)
-
Book
Hands-On Ethical Hacking and Network DefenseThis title will be removed from the Skillsoft library on May 24, 2024.
By James E. Corley, Kent Backman, Michael T. Simpson
-
Book
Hands-on Incident Response and Digital ForensicsExploring the relationship between incident response and digital forensics, this practical guide will show you how to undertake each and balance them to meet the needs of an organization in the event of an information security incident.
By Mike Sheward
-
Book
Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark (English Edition)This book offers readers with knowledge and skillset to identify, exploit and control the security vulnerabilities present in commercial web applications including online banking, mobile payments and e-commerce applications.
By Richa Gupta
-
Book
Hardware Security: A Hands-on Learning ApproachIllustrated through theory, case studies and well-designed, hands-on laboratory exercises, this handy reference provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure.
By Mark Tehranipoor, Swarup Bhunia
-
Book
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam GuideDesigned to help you pass the rigorous exam with ease while also serving as an on-the-job reference, this book provides complete coverage of all seven security and privacy exam domains along with examples and practice questions that closely match those on the actual test.
By Sean P. Murphy
-
Book
HCISPP Study GuideContaining only what you need to pass the HCISPP exam, this complete and effective study guide will help you prepare for the exam and put you on the forefront of health care information privacy and security.
By Justin Rainey, Timothy Virtue
-
Book
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisIntended for practitioners and investigators, this detailed resource exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them.
By Brett Shavers, John Bair
-
Book
Homeland Security Techniques and TechnologiesThis title will be removed from the Skillsoft library on May 24, 2024.
By Jesus Mena
-
Book
Honeypots and Routers: Collecting Internet AttacksExplaining the role of honeypots and routers in capturing Internet attacks, this detailed book provides readers with an understanding of honeypot concepts and architecture, and outlines the skills necessary to deploy the best honeypot solutions for any environment.
By Habib-ur Rehman, Mohssen Mohammed
-
Book
Hospital and Healthcare Security, Sixth EditionConveying a wide spectrum of topics in an easy to comprehend format, this new edition reflects the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence, and emergency preparedness and management.
By Don MacAlister, Tony W. York
-
Book
How Cyber Security Can Protect Your Business: A Guide for All StakeholdersIncluding a checklist to help you focus on higher-priority cyber areas, this book explains how a strategic approach to cyber security can benefit your organization and provides an effective and efficient framework for managing cyber governance, risk and compliance.
By Christopher Wright
-
Book
How Cybersecurity Really Works: A Hands-On Guide for Total BeginnersHow Cybersecurity Really Works is the perfect introduction to cybersecurity. Whether you're a computer science student or a business professional, it will teach you the basics without all the jargon.
By Sam Grubb
-
Book
How the Internet Really Works: An Illustrated Guide to Protocols, Privacy, Censorship, and GovernanceHow the Internet Really Works answers these questions and more. Using clear language and whimsical illustrations, the authors translate highly technical topics into accessible, engaging prose that demystifies the world's most intricately linked computer network.
By ARTICLE 19
-
Book
How to Achieve 27001 Certification: An Example of Applied Compliance ManagementUsing security standards ISO 17799 and ISO 27001 as a basis, this thorough guide helps an organization align its security and organizational goals so it can generate effective security, compliance, and management programs.
By Keith D. Willett, Sigurjon Thor Arnason
-
Book
How to Catch a Phish: A Practical Guide to Detecting Phishing EmailsLearn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.
By Nicholas Oles
-
Book
How to Complete a Risk Assessment in 5 Days or LessWith user-friendly checklists, forms, questionnaires, and sample assessments, this step-by-step guide demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization.
By Thomas R. Peltier
-
Book
How to Define and Build an Effective Cyber Threat Intelligence CapabilityDiscussing how to create a proactive strategy for digital security, this book offers a clarifying definition of what Cyber Threat Intelligence is, describes how to communicate its value to business, and lays out concrete steps toward implementing Intelligence-Led Security.
By Henry Dalziel
-
Book
How to Hack Like a Ghost: Breaching the CloudGo deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment.
By Sparc Flow
-
Book
How to Measure Anything in Cybersecurity RiskA ground shaking exposé on the failure of popular cyber risk management methods, this insightful book exposes the shortcomings of current "risk management" practices and offers a series of improvement techniques that help you fill the holes and ramp up security.
By Douglas W. Hubbard, Richard Seiersen
-
Book
How to Measure Anything in Cybersecurity Risk, Second EditionIn the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity.
By Douglas W. Hubbard, Richard Seiersen
-
Book
HP NonStop Server SecurityThis handbook provides readable advice on the key decisions in safeguarding the numerous components of the HP NonStop environment.
By XYPRO Technology Corporation
-
Book
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and TechniquesThrough the eyes of the author who has several years of experience in the subject, this book immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques.
By Vinny Troia
-
Book
IAPP CIPM Certified Information Privacy Manager Study GuideAn essential resource for anyone preparing for the CIPM certification exam and a career in information privacy
By Joe Shelley, Mike Chapple
-
Book
IAPP CIPP / US Certified Information Privacy Professional Study GuideThis book is perfect for anyone considering a career in privacy or preparing to tackle the challenging IAPP CIPP exam as the next step to advance an existing privacy role, the IAPP CIPP/US Certified Information Privacy Professional Study Guide offers you an invaluable head start for success on the exam and in your career as an in-demand privacy professional.
By Joe Shelley, Mike Chapple
-
Book
Identity Attack Vectors: Implementing an Effective Identity and Access Management SolutionDetailing the risks associated with poor identity management practices, this book outlines the techniques that threat actors and insiders leverage, and the operational best practices that organizations should adopt to protect against identity theft and account compromises.
By Darran Rolls, Morey J. Haber
-
Book
Identity Management: Concepts, Technologies, and SystemsProviding a comprehensive overview of current trends and future directions in identity management, this practical resource offers an in-depth understanding of how to design, deploy and assess identity management solutions.
By Elisa Bertino, Kenji Takahashi
-
Book
Implementing 802.1X Security Solutions for Wired and Wireless NetworksWith step-by-step instructions, recommendations, and troubleshooting tips, this guide will steer you safely around the pitfalls, smooth out the rough patches, and guide you to a successful implementation of 802.1x in both wired and wireless networks.
By Jim Geier
-
Book
Implementing an Information Security Management System: Security Management Based on ISO 27001 GuidelinesA step-by-step guide on implementing secure ISMS for your organization, this book offers best practices, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls.
By Abhishek Chopra, Mukund Chaudhary
-
Book
Implementing an Integrated Management System (IMS): The Strategic ApproachIdeal for the C-suite, directors, compliance managers, auditors and trainers, this guide will help you understand the benefits of an IMS (integrated management system) and how you can successfully implement one in your organization.
By Alan Field
-
Book
Implementing Analytics: A Blueprint for Design, Development, and AdoptionDemystifying the concept, technology and application of analytics, this book breaks its implementation down to repeatable and manageable steps, making it possible for widespread adoption across all functions of an organization.
By Nauman Sheikh
-
Book
Implementing Cryptography Using PythonWalking you through creating secure communications in public channels using public-key cryptography, this easy-to-read guide provides real-world examples to aid in your understanding of the pros and cons of various authentication methods.
By Shannon W. Bray
-
Book
Implementing Digital Forensic Readiness: From Reactive to Proactive ProcessIncluding chapter introductions, objectives, summaries, and definitions, this book shows information security and digital forensic professionals how to increase operational efficiencies by implementing a proactive approach to digital forensics throughout their organization.
By Jason Sachowski
-
Book
Implementing Service Quality based on ISO/IEC 20000: A Management Guide, Third EditionWritten for companies of any size, anywhere, this up-to-date, step-by-step management guide will lead you through implementation and certification, enabling you to streamline your management processes and offer first-class customer service at competitive prices.
By Michael Kunas
-
Book
Implementing SSH: Strategies for Optimizing the Secure ShellPrevent unwanted hacker attacks with this detailed guide that will show you how to strengthen your company's system defenses, keep critical data secure, and add to the functionality of your network by deploying SSH.
By Himanshu Dwivedi
-
Book
Implementing SSL/TLS Using Cryptography and PKIWhether you have a working knowledge of cryptography or not, this practical guide will help you understand the internals of the SSL and TSL libraries so that when it comes time to use one, you will have a firm understanding of what takes place at each stage.
By Joshua Davies
-
Book
Implementing the NIST Cybersecurity FrameworkThrough the guidance and templates provided in this text, this book brings a unique and valuable understanding of how to implement the Cybersecurity Framework (CSF).
By ISACA
-
Book
Incident Response & Computer Forensics, Third EditionFeaturing real-world case studies that reveal the methods behind--and remediation strategies for--today's most insidious attacks, this practical resource arms you with the information you need to get your organization out of trouble when data breaches occur.
By Jason T. Luttgens, Matthew Pepe
-
Book
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and other Industrial Control SystemsDiscussing common pitfalls and mistakes and how to avoid them, this book examines the unique protocols and applications that are the foundation of industrial control systems and provides you with comprehensive guidelines for their protection.
By Eric Knapp
-
Book
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and other Industrial Control Systems, Second EditionProviding a thorough understanding of the unique challenges facing critical infrastructures, this book presents guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
By Eric D. Knapp, Joel Thomas Langill
-
Book
Infonomics: How to Monetize, Manage, and Measure Information as an Asset for Competitive AdvantageProviding a set of new ideas, frameworks, evidence, and approaches, this book is for the burgeoning force of chief data officers (CDOs) and other information and analytics leaders in their valiant struggle to help their organizations become more infosavvy.
By Douglas B. Laney
-
Book
Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the CloudThis book will show you how to implement information assurance risk management strategies within your organization.
By Bradley Fowler
-
Book
Information Assurance ArchitectureProviding a framework for organizations to align information assurance with the enterprise and their overall mission, this practical book demonstrates a disciplined approach in thinking about, planning, implementing and managing security.
By Keith D. Willett
-
Book
Information Assurance: Managing Organizational IT Security RisksThe authors of this text lay out a detailed strategy for defining information security, establishing IA goals, providing training for security awareness, and conducting airtight incident response to system compromise.
By Dan W. Jennings, Joseph G. Boyce
-
Book
Information Governance and Security: Protecting and Managing Your Company's Proprietary InformationIncluding real-world examples and cases to help illustrate key concepts and issues, this step-by-step book explains how to create and implement the policies, procedures and training necessary to keep an organization's proprietary information safe from cyber and physical compromise.
By John G. Iannarelli, Michael O'Shaughnessy
-
Book
Information Governance: Concepts, Strategies and Best Practices, Second EditionBacked by expert insight and crucial advice from a leading authority in the field, this step-by-step book is a highly practical and deeply informative guide for the implementation of effective Information Governance (IG) procedures and strategies.
By Robert F. Smallwood
-
Book
Information Governance: Concepts, Strategies, and Best PracticesWritten by one of the most recognized and published experts on information governance, this thorough book provides step-by-step guidance for developing information governance strategies and practices to manage risk in the use of electronic business documents and records.
By Robert F. Smallwood
-
Book
Information Risk Management: A practitioner's guide, 2nd EditionThis accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme.
By David Sutton
-
Book
Information Security and IT Risk ManagementDesigned for an introductory course on IS Security, this introductory book provides a hands-on immersion in essential system administration, service and application installation and configuration, security tool use, TIG implementation and reporting.
By Alex Campoe, Eric Pierce, Manish Agrawal
-
Book
Information Security Auditor: Careers in information securityConfronting the typical stereotype associated with the role of information security (or assurance) auditor, this practical book offers an excellent introduction to the role, covering areas such as purpose, required skills, responsibilities, interface and career progression, as well as tools, standards and frameworks related to the role.
By Wendy Goucher
-
Book
Information Security Breaches: Avoidance and Treatment based on ISO27001, 2nd EditionOffering clear guidance on how to treat an information security breach, this book explains all the plans and procedures you have to put in place to minimise damage and return to business as usual if you do discover a breach.
By Michael Krausz
-
Book
Information Security for ManagersUtilizing an incremental development method called knowledge scaffolding, this text provides an overview of conceptual and applied knowledge of information and systems security.
By Daniel C. Phelps, John N. Gathegi, Michael Workman
-
Book
Information Security Governance: Framework and Toolset for CISOs and Decision MakersPresenting tools and examples allowing the various managers to take on their roles, this book presents a framework to model the main activities of information security management and governance.
By Andrej Volchkov
-
Book
Information Security Governance: Guidance for Information Security ManagersDiscussing how to develop an information security strategy within an organization's governance framework, this book provides guidance on determining information security objectives and how to measure progress toward achieving them.
By W. Krag Brotby
-
Book
Information Security Law: The Emerging Standard for Corporate ComplianceTaking a high level view of the multitude of security laws and regulations, this guide explains the common approach of most security laws, and seeks to help businesses understand the issues that they need to address to become generally legally compliant.
By Thomas J. Smedinghoff
-
Book
Information Security Management Audit/Assurance ProgramDesigned as a review tool and starting point for the completion of a specific assurance process, this guide evaluates the scope of the information security management organization and determines whether essential functions are being addressed effectively.
By ISACA
-
Book
Information Security Management Handbook, Sixth Edition, Volume 1Promoting the view that the management, ethics, and values of an organization leads directly to its information security program, this guide addresses up-to-date issues in this increasingly important area.
By Harold F. Tipton, Micki Krause
-
Book
Information Security Management Handbook, Sixth Edition, Volume 3In step with the lightning-quick, increasingly fast pace of change in the technology field, this book fully explores access control, telecommunications and network security, information security and risk management, application security, and cryptography.
By Harold F. Tipton, Micki Krause (eds)
-
Book
Information Security Management Handbook, Sixth Edition, Volume 6Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, this comprehensive reference facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.
By Harold F. Tipton, Micki Krause Nozaki (eds)
-
Book
Information Security Management Handbook, Sixth Edition, Volume 7Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, this guide facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.
By James S. Tiller (eds), Richard O'Hanley
-
Book
Information Security Management Principles, Third EditionIncluding coverage of the security of cloud-based resources, this book provides significant first steps along the path of dealing with information assurance in a realistic and comprehensive manner.
By Amanda Finch, Andy Taylor, David Alexander, David Sutton
-
Book
Information Security Management, Third EditionInformation Security Management, Second Edition arms students with answers to the most critical questions about the fields of cybersecurity. It provides students with references to more in-depth study in areas where they may need to specialize.
By Michael Workman
-
Book
Information Security Management: Concepts and PracticeFilled with review questions, workshops, and real-world examples, this authoritative and practical classroom resource provides a general overview of security auditing before examining the various elements of the information security life cycle.
By Bel G. Raggad
-
Book
Information Security Policies, Procedures, and Standards: A Practitioner's ReferenceHighlighting key terminology, policy development concepts and methods, and suggested document structures, this practical guide includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards.
By Douglas J. Landoll
-
Book
Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, this book will help readers elicit management opinions on information security and document the formal and informal procedures currently in place.
By Barry L. Williams
-
Book
Information Security Risk Analysis, Third EditionPresenting case studies and examples of all risk management components, this authoritative reference provides you with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment in a matter of days.
By Thomas R. Peltier
-
Book
Information Security Risk Assessment Toolkit: Practical Assessments Through Data Collection and Data AnalysisBased on the authors' experiences of real-world assessments, reports, and presentations, this thorough book gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.
By Jason L. Martin, Mark Ryan M. Talabis
-
Book
Information Security Risk Management for ISO 27001 / ISO 27002, Third EditionIdeal for risk managers, information security managers, lead implementers, compliance managers and consultants, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits.
By Alan Calder
-
Book
Information Security Risk Management for ISO27001 /ISO27002Explaining in practical detail how to carry out an information security risk assessment, this book offers expert guidance on planning and implementing a risk assessment and protecting your business information.
By Alan Calder, Steve G. Watkins
-
Book
Information Security Risk Management for ISO27001/ISO17799Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, this book explains in practical detail how to carry out an information security risk assessment.
By Alan Calder, Steve G. Watkins
-
Book
Information Security: A Practical GuideCovering everything from your first day at work as an information security professional to developing and implementing enterprise-wide information security processes, this book provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.
By Tom Mooney
-
Book
Information Technology Control and Audit, Third EditionIncluding guidelines for preparing for the CISA Exam, as well as numerous illustrations, graphs and charts to help readers visualize the concepts, this book serves as an introductory reference to IT governance, controls, and auditing.
By Frederick Gallegos, Sandra Senft
-
Book
Information Technology Security FundamentalsAssisting managers in understanding the role of IT Security in their enterprise, this book defines security from an organizational perspective, then builds upon that by discussing issues related to low-level technologies and higher level management issues like security policy.
By Bryan Hosack, Glen Sagers
-
Book
Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from WithinDetailing the measures that organizations can implement to ensure high-impact quick wins, this in-depth book looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security.
By Julie E. Mehan
-
Book
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and TheftWritten to teach IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructures, this pertinent book reveals ways to mitigate these risks.
By Eric Cole, Sandra Ring
-
Book
Intelligence-Based Security in Private IndustryUsing case studies to describe initiatives needed to implement an intelligence-based security program, this book describes key aspects of intelligence-based security, including risk and vulnerability assessments, analyzing external and internal threats, and "blended" physical and cyber security.
By Thomas A. Trier
-
Book
Intelligent Edge Computing for Cyber Physical ApplicationsIntelligent Edge Computing for Cyber Physical Applications introduces state-of-the-art research methodologies, tools and techniques, challenges, and solutions with further research opportunities in the area of edge-based cyber-physical systems.
By B. B. Gupta, D. Jude Hemanth, Mohamed Elhoseny, Swati Vijay Shinde
-
Book
Intelligent Network Video: Understanding Modern Video Surveillance SystemsAn essential resource for security system designers, consultants, and installers, as well as business and security managers, this book provides detailed coverage of advanced digital networking and intelligent video capabilities and optimization.
By Fredrik Nilsson
-
Book
Internet and Web Application Security, Third EditionInternet and Web Application Security, Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications.
By Mike Harwood
-
Book
Internet Searches for Vetting, Investigations, and Open-Source IntelligenceOffering some of the challenges, risks, and caveats to overcome in exploiting the potential of Internet searching and analysis, this valuable resource covers the legal, policy, privacy and management issues posed by Internet misbehavior and the availability of evidence.
By Edward J. Appel
-
Book
Introduction to Cyber-Warfare: A Multidisciplinary ApproachPresenting detailed case studies of cyber-attacks, this in-depth and cutting edge book analyzes the information technology, military, policy, social, and scientific issues that are in play within cyber-warfare.
By Andrew Ruef, Jana Shakarian, Paulo Shakarian
-
Book
Introduction to Genetic AlgorithmsIncluding numerous hands-on problems and solutions, this comprehensive book is a helpful guide and a valuable source of information about Genetic Algorithm concepts for their several practical applications.
By S.N. Deepa, S.N. Sivanandam
-
Book
Introduction to Network SecurityThis title will be removed from the Skillsoft library on May 24, 2024.
By Neal Krawetz
-
Book
Introduction to Network Security: Theory and PracticeProviding students with a solid base on which to build critical thinking skills, this book offers an overview of network security before progressing to security threats, key protocols and network perimeter defenses, then concludes with cloud security and anti-malicious software - hot topics in both industry and academia.
By Jie Wang, Zachary A. Kissel
-
Book
Introduction to Public Key InfrastructuresIncluding detailed pointers to relevant standards and implementation guidelines, as well as exercises and solutions, this detailed resource explains the most important concepts underlying public key infrastructures (PKIs) and discusses relevant standards, implementations, and applications.
By Alexander Wiesmaier, Evangelos Karatsiolis, Johannes A. Buchmann
-
Book
Introduction to Security, 10th EditionWith a heavy focus on current and future security issues, this primer provides an overview of the security industry with an emphasis on the theories of security and loss prevention that have shaped the profession.
By David C. Walters, Edward P. Halibozek, Robert J. Fischer
-
Book
Introduction to Social Media Investigation: A Hands-on ApproachFeaturing hands-on tutorials and case studies, and offering additional data-gathering techniques, this book presents an overview of social media and discusses special skills and techniques to use when conducting investigations.
By Jennifer Golbeck
-
Book
Introduction to Surveillance StudiesEnhanced with numerous photos, and featuring an examination of pros and cons, this book explores technological trends, past- and present-day rationales for surveillance and surveillance devices, and current social issues surrounding them.
By J. K. Petersen
-
Book
iOS Penetration Testing: A Definitive Guide to iOS SecurityUnearthing some of the most significant attacks threatening iOS applications in recent times, this book will teach you the methods of patching them to make payment transactions and personal data sharing more secure.
By Kunal Relan
-
Book
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad, and iOS DevicesDetailing the techniques to forensically acquire the iPhone, iPad and other iOS devices, this book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner.
By Andrew Hoog, Katie Strzempka
-
Book
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Tenth EditionThe book's co-authors bring decades of experience as cybersecurity practitioners and educators, integrating real-world expertise with the practical knowledge you'll need to successfully prove your CISSP mastery. Combined, they've taught cybersecurity concepts to millions of students through their books, video courses, and live training programs.
By Darril Gibson, James Michael Stewart, Mike Chapple
-
Book
ISC2 CISSP Certified Information Systems Security Professional: Official Practice Tests, Fourth EditionThe CISSP credential signifies a body of knowledge and a set of guaranteed skills that put you in demand in the marketplace. This book is your ticket to achieving this prestigious certification, by helping you test what you know against what you need to know.
By David Seidl, Mike Chapple
-
Book
ISO 27001 Controls: A Guide to Implementing and AuditingIdeal for information security managers, auditors, consultants and organizations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001.
By Bridget Kenyon
-
Book
ISO 27001 Controls: A Guide to Implementing and Auditing, Second Edition NEW!The auditing guidance covers what evidence an auditor should look for to satisfy themselves that the requirement has been met. This guidance is useful for internal auditors and consultants, as well as information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit.
By Bridget Kenyon
-
Book
ISO 27001/ISO 27002: A Guide to Information Security Management SystemsISO 27001 is one of the leading information security standards. It offers an internationally recognised route for organisations of all sizes and industries to adopt and demonstrate effective, independently verified information security.
By Alan Calder
-
Book
ISO 9000 Quality Systems Handbook: Using the Standards as a Framework for Business Improvement, Sixth EditionPacked with insights into how the standard has been used, misused and misunderstood, this guide will show you effective quality management using the ISO 9000 family of standards as a framework for business process management (BPM) and improvement.
By David Hoyle
-
Book
ISO 9001:2015: A Pocket GuideDesigned to help ensure the quality of your products and services, increase customer satisfaction, and enhance your business' efficiency, this concise, handy guide includes a brief history of quality management and ISO 9001; useful definitions of terminology; requirements for a QMS; some of the myths surrounding ISO 9001 certification; and more.
By Nick Orchiston, Steve Watkins
-
Book
ISO/IEC 20000: An Introduction To The Global Standard For Service ManagementHelping you ensure that your IT service management processes align with your business needs, this guide contains invaluable advice on how to define the appropriate scope for assessment against ISO20000 and how service management activities are audited.
By David Clifford
-
Book
ISO/IEC 27001:2022: An Introduction to Information Security and the ISMS StandardGet up to speed with the ISO 27001:2022 updates and keep your information secure. Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022.
By Steve G Watkins
-
Book
ISO/IEC 27701: 2019: An Introduction to Privacy Information ManagementAn introduction to the Standard, this concise resource seeks to aid those organizations looking to improve their privacy information management regime, particularly where ISO/IEC 27701:2019 is involved.
By Alan Shipman, Steve Watkins
-
Book
ISO/IEC 38500: A Pocket Guide, Second EditionThis useful pocket guide is an ideal introduction for those wanting to understand more about ISO 38500. It describes the scope, application and objectives of the Standard and outlines its six core principles.
By Alan Calder
-
Book
ISO/IEC 38500: The IT Governance StandardHelping you to understand both this new standard and the complex area of IT governance, this guide includes an overview of the ISO/IEC 38500 standard, a framework for good IT governance, project governance, and the Calder-Moir Framework.
By Alan Calder
-
Book
ISO14001 Step by Step: A Practical GuideIntended to help you implement an environmental management system (EMS), this guide will show you how to achieve compliance with ISO14001, manage environmental risks, prepare to deal with an emergency, and improve the image of your brand.
By Asif Hayat Khan, Naeem Sadiq
-
Book
ISO19770-1:2012 SAM Process Guidance: A Kick-Start to Your SAM ProgrammeAimed at anyone looking to gain a better understanding of the concepts of software asset management and the resulting benefits it can bring to their business, this book offers a concise summary of the principles conveyed by ISO 19770-1: 2012.
By Rory Canavan
-
Book
ISO22301: A Pocket GuideHow would your organization keep going in the event of a crisis? To minimize the impact of disaster, you need to implement a Business Continuity Management System (BCMS) - and the expert advice in this guide will help you ensure your organization develops one that is fit for purpose.
By Tony Drewitt
-
Book
ISO27000 and Information Security: A Combined GlossaryA combined glossary, enabling you to find explanations of geek slang, procedural language and acronyms all in one place, this book provides you with authoritative explanations of those information security terms that are used across the ISO framework.
By Alan Calder, Steve G. Watkins
-
Book
ISO27001 / ISO27002: A Pocket Guide, Second EditionOffering a wider view of what it means to implement an ISO27001 Information Security Management System (ISMS), this handy guide is an essential overview of two key information security standards that cover the formal ISMS, and the best-practice recommendations.
By Alan Calder
-
Book
ISO27001 in a Windows(r) Environment: The Best Practice Handbook for a Microsoft(r) Windows Environment, 3rd EditionDetailing the various controls required under ISO27001, together with the relevant Microsoft products that can be used to implement them, this book explains how to make the most of Windows security features, and bridges the knowledge gap between ISO27001 and Windows security.
By Brian Honan
-
Book
ISO27001-13 Assessments Without Tears: A Pocket Guide, Second EditionWritten in a clear, plain style, this concise guide explains what an ISO 27001 assessment is, why organizations bother with them, and what individual staff should do and, perhaps as importantly, not do if an auditor chooses to question them.
By Steve G. Watkins
-
Book
ISO27001/ISO27002: A Pocket GuideGiving a useful overview of these two important information security standards, this guide provides background to the standards, the certification process, management responsibility, risk assessment, implementation, and much more.
By Alan Calder
-
Book
IT Audit, Control, and SecurityDescribing the types of internal controls, security, and integrity procedures that management must build into its automated systems, this book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.
By Robert R. Moeller
-
Book
IT Auditing and Application Controls for Small and Mid-Sized Enterprises: Revenue, Expenditure, Inventory, Payroll, and MoreUniquely focused on the IT needs of auditors serving the small- to medium-sized business, this straightforward guide includes conceptual overviews of key IT auditing issues, as well as concrete hands-on tips and techniques.
By Harry Howe, Jason Wood, William Brown
-
Book
IT Auditing: Using Controls to Protect Information Assets, Second EditionFeaturing real-world examples, ready-to-use checklists, and valuable templates, this guide explains, step by step, how to implement a successful, enterprise-wide IT audit program.
By Chris Davis, Kevin Wheeler, Mike Schiller
-
Book
IT Auditing: Using Controls to Protect Information Assets, Third EditionFully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program.
By Brian Wrozek, Chris Davis, Mike Kegerreis, Mike Schiller
-
Book
IT Compliance and Controls: Best Practices for ImplementationOffering a structured architectural approach, this book provides an understanding of the world of compliance from the perspective of what the problems are, where they come from, and how to position your company to deal with them today and into the future.
By James J. DeLuccia IV
-
Book
IT Governance - An international guide to data security and ISO 27001/ISO 27002, Eighth edition NEW!As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely.
By Alan Calder, Steve Watkins
-
Book
IT Governance: A Manager's Guide to Data Security and ISO27001/ISO 27002, 4th EditionWritten for companies looking to protect and enhance their information security management systems, this book allows them to ensure that their IT security strategies are coordinated, coherent, comprehensive and cost effective.
By Alan Calder, Steve Watkins
-
Book
IT Governance: A Pocket GuideProviding an introduction on how to approach this complex subject, this guide offers a basic understanding of how an organization's Information Technology supports and enables the achievement of its strategies and objectives.
By Alan Calder
-
Book
IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002, Seventh EditionWith information on risk assessments, compliance, equipment and operations security, controls against malware and asset management, this book is the definitive guide to implementing an effective information security management and governance system.
By Alan Calder, Steve Watkins
-
BOOK SUMMARY
IT Governance: An International Guide to Data Security and ISO27001/ISO27002, 6th EditionIT Governance is a guide for every manager who seeks to safeguard and improve his or her company's information security management system. In this Summary, we discuss the salient points of the book based on our interpretation of its contents.
By Alan Calder, Steve Watkins
-
Book
IT Governance: Implementing Frameworks and Standards for the Corporate Governance of ITOutlining the steps to meet today's corporate and IT governance requirements, this book offers guidance on how board executives and IT professionals can navigate and deploy the numerous IT management and IT governance frameworks and standards.
By Alan Calder, Steve Moir
-
Book
IT Induction and Information Security Awareness: A Pocket GuideInformation security breaches tend to occur as a result of human, as well as technological, failings; however, the human factor usually receives far less attention. This concise guide will show you how you can improve information security for your organization through effective employee training.
By Valerie Maddock
-
Book
IT Security Controls: A Guide to Corporate Standards and Frameworks, 1st EditionThe book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.).
By Oben Kuyucu, Virgilio Viegas
-
Book
IT Security Metrics: A Practical Framework for Measuring Security & Protecting DataProviding a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization, this book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies.
By Lance Hayden
-
Book
IT Security Project Management HandbookRather than losing sleep at night wondering who's wandering around your network in the dark, this practical book will help you create a comprehensive solution that meets your security needs today and will allow you to address future security requirements.
By Susan Snedaker
-
Book
IT Security Risk Control Management: An Audit Preparation PlanExplaining how to construct an information security program, from inception to audit, this book includes enduring, practical, hands-on advice and actionable behavior on how to craft a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constant changing threats.
By Raymond Pompon
-
Book
ITAF: A Professional Practices Framework for IS Audit/Assurance, 3rd EditionDefining terms and concepts specific to IS assurance, this resource provides a source through which IS audit and assurance professionals can seek guidance, research policies and procedures, obtain audit and assurance programs and develop effective reports.
By ISACA
-
Book
Jump-Start Your SOC Analyst Career: A Roadmap to Cybersecurity SuccessSharing real-world insights and practical tips, this book highlights personal stories from five SOC professionals at various career levels with keen advice that is immediately applicable to your own journey.
By Jarrett Rodrick, Tyler Wall
-
Book
Learn Penetration Testing with Python 3.xThis book starts with an understanding of penetration testing and red teaming methodologies and teaches Python 3.x from scratch for those who are not familiar with programming. The book gives the skills of how to create scripts for cracking, and brute force attacks.
By Yehia Elghaly
-
Book
Lessons Learned: Critical Information Infrastructure Protection: How to Protect Critical Information InfrastructureHelping you understand how to protect your critical information infrastructure (CII), this book aims to teach the IT framework from within, allowing you to reduce dependence on IT systems and put in place the necessary processes and procedures to help protect your CII.
By Toomas Viira
-
Book
Linguistic Identity MatchingA must-read for anyone involved in the purchase, design or use of identity matching systems, this book describes how linguistic knowledge can be used to create a more reliable and precise identity search, and looks at the practical benefits that can be achieved by implementing third-generation linguistic search technology.
By Bertrand Lisbach, Victoria Meyer
-
Book
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in KaliIf you're getting started along the exciting path of hacking, cybersecurity, and pentesting, this practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them.
By OccupyTheWeb
-
Book
Low Tech Hacking: Street Smarts for Security ProfessionalsContaining detailed descriptions of potential threats and vulnerabilities, this informative guide focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses.
By Jack Wiles, et al.
-
Book
LPI Security Essentials Study Guide: Exam 020-100In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-premise and in the cloud.
By David Clinton
-
Book
LTE SecurityProviding first hand information from 3GPP insiders who explain the rationale for design decisions, this comprehensive resource shows how LTE security substantially extends GSM and 3G security.
By Dan Forsberg, Günther Horn, Valtteri Niemi, Wolf-Dietrich Moeller
-
Book
LTE Security, Second EditionA concise guide to the 3GPP LTE Security Standardization specifications, this essential book provides first-hand information from insiders who participated in decisively shaping SAE/LTE security in 3GPP, and can therefore explain the rationale for design decisions in this area.
By Dan Forsberg, Günther Horn, Valtteri Niemi, Wolf-Dietrich Moeller
-
Book
Making Sense of CybersecurityMaking Sense of Cybersecurity is a crystal-clear overview of common cyber threats written for business and technical readers with no background in security.
By Thomas Kranz
-
Book
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern MalwareDiscover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware.
By Abhijit Mohanta, Anoop Saldanha
-
Book
Malware Analyst's Cookbook: Tools and Techniques for Fighting Malicious CodeSecurity professionals face a constant battle against malicious software. This practical manual will improve your analytical capabilities and provide dozens of valuable, innovative and step-by-step solutions to dozens of common threats.
By Blake Hartstein, Matthew Richard, Michael Hale Ligh, Steven Adair
-
Book
Malware Data Science: Attack Detection and AttributionWhether you're a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, this thorough introduction will help you stay ahead of the curve.
By Hillary Sanders, Joshua Saxe
-
Book
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field GuidesAuthored by information security experts with real-world investigative experience, this field guide contains checklists, case studies, and expert analyst tips to help you dissect the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs.
By Cameron H. Malin, Eoghan Casey, James M. Aquilina
-
Book
Managing an Information Security and Privacy Awareness and Training Program, Second EditionComplete with case studies and examples from a range of businesses and industries, this all-in-one resource provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies.
By Rebecca Herold
-
Book
Managing Online Risk: Apps, Mobile, and Social Media SecurityIncluding case studies, checklists, and policy samples, this book presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses.
By Deborah Gonzalez
-
Book
Managing Risk in Information Systems, Second EditionWritten by industry experts, and using a wealth of examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk.
By Darril Gibson
-
Book
Managing Risk in Information Systems, Third EditionManaging Risk in Information Systems, Third Edition provides a comprehensive overview of risk management and its implications on IT infrastructures and compliance. This new edition addresses risk across entire Information Systems, including Data, People, Processes, and Technology.
By Andy Igonor, Darril Gibson
-
Book
Mastering OpenLDAP: Configuring, Securing and Integrating Directory ServicesPreparing the reader to build a directory using OpenLDAP, this book then employs this directory in the context of the network, taking a practical approach that emphasizes how to get things done.
By Matt Butcher
-
Book
Mathematical Foundations of Public Key CryptographyHelping students bridge the gap between math theory and crypto practice, this accessible book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography.
By Guangwu Xu, Mingqiang Wang, Xianmeng Meng, Xiaoyun Wang
-
Book
MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100In the MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100, a team of dedicated software architects delivers an authoritative and easy-to-follow guide to preparing for the SC-100 Cybersecurity Architect certification exam offered by Microsoft.
By Kathiravan Udayakumar, Puthiyavan Udayakumar
-
Book
Measuring and Managing Information Risk: A Fair ApproachUsing the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, this book provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity.
By Jack Freund, Jack Jones
-
Book
Metasploit: The Penetration Tester's GuideWhether your goal is to secure your own networks or to put someone else's to the test, this book teaches you how to harness the Metasploit framework and interact with the vibrant community of contributors.
By David Kennedy, Devon Kearns, Jim O’Gorman, Mati Aharoni
-
Book
Mike Meyers' Certification Passport CompTIA Security+ (Exam SY0-501), Fifth EditionFeaturing accurate practice exam questions and in-depth answer explanations, this powerful exam preparation resource presents an accelerated review of the pertinent technology and covers all objectives for the CompTIA Security+ exam.
By Dawn Dunkerley
-
Book
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)Featuring hundreds of accurate practice questions, this comprehensive study guide covers all exam objectives in small, digestible modules that allow you to focus on individual skills as you move through a broad and complex set of skills and concepts.
By Mike Meyers, Scott Jernigan
-
Book
Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-601), Sixth EditionHelping you get on the fast track to becoming CompTIA Security+ certified, this book provides expert advice on critical topics, end-of-chapter questions, answers and explanations, common exam pitfalls and solutions, concise definitions of key terms and concepts, and more.
By Dawn Dunkerley
-
Book
MIT Sloan Management Review Article on Adding Cybersecurity Expertise to Your BoardMost corporate boards lack directors with adequate skills to oversee cyber risk. New SEC regulations make correcting that deficiency more urgent.
By Chon Abraham, Iria Giuffrida, Ronald R. Sims, Sasha Cohen O’Connell
-
Book
Mobile Application Security with Open-Source ToolsAuthored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article examines insecure applications deployed in production systems as one of the most overlooked aspects in mobile security.
By Sakthivel Rajendran
-
Book
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second EditionTeaching you how to conduct mobile forensic investigations that are legal, ethical, and highly effective, this practical guide provides detailed information and fully explains the latest tools and methods along with features, examples, and real-world case studies.
By Lee Reiber
-
Book
Mobile PaymentComprising essential aspects of a successful mobile payment as well as successful case studies and practical examples, this comprehensive book is for all who are developing, offering and using mobile payment.
By Thomas Lerner
-
Book
Modern Cryptography: Applied Mathematics for Encryption and Information SecurityAuthored by an InfoSec expert, this practical guide lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape.
By Chuck Easttom
-
Book
Modern Cybersecurity Practices: Exploring and Implementing Agile Cybersecurity Frameworks and Strategies for Your OrganizationShowing you how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out, this book will teach you how to choose, design and implement a cybersecurity program that best fits your needs.
By Pascal Ackerman
-
Book
Moving Target Defense for Distributed SystemsDesigned for researchers and practitioners, this book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems.
By Min Song, Sachin Shetty, Xuebiao Yuchi
-
Book
Multimedia Security 2: Biometrics, Video Surveillance and Multimedia EncryptionMultimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.
By William Puech
-
Book
My Data My Privacy My Choice: A Step-by-Step Guide to Secure Your Personal Data and Reclaim Your Online Privacy!Learn to secure your personal data & reclaim your online privacy! This book will teach you what you need to ensure that the information being leaked by your phone, your desktop, your browser, and your internet connection is minimal-to-none.
By Rohit Srivastwa
-
Book
Navigating the Cybersecurity Career PathIn Navigating the Cybersecurity Career Path, decorated Chief Information Security Officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
By Helen E. Patton
-
Book
Nessus, Snort & Ethereal Power Tools: Customizing Open Source Security ApplicationsIf you have Nessus, Snort, and Ethereal up and running and are ready to customize, code, and torque these tools to their fullest potential, use this go-to guide to detect malicious traffic, scan for vulnerabilities and capture only packets you care about.
By Gilbert Ramirez, Neil Archibald, Noam Rathaus
-
Book
Network and Data Security for Non-EngineersPresenting the tools, establishing persistent presence, and examining the use of sites as testbeds to determine successful variations of software that elude detection, this book explains network and data security by analyzing the Anthem breach step-by-step, and how hackers gain entry, place hidden software, download information, and hide the evidence of their entry.
By Frank M. Groom, Kevin Groom, Stephan S. Jones
-
Book
Network and Information Systems (NIS) Regulations: A Pocket Guide for Digital Service ProvidersThis guide outlines the key requirements, details exactly which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance.
By Alan Calder
-
Book
Network and Information Systems (NIS) Regulations: A Pocket Guide for Operators of Essential ServicesThis guide outlines the requirements for operators of essential services based on the Cyber Assessment Framework established by the National Cyber Security Centre (NCSC), including an explanation of the objectives, principles and indicators of good practice, and offers implementation guidance.
By Alan Calder
-
Book
Network and System Security, Second EditionExploring practical solutions to a wide range of network and systems security issues, this comprehensive book is authored by leading experts in the field and addresses the immediate and long-term challenges in the authors' respective areas of expertise.
By John R. Vacca (ed)
-
Book
Network ForensicsOffering intensive hands-on training with direct translation to real-world application, this book provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity.
By Ric Messier
-
Book
Network Hardening: An Automated Approach to Improving Network SecurityExamining the tools based on attack graphs that help reveal network hardening threats, this book provides an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs.
By Lingyu Wang, Massimiliano Albanese, Sushil Jajodia
-
Book
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost ToolsProviding mid-level IT engineers with the practical tips and tricks they need to harden their IT infrastructure, this book shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and includes tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.
By Chris Chapman
-
Book
Network Science and CybersecurityCovering anomaly detection and algorithms for network security, this book introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.
By Robinson E. Pino (ed)
-
Book
Network Security and Cryptography: A Self-Teaching IntroductionFeaturing the latest material on emerging technologies and end of chapter review questions, this practical resource is a definitive guide to the principles and techniques of cryptography and network security.
By Sarhan M. Musa
-
Book
Network Security Assessment: From Vulnerability to PatchUsing business case studies and examples of real world vulnerabilities, this detailed book takes readers from the creation of corresponding exploits, through a complete security assessment, to deploying patches to protect your network.
By André Gold, Chris Gatford, Steve Manzuik
-
Book
Network Security Bible, 2nd EditionAddressing new techniques, technology, and methods for securing an enterprise worldwide, this comprehensive guide examines new trends and best practices and includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape.
By Eric Cole
-
Book
Network Security JumpStart: Computer and Network Security BasicsBuild your network security career on a solid foundation with these easy-to-understand explanations and realistic examples.
By Matthew Strebe
-
Book
Network Security Technologies and Solutions (CCIE Professional Development Series)With an easy-to-follow approach, this definitive reference helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure.
By Yusuf Bhaiji
-
Book
Network Security, Firewalls and VPNs, Second EditionAuthored by an industry expert, this book provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization's network is connected to the public Internet.
By J. Michael Stewart
-
Book
Network Security: A Decision and Game-Theoretic ApproachCovering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems.
By Tamer Basar, Tansu Alpcan
-
Book
Nine Steps to Success: An ISO27001:2013 Implementation Overview, Second EditionOutlining the nine essential steps to an effective Information Security Management System (ISMS) implementation, this no-nonsense guide presents key information that can mean the difference between project success and abject failure.
By Alan Calder
-
Book
Nine Steps to Success: An ISO27001:2013 Implementation Overview, Third EditionProviding a comprehensive overview of how to lead a successful ISO27001-compliant ISMS implementation in just nine steps, this no-nonsense guide is ideal for anyone tackling ISO27001 for the first time, and covers each element of the ISO27001 project in simple, non-technical language.
By Alan Calder
-
Book
Ninja Hacking: Unconventional Penetration Testing Tactics and TechniquesBy using disguise, espionage, stealth, and concealment, this book throws traditional pen testing methods out the window to demonstrate how thinking and acting like a ninja can actually grant you quicker, more complete access to a company's assets - before a hacker does.
By Jason Andress, Thomas Wilhelm
-
Book
NIST Cybersecurity Framework: A Pocket GuideHelping you take a structured, sensible, risk-based approach to cybersecurity, this guide serves as an introduction to the National Institute of Standards and Technology (NIST) and to its Cybersecurity Framework (CSF).
By Alan Calder
-
Book
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder SurfingPresented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.
By Johnny Long
-
Book
Noiseless Steganography: The Key to Covert CommunicationsDiscussing the implementation and steganalysis validation of ten Nostega-based methodologies, this text provides you with the tools to prevent your adversaries from suspecting the existence of covert communications altogether.
By Abdelrahman Desoky
-
Book
NTP Security: A Quick-Start GuideProviding an understanding of how NTP is critical to modern networks and how it can be exploited, this book will show you how an attacker can wreak havoc on an insecure network and offers guidance to help you manage your system and make it more secure.
By Allan Liska
-
Book
Official (ISC)2 Guide to the CISSP CBK, Fourth EditionOffering a compendium of information security topics, this officially sanctioned resource will serve as authoritative reference for those executives or organizational managers seeking to maintain or improve security measures.
By Adam Gordon (ed)
-
Book
Official (ISC)2 Guide to the CISSP-ISSMP CBK, Second EditionSupplying an authoritative review of key concepts and requirements in the exam, this book provides numerous illustrated examples and practical exercises, and offers insight into creating and implementing effective information security management programs that meet the security needs of today's businesses.
By Joseph Steinberg (ed)
-
Book
Online Security for the Business TravelerAn essential reference guide for any travelling business person or security professional, this book explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity.
By Deborah Gonzalez
-
Book
Open Source Intelligence and Cyber Crime: Social Media AnalyticsThis book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected.
By David B. Skillicorn, Mohammad A. Tayebi, Uwe Glässer
-
Book
OpenVPN: Building and Integrating Virtual Private Networks: Learn How to Build Secure VPNs Using this Powerful Open Source ApplicationA comprehensive guide to using OpenVPN for building secure VPNs, this friendly book is covers basic VPN concepts, then moves to introduce basic OpenVPN configurations, before discussing advanced uses of OpenVPN.
By Markus Feilner
-
Book
Operating System ForensicsCovering digital forensic investigations of the three major operating systems, including Windows, Linux, and Mac OS, this book presents the technical details of each operating system, allowing users to find artifacts that might be missed using automated tools.
By Kevin Mackay, Ric Messier
-
Book
PCI Compliance: The Definitive GuideDelving into payment card industry (PCI) standards from an implementation standpoint, this step-by-step guidebook begins with a basic introduction to PCI compliance, including its history and evolution before thoroughly and methodically examining the specific requirements of PCI compliance.
By Abhay Bhargav
-
Book
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, Fourth EditionProviding the information you need in order to understand the current PCI Data Security standards, this book explains how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and helps you protect sensitive and personally-identifiable information.
By Anton A. Chuvakin, Branden R. Williams
-
Book
PCI DSS Version 4.0: A Guide to The Payment Card Industry Data Security StandardThe PCI DSS (Payment Card Industry Data Security Standard) is now on its fourth version. The withdrawal date for v3.2.1 is 31 March 2024. Many organisations around the world - particularly those that fall below the top tier of payment card transaction volumes - are not yet compliant with the new version.
By Stephen Hancock
-
Book
PCI DSS: A Pocket Guide, Sixth EditionThis guide is perfect as a quick reference for PCI professionals, or as a handy introduction for new staff. It explains the fundamental concepts of the latest iteration of the PCI DSS, v3.2.1, making it an ideal training resource.
By Alan Calder, Geraint Williams
-
Book
PCI DSS: An Integrated Data Security Standard GuideApply machine learning using the Internet of Things (IoT) in the agriculture, telecom, and energy domains with case studies.
By Jim Seaman
-
Book
Penetration Tester's Open Source Toolkit, Fourth EditionCovering the latest technologies and attack vectors, and including industry specific case studies and complete laboratory setup, this guide provides the critical information you need to understand and use the open source tools available today through real-world examples.
By Jeremy Faircloth, T. Michael Rogers
-
Book
Penetration Testing Basics: A Quick-Start Guide to Breaking into SystemsLearn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed.
By Ric Messier
-
Book
Penetration Testing EssentialsIT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set.
By Sean-Philip Oriyano
-
Book
Penetration Testing For DummiesIt is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities.
By Robert Shimonski
-
Book
Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and MetasploitThis book offers a practical approach by discussing several computer and network fundamentals before delving into various penetration testing approaches, tools, and techniques.
By Debasish Mandal
-
Book
Penetration Testing Services Procurement GuidePresenting a useful overview of the key concepts you will need to understand to conduct a well-managed penetration test, this guide explains what a penetration test is (and is not), outlines its strengths and limitations, and describes why an organisation would typically choose to employ an external provider of penetration testing services.
By Jason Creasey
-
Book
Penetration Testing with Kali NetHunter: Hands-On Android and iOS Penetration TestingPenetration testing with Kali NetHunter offers a detailed guide to this platform, helping readers perform effective security tests on Android and iOS devices.
By Gerald “Tripp” Roybal III
-
Book
Penetration Testing: A Guide For Business and IT ManagersExplaining the process of penetration testing and the benefits it brings, this book provides essential insight and tips for setting up a penetration testing program, maintaining it, and responding to the results.
By BCS-CREST Penetration Testing Working Group
-
Book
Penetration Testing: A Hands-On Introduction to HackingUsing a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, this hands-on guide allows you to experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.
By Georgia Weidman
-
Book
Penetration Testing: Protecting Networks and SystemsPresenting a preparatory guide for the Certified Penetration Testing Engineer (CPTE) exam, this book describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report.
By Kevin M. Henry
-
Book
Pentesting Azure Applications: The Definitive Guide to Testing and Securing DeploymentsPacked with real-world examples, sample scripts, and "Defenders Tips" that explain how companies can reduce risk, this comprehensive book provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible.
By Matt Burrough
-
Book
Personal Cybersecurity: How to Avoid and Recover from CybercrimeRevealing the most prevalent cyber threats against individual users on all kinds of computing devices, this book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
By Marvin Waschke
-
Book
Personally Identifiable Information PII Audit/Assurance ProgramDesigned as a review tool and starting point, this document provides management with an assessment of PII policies and procedures and their operating effectiveness, and identifies internal control, information security, and regulatory concerns and deficiencies that could affect the organization.
By ISACA
-
Book
PGP & GPG: Email for the Practical ParanoidFor computer users who aren't familiar with public key cryptography but want to guard their email privacy, this book is an informal tutorial to implementing electronic privacy using the standard tools of the email privacy field.
By Michael W. Lucas
-
Book
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks, 1st EditionThis book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.
By Gunikhan Sonowal
-
Book
Phishing and Counter Measures: Understanding the Increasing Problem of Electronic Identity TheftIntroducing the current tools and techniques of phishing, as well as emerging and future threats, this book presents security technology and countermeasures used to thwart them that are simple for users to implement.
By Markus Jakobsson, Steven Myers
-
Book
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious EmailsAddressing the growing and continuing scourge of phishing emails, this book provides actionable defensive techniques and tools to help you steer clear of malicious emails, and offers insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, while teaching you how to spot a spoofed e-mail or cloned website.
By Christopher Hadnagy, Michele Fincher
-
Book
Phishing ExposedProviding an in-depth, high-tech view from both sides of the phishing playing field, this invaluable book exposes technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year.
By Lance James
-
Book
Physical Security for ITProviding practical, easy-to-understand and readily usable advice, this practical book shows organizations how to design and implement physical security plans for IT, network, and telecommunications assets.
By Michael Erbschloe
-
Book
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation NetworksCovering the entire PKI project lifecycle, this complete guide presents a layered and modular approach to help readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment.
By Andre Karamanian, Francois Dessart, Srinivas Tenneti
-
Book
Practical Anonymity: Hiding in Plain Sight OnlineProviding simple, step-by-step instructions for configuring and using anonymous networking software, this book shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online.
By Peter Loshin
-
Book
Practical Cyber Forensics: An Incident-Based Approach to Forensic InvestigationsBecome an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done.
By Niranjan Reddy
-
Book
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence PracticesThe book is designed for aspiring Cyber Threat Analysts, Security Analysts, Cybersecurity specialists, Security Consultants, and Network Security Professionals who wish to acquire and hone their analytical abilities to identify and counter threats quickly.
By Dr. Erdal Ozkaya
-
Book
Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA DeploymentsSharing their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments, the authors of this book shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system.
By Andy Richter, Jeremy Wood
-
Book
Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and MemoryForensics offers every IT and computer professional a wide opportunity of exciting and lucrative career. This book is a treasure trove of practical knowledge for anyone interested in forensics, including where to seek evidence and how to extract it from buried digital spaces.
By Dr. Akashdeep Bhardwaj, Keshav Kaushik
-
Book
Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile DevicesThis book is your pathway to developing the critical thinking, analytical reasoning, and technical writing skills necessary to effectively work in a junior-level digital forensic or cybersecurity analyst role.
By Mohammed Moreb
-
Book
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoTThe book outlines the tools and techniques used by practitioners in the industry today, as well as the foundations of the professional cybersecurity skillset required to succeed on the SANS Global Industrial Cyber Security Professional (GICSP) exam.
By Charles J. Brooks, Philip A. Craig Jr.
-
Book
Practical Information Security Management: A Complete Guide to Planning and ImplementationCovering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information security practice, hire the right people, and strike the best balance between security controls, costs, and risks.
By Tony Campbell
-
Book
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious SoftwareWhether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, this practical guide will allow you to safely analyze, debug, and disassemble any malicious software that comes your way.
By Andrew Honig, Michael Sikorski
-
Book
Practical Social Engineering: A Primer for the Ethical HackerPractical Social Engineering will help you better understand the techniques behind these social engineering attacks and how to thwart cyber criminals and malicious actors who use them to take advantage of human nature.
By Joe Gray
-
Book
Practical Vulnerability Management: A Strategic Approach to Managing Cyber RiskPractical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose.
By Andrew Magnusson
-
Book
PRAGMATIC Security Metrics: Applying Metametrics to Information SecurityPacked with time-saving tips, this step-by-step book offers easy-to-follow guidance for those struggling with security metrics, and clearly explains how to specify, develop, use, and maintain an information security measurement system.
By Gary Hinson, W. Krag Brotby
-
Book
Predicting Malicious Behavior: Tools and Techniques for Ensuring Global SecurityA groundbreaking exploration of how to identify and fight security threats at every level, this revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more.
By Gary M. Jackson
-
Book
Preventing Good People From Doing Bad Things: Implementing Least PrivilegePromoting the concept of least privilege, this straightforward guide will give readers information on protecting virtual environments, policy, compliance and more to keep inevitable human behaviors from taking over.
By Brian Anderson, John Mutch
-
Book
Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501)Featuring learning objectives, real-world examples, exam tips, and end-of-chapter quizzes and lab projects, this thoroughly revised, full-color textbook will help you pass the exam and become a CompTIA certified computer security expert.
By Chuck Cothren, Dwayne Williams, Gregory White, Roger Davis, Wm. Author Conklin
-
Book
Privacy, Regulations, and Cybersecurity: The Essential Business GuideThis book walks you through our evolving definitions of privacy, from the ancient world all the way to the General Law on Data Protection (GDPR). He then explains-in friendly, accessible language-how to orient your preexisting cybersecurity program toward privacy, and how to make sure your systems are compliant with current regulations.
By Chris Moschovitis
-
Book
Private Security and the Investigative Process, Third EditionComplete with numerous forms, checklists, and exercises, this authoritative yet accessible book covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal.
By Charles P. Nemeth
-
Book
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect OrganizationsDescribing the attack chain and how privileged access management protects against and detects privileged attacks, this book outlines use cases and methodology for deploying a success privileged access management program within an organization.
By Brad Hibbert, Morey J. Haber
-
Book
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations, Second EditionDescribing the attack chain and how privileged access management protects against and detects privileged attacks, this book outlines use cases and methodology for deploying a success privileged access management program within an organization.
By Morey J. Haber
-
Book
Pro Cryptography and Cryptanalysis: Creating Advanced Algorithms with C# and .NETUtilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance.
By Marius Iulian Mihailescu, Stefania Loredana Nita
-
Book
Professional Pen Testing for Web ApplicationsWritten for programmers, developers, and IS professionals who want to learn about web application security and how to audit it, this book will help you become an effective penetrator in order to circumvent security features of Web applications.
By Andres Andreu
-
Book
Professional Penetration Testing: Creating and Learning in a Hacking Lab, Second EditionIncluding real-world examples of vulnerable and exploitable servers, this book shows you how to turn hacking and penetration testing skills into a professional career, and walks you through the entire process of setting up and running a penetration test lab.
By Thomas Wilhelm
-
Book
Professional Red Teaming: Conducting Successful Cybersecurity EngagementsUsing a practical, real-world, and tempered approach to cyber operations, this unique book will show you how to leverage technology when conducting offensive security engagements.
By Jacob G. Oakley
-
Book
Protective Security: Creating Military-Grade Defenses for Your Digital BusinessShowing you how military counter-intelligence principles and objectives are applied, this book provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization.
By Jim Seaman
-
Book
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and MetasploitFocusing on the three most powerful pentesting tools, this book will get you started with NMAP, OpenVAS, and Metasploit and will help you understand how they can be integrated with each other for greater flexibility and efficiency.
By Sagar Rahalkar
-
Book
Ransomware Protection PlaybookYou'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.
By Roger A. Grimes
-
Book
Ransomware Revealed: A Beginner's Guide to Protecting and Recovering from Ransomware AttacksFeaturing techniques and advice applicable to any operating system/device type, this book teaches you how to mitigate and respond to ransomware infection with easy-to-follow technical tips and countermeasures.
By Nihad A. Hassan
-
Book
Rational Cybersecurity for Business: The Security Leaders' Guide to Business AlignmentProviding valuable lessons learned from interviews with over 70 security and business leaders, this comprehensive field guide presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program.
By Dan Blum
-
Book
Real-World Bug Hunting: A Field Guide to Web HackingWhether you're a cyber-security beginner who wants to make the internet safer or a seasoned developer who wants to write secure code, this soup-to-nuts guide will show you how it's done.
By Peter Yawarski
-
Book
Real-World CryptographyThis book teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There's no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases.
By David Wong
-
Book
Research Methods for Cyber SecurityPresenting research methods from a cyber security science perspective, this book catalyzes the rigorous research necessary to propel the cyber security field forward, and provides a guided method selection for the type of research being conducted.
By David O. Manz, Thomas W. Edgar
-
Book
Resilient Thinking: Protecting Organisations in the 21st Century, Second EditionSince the release of the first edition in 2012, a lot has changed in the world of risk and organisational resilience. Global conflict, political realignments, environmental disruptions, pandemics and disease outbreaks and cyber attacks are a plethora of threats that have and will continue to endanger the stability of the world.
By Phillip Wood
-
Book
RIoT Control: Understanding and Managing Risks and the Internet of ThingsExplaining the sources of risk across IoT architectures and performance metrics at the enterprise level, this resource offers insight from industry insiders about emerging tools and techniques for real-world IoT systems.
By Tyson Macaulay
-
Book
Risk Centric Threat Modeling: Process for Attack Simulation and Threat AnalysisDescribing how to apply application threat modeling as an advanced preventive form of security, this book provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.
By Marco M. Morana, Tony UcedaVélez
-
Book
Risk Management and ISO 31000: A Pocket GuideThis pocket guide introduces the premise of RBT (risk-based thinking), exploring the principles outlined in the risk management standard, ISO 31000
By Alan Field
-
Book
Risk Management for IT Projects: How to Deal with Over 150 Issues and RisksShowing you how to identify and track the recurring issues leading to failure in IT projects, this book offers recommendations readers can follow to significantly reduce the risk of IT failures and increase the rate of success.
By Bennet P. Lientz, Lee Larssen
-
Book
Risk Management Framework: A Lab-Based Approach to Securing Information SystemsIncluding hands-on exercises to reinforce topics, this complete resource provides examples that follow a fictitious organization through the risk management framework (RMF), allowing the reader to follow the development of proper compliance measures.
By James Broad
-
Book
Risk Management in Software Development ProjectsVery few software projects are completed on time, on budget, and to their original specification. This practical book will help practicing IT Project Managers and IT Managers learn about risk in the pursuit of delivering software projects.
By John McManus
-
Book
Role Mining in Business: Taming Role-Based Access Control AdministrationBesides a comprehensive survey of role mining techniques deeply rooted in academic research, this practical book also provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.
By Alberto Ocello, Alessandro Colantonio, Roberto Di Pietro
-
Book
Role-Based Access Control, Second EditionProviding coverage of the RBAC standard proposed by the National Institute of Standards and Technology, this book offers an in-depth understanding of role hierarchies and role engineering that are crucial to ensuring total access control with RBAC.
By D. Richard Kuhn, David F. Ferraiolo, Ramaswamy Chandramouli
-
Book
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ThreatsThis book will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware.
By Alex Matrosov, Eugene Rodionov, Sergey Bratus
-
Book
Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information AssetsProviding a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications, this book shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organization's reputation and leading to costly investigations.
By Robert F. Smallwood
-
Book
Schneier on SecurityPresenting invaluable advice from a computer security expert, this book features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay when security fails.
By Bruce Schneier
-
Book
Secrets and Lies: Digital Security in a Networked World, 15th Anniversary EditionCelebrating a decade and a half of smart, straight-forward advice on achieving security throughout computer networks from the leading authority on security, this 15th Anniversary volume exposes the digital world and the realities of our networked society, as well as security technologies and product capabilities, and their limitations.
By Bruce Schneier
-
Book
Secure Software Systems: Design and DevelopmentSecure Software Systems presents an approach to secure software systems design and development that tightly integrates security and systems design and development (or software engineering) together. It addresses the software development process from the perspective of a security practitioner.
By Erik Fretheim, Marie Deschene
-
Book
Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MrtgExplaining security principles and demonstrating how to achieve them using only freely available software, this book clearly explains how to get big dollar network security--without paying for it.
By Eric Seagren
-
Book
Securing an IT Organization through Governance, Risk Management, and AuditIntroducing COBIT 5 methods from a cybersecurity perspective, this authoritative book provides details of the cybersecurity framework (CSF) with emphasis on the processes directly related to governance, risk management, and audit.
By James L. Rainey, Ken Sigler
-
Book
Securing Cyber-Physical SystemsBringing together engineering and IT experts who have been dealing separately with these issues, this book explores the cybersecurity needed for cyber-physical systems (CPS), with a focus on results of research and real-world deployment experiences.
By Al-Sakib Khan Pathan (ed)
-
Book
Securing Intellectual Property: Protecting Trade Secrets and Other Information AssetsHelping security managers to understand and address the dangers that face them, this book outlines threats to trade secrets that are commonly overlooked, and shows specific, concrete steps to minimize these threats.
By Information Security
-
Book
Securing Mobile DevicesExplaining that applying COBIT 5 to mobile device security establishes a uniform management framework, this book offers guidance on planning, implementing and maintaining comprehensive security for mobile devices in the context of enterprises.
By ISACA
-
Book
Securing SCADA SystemsExamining SCADA system threats and vulnerabilities, this book discusses the emergence of protocol standards, and how security controls can be applied to ensure the safety and security of our national infrastructure assets.
By Ronald L. Krutz
-
Book
Securing Social Identity in Mobile Platforms: Technologies for Security, Privacy and Identity ManagementThe book presents novel research in the areas of social identity and security when using mobile platforms.
By Panagiotis Karampelas, Thirimachos Bourlai, Vishal M. Patel
-
Book
Securing Systems: Applied Security Architecture and Threat ModelsDescribing the process and the practice of assessing a computer system's existing information security posture, this book details the time-tested practices of experienced security architects, and explains how to deliver the right security at the right time in the implementation lifecycle.
By Brook S.E. Schoenfield
-
Book
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source SoftwarePresenting technical information in an easy-to-understand manner, this book shows you how to leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term.
By Maciej Machulak, Michael Schwartz
-
Book
Securing VoIP: Keeping Your VoIP Network SafeDrawing upon years of practical experience and using numerous examples and case studies, this essential guide discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks.
By Regis J. (Bud) Bates
-
Book
Security 2020: Reduce Security Risks This DecadeOffering real-world experience that provides a perspective on security past, present, and future, this book provides a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade.
By Doug Howard, Kevin Prince
-
Book
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, Third EditionA step-by-step guide to the tasks involved in security administration, as well as the many roadblocks you can expect, this comprehensive book offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience.
By David R. Miller, Michael Gregg
-
Book
Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD DevicesAn essential resource for IT and Audit professionals on how to manage, secure and audit smart devices, this book provides an understanding of the technologies related to smart devices and presents a number of different methods available to address the security of them.
By Philip Chukwuma, Richard Cozart, Sajay Rai
-
Book
Security and Loss Prevention: An Introduction, 5th EditionEncompassing the breadth and depth of considerations involved in implementing loss prevention concepts and security programs within an organization, this book can help prevent and reduce loss due to legal issues, theft and other crimes, fire, accidental or intentional harm from employees, and more.
By Philip P. Purpura
-
Book
Security and Privacy for Next-Generation WirelessThis timely book provides broad coverage of security and privacy issues in the macro and micro perspective.
By Zhong
-
Book
Security Architect: Careers in IT Service ManagementProviding practical, effective guidance for anyone looking to become a security architect or wanting to know more about what the role entails, this book covers areas such as required skills, responsibilities, dependencies and career progression as well as relevant tools, standards and frameworks.
By Jon Collins
-
Book
Security Controls Evaluation, Testing, and Assessment HandbookShowing you what your security controls are doing and how they are standing up to various inside and outside threats, this detailed, hands-on guide provides guidance and techniques for evaluating and testing various computer security controls in IT systems.
By Leighton Johnson
-
Book
Security for Business Professionals: How to Plan, Implement, and Manage Your Company's Security ProgramWith case studies and real-world examples from a wide variety of industries, this accessible guide offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff.
By Bradley A. Wayland
-
Book
Security for Microsoft Windows System Administrators: Introduction to Key Information Security ConceptsWhether you are new to this profession or have been in the field a while, this book covers the basics of securing your system environment as well as security concepts and how these concepts can be implemented practically using common tools and applications.
By Derrick Rountree
-
Book
Security for Wireless Implantable Medical DevicesHelping readers learn more about the security and safety issues in the area of implantable medical devices (IMDs), this book provides an overview of new security attacks, challenges, defense strategies, design issues, modeling, and performance evaluation in wireless IMDs.
By Xiali Hei, Xiaojiang Du
-
Book
Security FundamentalsAn approachable discussion of core security concepts and topics, this book is your guide to developing a strong foundational understanding of Windows security, so you can take your IT career to the next level and feel confident going into the certification exam.
By Crystal Panek
-
Book
Security in the Digital World: For the Home User, Parent, Consumer and Home OfficeFrom the top ten tips and the breakdown of consumer risks, to social networking and parental security, this book is an essential guide for anyone and everyone trying to stay safe and secure in the evolving digital world.
By Graham Day
-
Book
Security Information and Event Management (SIEM) ImplementationShowing you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts, this authoritative guide will help you manage the security information and events produced by your network.
By Allen A. Harper, Chris Blask, David R. Miller, Shon Harris, Stephen Vandyke
-
Book
Security Issues and Privacy Concerns in Industry 4.0 ApplicationsThis book is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in the Industry 4.0 applications for research development.
By M. Niranjanamurthy, R. S. Anand, Shibin David
-
Book
Security Log Management: Identifying Patterns in the ChaosThis unique book shows system administrators and security professionals how to use open source software such as Tcpdstats and Snort perfmonitor to create reports that give you the big picture of your network's health and well being.
By Jacob Babbin, et al.
-
Book
Security of Mobile CommunicationsProviding technicians and designers with a critical, comprehensive resource, this guide goes beyond analysis, standards, and guidelines to define the roles and responsibilities that network operators, service providers, and even customers need to fulfill to assure our mobile communications are secure.
By Noureddine Boudriga
-
Book
Security Operations in PracticeThis book walks you through how to establish and grow a strong security operations team, including hiring the right people, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.
By Mike Sheward
-
Book
Security Patch Management, Second EditionHelping you establish a patch management process that protects your organization against zero-day attacks, this detailed, easy-to-understand guide helps you become more proactive when it comes to this critical facet of information security.
By Felicia M. Nicastro
-
Book
Security Policies and Implementation Issues, Third EditionSecurity Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation.
By Chuck Easttom, Robert Johnson
-
Book
Security Risk Assessment: Managing Physical and Operational SecurityOffering step-by-step guidance for conducting a complete risk assessment, this accessible guide provides a template to draw from, giving security professionals the tools needed to conduct an assessment using the most current approaches, theories, and best practices.
By John M. White
-
Book
Security Risk Management Body of KnowledgeIntegrating knowledge, competencies, methodologies, and applications, this comprehensive guide details the security risk management process in a format that can easily be applied by executive managers and security risk management practitioners.
By Julian Talbot, Miles Jakeman
-
Book
Security Risk Management: Building an Information Security Risk Management Program from the Ground upPresenting a roadmap for designing and implementing a security risk management program, this comprehensive guide includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment.
By Evan Wheeler
-
Book
Security Strategy: From Requirements to RealityFocusing on security strategy planning and execution, this book seeks to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes.
By Bill Stackpole, Eric Oksendahl
-
Book
Security without Obscurity: A Guide to Confidentiality, Authentication, and IntegritySharing the author's knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards, this book provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication.
By J. J. Stapleton
-
Book
Security without Obscurity: A Guide to PKI OperationsProviding a no-nonsense approach and realistic guide to operating a PKI system, this book discusses PKI best practices, as well as bad practices, and includes anonymous case studies scattered throughout that identify each.
By J. J. Stapleton, W. Clay Epstein
-
Book
Security, Privacy, and Digital Forensics in the CloudWritten by some of the top experts in the field, this unique book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services.
By Hassan Takabi, Lei Chen, Nhien-An Le-Khac (eds)
-
Book
Self-Powered Cyber Physical SystemsThis book is an attempt to aim at a very futuristic vision of achieving self-powered cyber-physical systems by applying a multitude of current technologies such as ULP electronics, thin film electronics, ULP transducers, autonomous wireless sensor networks using energy harvesters at the component level and energy efficient clean energy for powering data centers and machines at the system level.
By Chandra Singh, Felcy Jyothi Serrao, Rajeev Agrawal, Rathishchandra R. Gatti
-
Book
Semantic Web For DummiesWhether you're a consumer doing research online, a business owner who wants to offer your customers the most useful Web site, or an IT manager eager to understand Semantic Web solutions, this book will help you define, develop, implement, and use Web 3.0.
By Jeffrey T. Pollock
-
Book
Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL, Second EditionFocused on developing useful and reusable models, this book is an essential, comprehensive resource on semantic modeling for practitioners in health care, artificial intelligence, finance, engineering, military intelligence, enterprise architecture, and more.
By Dean Allemang, Jim Hendler
-
Book
Serious Cryptography: A Practical Introduction to Modern EncryptionProviding a complete survey of modern encryption and its applications, this practical guide breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work.
By Jean-Philippe Aumasson
-
Book
Simple Steps to Data Encryption: A Practical Guide to Secure ComputingIncluding simple descriptions of actual threat scenarios, step-by-step instructions for securing data, and easy-to-follow tips for safer computing, this concise guide aims to present just enough for an average reader to begin protecting his or her data immediately.
By Peter Loshin
-
Book
Smart Grid Security: Innovative Solutions for a Modernized GridProviding the first truly holistic view of leading edge Smart Grid security research, this book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.
By Florian Skopik, Paul Smith
-
Book
Smartcuts: How Hackers, Innovators, and Icons Accelerate SuccessDelving into the reasons why some people and some organizations are able to achieve incredible things in implausibly short time frames, this thoughtful book shows how each of us can use "smartcuts" to rethink convention and accelerate success.
By Shane Snow
-
Book
Snort For DummiesWhether you're watching for attacks on a home network, a small company network, or an enterprise network, this reference guide covers everything you need for installing, configuring, deploying and managing Snort IDS sensors on your network.
By Bert Hayes, Charlie Scott, Paul Wolfe
-
Book
Social Engineering in IT Security: Tools, Tactics, and TechniquesWritten by a global expert on the topic, this book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results.
By Sharon Conheady
-
Book
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and DefenseProviding easy-to-understand models and examples, this hands-on resource gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment.
By Andrew Mason, Gavin Watson, Richard Ackroyd
-
Book
Social Engineering: The Science of Human Hacking, Second EditionFeaturing how-to guidance, stories, examples, and case studies ripped from the headlines, this book details the human hacker's skill set and gives you the inside information you need to mount an unshakeable defense.
By Christopher Hadnagy
-
Book
Software Transparency: Supply Chain Security in an Era of a Software-Driven SocietyIn Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you'll explore real-world examples and guidance on how to defend your own organization against internal and external attacks.
By Chris Hughes, Tony Turner
-
Book
Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0Providing an introduction to identity management, this practical book gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence.
By Abhishek Hingnikar, Yvonne Wilson
-
Book
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second EditionIncluding Exam Tips that highlight key exam information, chapter summaries that reinforce salient points, and end-of-chapter questions that are an accurate reflection of the content and question format of the real exam, this authoritative guide enables you to take the exam with complete confidence or use the book as an ideal on-the-job reference.
By Darril Gibson
-
Book
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third EditionIncluding exam tips, practice exam questions, and in-depth explanations. this authoritative guide enables you to take the exam with complete confidence or use the book as an ideal on-the-job reference.
By Darril Gibson
-
Book
SSCP Systems Security Certified Practitioner Practice ExamsDesigned to help you pass the test with ease, this highly effective self-study guide provides hundreds of accurate practice questions and in-depth answer explanations to use in preparation for the SSCP exam.
By Nick Mitropoulos
-
Book
SSCP Systems Security Certified Practitioner: Study GuideCovering 100% of all objectives, this guide prepares you for the SSCP, Systems Security Certified Practitioner certification examination by focusing on the Common Body of Knowledge (CBK) as determined by ISC2 in seven high level topics.
By George B. Murphy
-
Book
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System-Study GuideFeaturing clear and concise information regarding crucial next-generation network security topics, this comprehensive guide includes practical examples and insights drawn from real-world experience, exam highlights, and end of chapter reviews.
By Alex Tatistcheff, John Gay, Todd Lammle
-
Book
SSL and TLS Essentials: Securing the WebThis book is a great resource for administrators who need to learn more about how their systems operate behind the scenes and what utilities are available to make it run better.
By Stephen Thomas
-
Book
SSL and TLS: Theory and PracticeFeaturing discussions on the advantages and disadvantages of using SSL/TLS protocols compared to other Internet security protocols, this authoritative resource shows how to properly employ SSL and TLS and configure security solutions that are based on the use of the SSL/TLS protocols.
By Rolf Oppliger
-
Book
SSL VPN : Understanding, Evaluating, and Planning Secure, Web-Based Remote AccessProviding a detailed technical and business introduction to SSL VPN, this guide explains how SSL VPN devices work along with their benefits and pitfalls, as well as how to authenticate and educate users.
By Joseph Steinberg, Timothy Speed
-
Book
SSL/TLS Security and TroubleshootingAuthored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article presents a birds-eye view of the intricacies involved in SSL/TLS (Secure Socket Layer/Transport Layer Security) and important points from a practical IT perspective.
By Aditya Lad, Prasoon Dwivedi
-
Book
Strategic Intelligence Management: National Security Imperatives and Information and Communications TechnologiesProviding background, analysis, and insight on specific topics and case studies, this volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe to explore technological and social aspects of managing information for national security imperatives.
By Babak Akhgar, Simeon Yates (eds)
-
Book
Swanson on Internal Auditing: Raising the BarA wealth of knowledge on internal auditing all in one place, this book provides concise commentary on strategic issues regarding the way internal audit is established, planned and performed.
By Dan Swanson
-
Book
System Administration Ethics: Ten Commandments for Security and Compliance in a Modern Cyber WorldUsing the appropriate rules of engagement, best policies and practices, and proactive "building/strengthening" behaviors, this book provides the necessary tools to securely run an ethically correct environment.
By Igor Ljubuncic, Tom Litterer
-
Book
Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and MalwareWritten by cyber-security researchers and experts, this well-structured book examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
By Aditya K. Sood, Richard Enbody
-
Book
The Android Malware Handbook: Detection and Analysis by Human and Machine NEW!Explore the history of Android malware in the wild since the operating system first launched and then practice static and dynamic approaches to analyzing real malware specimens. Next, examine machine learning techniques that can be used to detect malicious apps, the types of classification models that defenders can implement to achieve these detections, and the various malware features that can be used as input to these models
By Qian Han, Sai Deep Tetali, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Yanhai Xiong
-
Book
The Art of Attack: Attacker Mindset for Security ProfessionalsThe book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking.
By Maxie Reynolds
-
Book
The Art of Cyber Security: A Practical Guide To Winning The War On Cyber CrimeThis book is about cyber security, but it's also about so much more; it's about giving you the skills to think creatively about your role in the cyber security industry.
By Gary Hibberd
-
Book
The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized CybercrimeThis book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks.
By Jon DiMaggio
-
Book
The Art of Deception: Controlling the Human Element of SecurityThis guide presents the world's most famous hacker-guru's advice for developing protocols, training programs, and manuals to protect companies from security vulnerability.
By Kevin D. Mitnick, William L. Simon
-
Book
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & DeceiversOffering hair-raising stories of real-life computer break-ins, celebrated hacker-gone-straight Kevin Mitnick uncovers stories from the hacker community, and shows how the victims could have prevented them.
By Kevin D. Mitnick, William L. Simon
-
Book
The Art of Mac Malware: The Guide to Analyzing Malicious SoftwareThe Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what's inside.
By Patrick Wardle
-
Book
The Art of Network Penetration Testing: How to Take Over Any Company in the WorldTeaching you how to take over an enterprise network from the inside, this book lays out every stage of an internal security assessment step-by-step, showing you how to identify weaknesses before a malicious invader can do real damage.
By Royce Davis
-
Book
The Art of War for Computer SecurityIn this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
By Tom Madsen
-
Book
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and PracticeProviding a sound understanding of the tools and tactics used in cyber warfare, this book describes both offensive and defensive tactics from an insider's point of view and presents the hands-on techniques you need to understand as cyber warfare evolves with technology.
By Jason Andress, Steve Winterfeld
-
Book
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics, Second EditionProviding readers with completely up-to-date real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery, this book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations.
By John Sammons
-
Book
The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity OnlineWith real-world examples showing you how cyber criminals commit crimes, this book gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy.
By Denny Cherry
-
Book
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Second EditionIntroducing a four-step methodology for conducting a penetration test or hack, this guide walks through each of the steps and tools in a structured, orderly manner, allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test.
By Patrick Engebretson
-
Book
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and PracticeCovering the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, this guide dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
By Jason Andress
-
Book
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, Second EditionGiving you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, this clear, non-technical book dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
By Jason Andress
-
Book
The Basics of IT Audit: Purposes, Processes, and Practical InformationIT auditing occurs in some form in virtually every organization, private or public, large or small. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.
By Stephen D. Gantz
-
Book
The Basics of Web Hacking: Tools and Techniques to Attack the WebAuthored by an industry expert who is a penetration tester and Web Security professor at Dakota State University, this book introduces readers to a tool-driven process to identify the most widespread vulnerabilities in Web applications.
By Josh Pauli
-
Book
The Best Damn IT Security Management Book PeriodProviding specific guidelines and checklists, this guide has comprehensive coverage of all major IT and security management issues and is an indispensable addition to the serious security professional's toolkit.
By Susan Snedaker, et al.
-
Book
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall, 3rd EditionAn essential guide to building a secure network with PF, this book covers the latest developments in PF, including new content on IPv6, dual stack configurations, the "queues and priorities" traffic-shaping system, NAT and redirection, wireless networking, spam fighting, and more.
By Peter N.M. Hansteen
-
Book
The Browser Hacker's HandbookWritten by a team of highly experienced computer security experts, this thorough guide gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
By Christian Frichot, Michele Orrù, Wade Alcorn
-
Book
The Business-Minded CISCO: Run Your Security Program Efficiently NEW!This book describes the thought process and specific activities a leader should consider as they interview for the IT risk/information security leader role, what they should do within their first 90 days, and how to organize, evangelize, and operate the program once they are into the job. It provides practical, tested strategies for designing your program and guidance to help you be successful long term.
By Bryan C. Kissinger
-
Book
The Car Hacker's Handbook: A Guide for the Penetration TesterIf you're curious about automotive security and have the urge to hack a two-ton computer, this detailed resource will give you a deeper understanding of the computer systems and embedded software in modern vehicles.
By Craig Smith
-
Book
The Case for ISO27001Introducing the ISO27001, this book will help your organization build a reliable and effective framework for deploying an information security management system that will preserve its assets, protect its directors and improve its competitiveness.
By Alan Calder
-
Book
The Case for ISO27001-2013, Second EditionPresenting the compelling business case for implementing ISO27001 in order to protect your information assets, this friendly guide is essential reading for anyone unfamiliar with the many benefits of the standard, and as a supporting document for an ISO27001 project proposal.
By Alan Calder
-
Book
The Chief Information Security Officer: Insights, Tools, and Survival SkillsDescribing both the hard and soft skills that a successful Chief Information Security Officer (CISO) requires, this guide explains how to design and implement an Information Security Management System (ISMS) that is appropriate for your organization.
By Barry L. Kouns, Jake Kouns
-
Book
The CISO Perspective: Understand The Importance of The CISO in The Cyber Threat LandscapeThe CISO (chief information security officer) has overall responsibility for corporate security strategy, but today's CISO also needs to be in the business of managing information, not just securing it.
By Barry Kouns, Jake Kouns
-
Book
The Code of Honor: Embracing Ethics in CybersecurityA comprehensive and practical framework for ethical practices in contemporary cybersecurity
By Ed Skoudis, Paul J. Maurer
-
Book
The Complete Cisco VPN Configuration GuideWith copious configuration examples and troubleshooting scenarios, this book contains detailed explanations of all Cisco VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device.
By Richard Deal
-
Book
The Complete Guide to Cybersecurity Risks and ControlsPresenting the fundamental concepts of information and communication technology (ICT) governance and control, this book, shows you how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data.
By Anne Kohnke, Dan Shoemaker, Ken Sigler
-
Book
The Complete Reference: Information Security, Second EditionExplaining how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs, this comprehensive book offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape.
By Mark Rhodes-Ousley
-
Book
The Comprehensive Guide to Cybersecurity Careers: A Professional's Roadmap for the Digital Security AgeThe Comprehensive Guide to Cybersecurity Careers is the definitive resource for aspiring and established cybersecurity professionals.
By Dr. Jason Edwards
-
Book
The Comprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best PracticesThis comprehensive guide provides professionals, hiring managers, and business leaders with essential strategies and insights to navigate the complex cybersecurity talent landscape.
By Dr. Jason Edwards
-
Book
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity CapabilitiesOffering step-by-step instruction for building, measuring, and optimizing cybersecurity capabilities, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement.
By Domenic Antonucci
-
Book
The Cyber Security Handbook: Prepare for, Respond to and Recover from Cyber Attacks with the IT Governance Cyber Resilience Framework (CRF)A comprehensive cyber security implementation manual, this book gives practical guidance on the individual activities identified in the IT Governance CRF that can help organizations become cyber resilient and combat cyber threats.
By Alan Calder
-
Book
The Cybersecurity Maturity Model Certification (CMMC): A Pocket GuideA clear, concise primer on the Cybersecurity Maturity Model Certification (CMMC), this guide summarizes the CMMC and proposes useful tips for implementation, covers who it applies to, and highlights the requirements for achieving and maintaining compliance.
By William Gamble
-
Book
The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of SecurityThe real-world guide to defeating hackers and keeping your business secure, this invaluable book is your step-by-step resource to protecting your organization from unknown threats and integrating good security habits into everyday business situations.
By Allison Cerra
-
Book
The Data Governance Imperative: A Business Strategy for Corporate DataProviding a business person's view of data governance, this practical book covers both strategies and tactics around managing a data governance initiative.
By Steve Sarsfield
-
Book
The Data Protection Officer: Profession, Rules, and RoleExplaining what the General Data Protection Regulation is, this book defines the roles and responsibilities of the Data Protection Officer (DPO) position and highlights the potential cost of getting data protection wrong.
By Paul Lambert
-
Book
The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security RulesProviding sample documents and directions on using the policies and procedures to establish proof of compliance, this guide is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA.
By John J. Trinckes, Jr.
-
Book
The Definitive Guide to Samba 3If you're familiar with Unix administration, TCP/IP networking, and other common Unix servers, and want to learn how to deploy Samba, this book is ideal for you. With this guide, you can quickly configure a basic Samba server, and more.
By Roderick W. Smith
-
Book
The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of CybersecurityCybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges in this innovative text.
By Phil Quade
-
Book
The Effective CIO: How to Achieve Outstanding Success through Strategic Alignment, Financial Management, and IT GovernanceProviding a survey of existing strategies and detailed problem-solving ideas, this book offers the perspective of a CIO who must cope with the day-to-day pressure for results, and an IT audit consultant with a focus on governance and internal control.
By Eric J. Brown, William A. Yarberry, Jr.
-
BOOK SUMMARY
The Executive MBA in Information SecurityThe Executive MBA in Information Security is a foundational manual to help business executives develop an effective management program for information security. In this Summary, we discuss the salient points of the book based on our interpretation of its contents.
By John J. Trinckes, Jr.
-
Book
The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security PostureIllustrating real-world perspectives that reflect the day-to-day issues that you face in running an enterprise's security operations, this book outlines a strategy for managing the information security function in a manner that optimizes cost efficiency and results.
By Kerry Ann Anderson
-
Book
The GSEC Prep Guide: Mastering SANS GIAC Security EssentialsAs your in-depth study guide for the SANS GIAC Security Essentials exam, this self-paced, practical text provides you with a thorough understanding of security concepts and policies, ways to assess and manage risk, appropriate incident response, and more.
By Mike Chapple
-
Book
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware AttacksThe Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.
By Colin O'Flynn, Jasper van Woudenberg
-
Book
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third EditionProviding users with information on how to combat the ever-changing myriad of threats security professionals face, this accessible guide presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency.
By Gerald L. Kovacich
-
Book
The InfoSec Handbook: An Introduction to Information SecurityAllowing beginners to enter the field and understand the key concepts and ideas of Information Security, this guide offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security.
By Umesh Hodeghatta Rao, Umesha Nayak
-
Book
The Insider Threat: Assessment and Mitigation of RisksUsing a pragmatic and readable approach for the corporate environment, this book presents and discusses workable applications of risk management techniques along with useable practical policy change options.
By Eleanor E. Thompson
-
Book
The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and AssessmentsProviding detailed information on testing all your IT security, policy and governance requirements, this roadmap guide presents a way of interpreting complex, confusing compliance requirements within the larger scope of an organization's overall needs.
By Craig S. Wright
-
Book
The Language of Deception: Weaponizing Next Generation AIA penetrating look at the dark side of emerging AI technologies
By Justin Hutchens
-
Book
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital EncryptionWith a plethora of historical anecdotes and real-world examples, this book takes readers on a fascinating tour of the mathematics behind cryptography?the science of sending secret messages.
By Joshua Holden
-
Book
The Network Security Test Lab: A Step-by-Step GuideSetting you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies, this convenient resource will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats - and trains you on the software used by top experts in the field.
By Michael Gregg
-
Book
The Official (ISC)2 CISSP CBK Reference, Sixth EditionThoroughly updated for 2021 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks.
By Aaron Kraus, Arthur J. Deane
-
Book
The Official (ISC)2 Guide to the CISSP CBK Reference, 5th EditionWhether you've earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.
By John Warsinske, et al.
-
Book
The Official (ISC)2 Guide to the SSCP CBK, Fourth EditionOffering step-by-step guidance through each of SSCP's domains, including best practices and techniques, this book brings together a global, thorough perspective to not only prepare for the SSCP exam, but it also provides a reference that will serve you well into your career.
By Adam Gordon, Steven Hernandez
-
Book
The Official (ISC)2 Guide to the SSCP CBK, Third EditionProviding an in-depth look at the seven domains of the SSCP Common Body of Knowledge (CBK), this comprehensive resource includes numerous illustrated examples and tables to demonstrate concepts, frameworks, and real-life scenarios, and offers step-by-step guidance through each of the SSCP domains.
By Adam Gordon, Steven Hernandez (eds)
-
Book
The Official (ISC)2 SSCP CBK Reference, Fifth EditionContaining the essential knowledge practitioners require on a regular basis, this authoritative volume is an essential resource for SSCP-level professionals, SSCP candidates and other practitioners involved in cybersecurity.
By Mike Wills
-
Book
The Penetration Tester's Guide to Web ApplicationsFocusing on offensive security and how to attack web applications, this innovative new resource provides both professionals and aspiring professionals with clear guidance on how to identify and exploit common web application vulnerabilities.
By Serge Borso
-
Book
The Pentester BluePrint: Starting a Career as an Ethical HackerThis book guides you through the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester.
By Kim Crawley, Phillip L. Wylie
-
Book
The Practice of Network Security Monitoring: Understanding Incident Detection and ResponseTo help you avoid costly and inflexible solutions, this book teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. Attacks are inevitable, but losing sensitive data shouldn't be.
By Richard Bejtlich
-
Book
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to ValueIn addition to providing practical methods to applying privacy engineering methodologies, this book details how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information.
By Jonathan Fox, Michelle Finneran Dennedy, Thomas R. Finneran
-
Book
The Psychology of Information Security: Resolving Conflicts Between Security Compliance and Human BehaviourProviding methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives.
By Leron Zinatullin
-
Book
The Ransomware Threat Landscape: Prepare for, Recognise and Survive Ransomware attacksPrepare for, recognize and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, helping business leaders better understand the strategic risks, and explore measures that can be put in place to protect the organization.
By Alan Calder
-
Book
The Risk IT FrameworkOffering a comprehensive process model for governing and managing IT risk, this manual provides a set of guiding principles and supporting practices for enterprise management.
By ISACA
-
Book
The Risk IT Practitioner GuideServing as a support document for the Risk IT framework, this publication provides examples of possible techniques to address IT-related risk issues, and more detailed guidance on how to approach the concepts covered in the process model.
By ISACA
-
Book
The Security Consultant's HandbookDesigned to be a practical and enabling guide for security officers and contractors, this book aims to plug information gaps or provoke new ideas, and provide a real-world support tool for those who want to offer their clients safe, proportionate, and value-driven security services.
By Richard Bingley
-
Book
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second EditionWalking you through the process of conducting an effective security assessment, this authoritative guide provides the tools and up-to-date understanding you need to select the security measures best suited to your organization.
By Douglas J. Landoll
-
Book
The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe OnlineHelping you cut through the confusion and start protecting your online life, this book offers practical, user-friendly advice and shows you how women are targeted online and how to keep yourself safe.
By Violet Blue
-
Book
The State of the Art in Intrusion Prevention and DetectionPresenting cutting-edge research, this book analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks.
By Al-Sakib Khan Pathan (ed)
-
Book
The Tao of Open Source IntelligenceExplaining how to scrutinise criminal activity without compromising your anonymity - and your investigation, this book offers comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use and functionality, giving tips on counterintelligence, safe practices and debunking myths about online privacy.
By Stewart K. Bertram
-
Book
The Today and Future of WSN, AI and IOT: A Compass and Torchbearer for the TechnocratsIncluding review questions and cases for research, this book is an easy-to-understand guide that will help you get familiar with the upcoming developments in WSN, AI, and IoT.
By Chandrakant Naikodi, Suresh L
-
Book
The True Cost of Information Security Breaches and Cyber CrimeUsing case studies to illustrate the possible breach scenarios that an organisation can face, this book sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
By John Walker, Michael Krausz
-
Book
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Second EditionContaining the most current attack techniques and countermeasures, this practical book discusses the latest step-by-step methods for attacking and defending the range of ever-evolving web applications.
By Dafydd Stuttard, Marcus Pinto
-
Book
Theoretical and Experimental Methods for Defending Against DDoS AttacksFeaturing a comprehensive study on the basics of network security, this book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts.
By Iraj Sadegh Amiri, Mohammad Reza Khalifeh Soltanian
-
Book
Theoretical Cybersecurity: Principles and Advanced ConceptsThis book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science.
By J. Louis Sewell, Jacob G. Oakley, Matthew Puckett, Michael Butler Murray, Wayne York
-
Book
Threat Modeling: Designing for SecurityWith pages of specific actionable advice, this unique book details how to build better security into the design of systems, software, or services from the outset.
By Adam Shostack
-
Book
Touchless Fingerprint BiometricsGiving an overview of the state of the art touchless fingerprint-recognition technologies, this book describes relevant industrial applications, and also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.
By Fabio Scotti, Ruggero Donida Labati, Vincenzo Piuri
-
Book
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure BehaviorsTransformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change.
By Perry Carpenter
-
Book
Transforming CybersecurityProviding practical guidance on transforming cybersecurity in a systemic way, this publication shows the rise in cost and frequency of security incidents and addresses security governance, security management and security assurance.
By ISACA
-
Book
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive CybersecurityWhether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, this unique book has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.
By Jennifer Jin, Marcus J. Carey
-
Book
Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity LeadershipA collection of invaluable real-world insights from cybersecurity experts, this must-read book offers the advice and practical guidance you need to advance your cybersecurity leadership career.
By Jennifer Jin, Marcus J. Carey
-
Book
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the WorldWhether you're just joining the industry, climbing the corporate ladder, or considering consulting, this unique book offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market.
By Jennifer Jin, Marcus J. Carey
-
Book
Two-Factor AuthenticationAn introduction to the topic of two-factor authentication, this book provides a comprehensive evaluation of popular secondary authentication methods, and presents international examples of standards and regulations that make two-factor authentication a component of security guidance.
By Mark Stanislav
-
Book
Under Control: Governance Across the EnterpriseSetting out to explain the essential challenges of effective business governance, this book helps you build solutions for your organization based on lessons learned at CA from its customers and in its own corporate structure.
By Jacob Lamm, et al.
-
Book
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program, 1st EditionThe book provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and helps practitioners pull cyber from a "technical" problem to a "business risk management" problem, equipping you with a simple approach to understand, manage, and measure cyber risk for your enterprise.
By Ryan Leirvik
-
Book
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program, 2nd EditionWhen it comes to managing cybersecurity in an organization, most tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid.
By Ryan Leirvik
-
Book
Understanding and Conducting Information Systems AuditingFeaturing examples that are globally applicable, this accessible, non-technical guide covers all major standards and presents information systems as a management tool with practical applications.
By Arif Ahmed, Veena Hingarh
-
Book
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and TrendsThis book discusses understand cybersecurity management in decentralized finance (DeFi).
By Arash Habibi Lashkari, Gurdip Kaur, Iman Sharafaldin, Ziba Habibi Lashkari
-
Book
Understanding Cybersecurity on Smartphones: Challenges, Strategies, and TrendsThis book offers a comprehensive overview of smartphone security, focusing on various operating systems and their associated challenges.
By Andi Fitriah Abdul Kadir, Arash Habibi Lashkari, Mahdi Daghmehchi Firoozjaei
-
Book
UTM Security with Fortinet: Mastering FortiOSExplaining the advantages of using Unified Threat Management (UTM) and how it works, this thorough resource presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
By Kenneth Tam, et al.
-
Book
Validating Your Business Continuity Plan: Ensuring Your BCP Really WorksExamining the three essential components of validating a business continuity plan, this book outlines a controlled and systematic approach to BCP validation while considering each component, covering methods and techniques such as table-top reviews, workshops and live rehearsals.
By Robert A. Clark
-
Book
Virtualization Security: Protecting Virtualized EnvironmentsOffering effective practices for securing virtual machines, this must-read resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.
By Dave Shackleford
-
Book
Vulnerability ManagementProviding a fundamental understanding of technology risks from an interloper's perspective, this book provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those in a larger organization.
By Park Foreman
-
Book
Waging Cyber War: Technical Challenges and Operational ConstraintsDescribing the hands-on technical challenges to those conducting cyber warfare, this book provides a unique analogy to drive home how cyber warfare should be understood and why it is a challenge to leverage in a war-fighting domain.
By Jacob G. Oakley
-
Book
Web Application Defender's Cookbook: Battling Hackers and Protecting UsersAuthored by a highly credentialed defensive security expert, this book provides practical tactics, tools, and techniques for detecting web attacks and malicious behavior, and defending against them. Topics include identifying vulnerabilities, setting hacker traps, enforcing application flows, and more.
By Ryan Barnett
-
Book
Web Application Security: A Beginner's GuideIncluding templates, checklists, and examples--as well as true stories from industry, this introductory guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks.
By Bryan Sullivan, Vincent Liu
-
Book
Web Security: A WhiteHat PerspectiveWith in-depth analysis of the reasons behind the choices companies make to require different security methodologies, this practical book presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system.
By Hanqing Wu, Liz Zhao
-
Book
Windows 2012 Server Network Security: Securing Your Windows Network Systems and InfrastructureProviding the most in-depth guide to deploying and maintaining a secure Windows network, this book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks.
By Derrick Rountree
-
Book
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows RegistryPacked with real-world examples using freely available open source tools, this book provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files.
By Harlan Carvey
-
Book
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second EditionPacked with real-world examples using freely available open source tools, this one-of-a-kind resource features updated, current tools and techniques and provides the most in-depth guide to forensic investigations involving Windows Registry.
By Harlan Carvey
-
Book
Wireless and Mobile Device SecurityUsing case studies and real-world events, this straightforward book discusses risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches.
By Jim Doherty
-
Book
Wireless Communication in Cyber SecurityThe editorial and author team aims to address all possible solutions to the various problems faced in the newer techniques of wireless communications, improving the accuracies and reliability over the possible vulnerabilities and security threats to wireless communications. It is a must have for any engineer, scientist, or other industry professional working in this area.
By Geetanjali Rathee, M. Akila, R. Maheswar, S. Sountharrajan
-
Book
Wireless Communication SecurityPresenting the concepts and advances of wireless communication security, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals.
By M. Niranjanamurthy, Manisha Bharti, Manju Khari
-
Book
Wireless Mobile Internet Security, Second EditionPresenting readers with an intimate sense of how mobile internet systems operate and how to address complex security issues, this book covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems.
By Man Young Rhee
-
Book
Wireless Network Security: A Beginner's GuideRevealing how intruders exploit vulnerabilities and gain access to wireless networks, this hands-on book presents templates, checklists and examples to help you learn how hackers operate so you can protect your wireless networks against all real-world hacks.
By Tyler Wrightson
-
Book
Wireless Reconnaissance in Penetration TestingAn ideal resource for penetration testing and radio profiling, this book describes what equipment to use and how to find frequency information, offers tips for reducing radio information leakage, and presents case studies describing how this information can be used to attack computer systems.
By Alex Hamerstone, Chris Sanyk, Matthew Neely
-
Book
Wireless Security Architecture: Designing and Maintaining Secure Wireless for EnterpriseThis book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.
By Jennifer Minella
-
Book
Wireshark & Ethereal Network Protocol Analyzer Toolkit, Jay Beale's Open Source Security SeriesHelping you to unleash the powers of Wireshark, this comprehensive guide provides complete information and step-by-step instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks.
By Angela Orebaugh
-
Book
You: For Sale: Protecting Your Personal Data and Privacy OnlineFor anyone who is concerned about what corporate and government invasion of privacy means now and down the road, this book sets the scene by spelling out exactly what most users of the Internet and smart phones are exposing themselves to via commonly used sites and apps such as Facebook and Google, and then tells you what you can do to protect yourself.
By Stuart Sumner
-
Book
Zero Trust and Third-Party Risk: Reduce the Blast RadiusIn Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk.
By Gregory C. Rasner
-
Book
Zero Trust Security: A Complete GuideThis book helps the readers to earn about IPS, IDS, and IDPS, along with their varieties and comparing them.
By Nike Andravous