-
Author Perry Carpenter , Kai Roer
Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture.The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Play....
Release Date 2022/04 -
The Official (ISC)2 SSCP CBK Reference, 6th Edition
Author Mike Wills
The only official body of knowledge for SSCP—(ISC)2’s popular credential for hands-on security professionals—fully revised and updated 2021 SSCP Exam Outline.Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implem....
Release Date 2022/04 -
Cybersecurity For Dummies, 2nd Edition
Author Joseph Steinberg
Explore the latest developments in cybersecurity with this essential guideEvery day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure—and it doesn’t take a degree....
Release Date 2022/04 -
Cyber Security and Network Security
Author Sabyasachi Pramanik , Debabrata Samanta , M. Vinay , Abhijit Guha
CYBER SECUTIRY AND NETWORK SECURITYWritten and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly....
Release Date 2022/04 -
Cybersecurity and Local Government
Author Donald F. Norris , Laura K. Mateczun , Richard F. Forno
CYBERSECURITY AND LOCAL GOVERNMENTLearn to secure your local government’s networks with this one-of-a-kind resourceIn Cybersecurity and Local Government, a distinguished team of researchers delivers an insightful exploration of cybersecurity at the level of local government. The book makes a compell....
Release Date 2022/04 -
Digital Forensics and Internet of Things
Author Anita Gehlot , Rajesh Singh , Jaskaran Singh , Neeta Raj Sharma
DIGITAL FORENSICS AND INTERNET OF THINGSIt pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal.The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to a....
Release Date 2022/04 -
The Cybersecurity Playbook for Modern Enterprises
Author Jeremy Wittkop
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniquesKey FeaturesUnderstand what happens in an attack and build the proper defenses to secure your organizationDefend against hacking techniques such as social engineering, phishi....
Release Date 2022/03 -
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Author Trevor Stuart , Joe Anich
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 DefenderKey FeaturesDetect, protect, investigate, and remediate threats using Microsoft Defender for endpointExpl....
Release Date 2022/03 -
Author Svetlana Ostrovskaya , Oleg Skulkin
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey FeaturesExplore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware detection using volatile memoryGet acquainted wi....
Release Date 2022/03 -
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
IT Security Controls: A Guide to Corporate Standards and Frameworks
Author Virgilio Viegas , Oben Kuyucu
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure.....
Release Date 2022/03 -
Author Lawrence E. Hughes
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required backgrou....
Release Date 2022/03 -
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition
Author Allen Harper , Ryan Linn , Stephen Sims , Michael Baucom , Huascar Tejeda , Daniel Fe
Up-to-date strategies for thwarting the latest, most insidious network attacksThis fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at ma....
Release Date 2022/03 -
Author Amy Sample Ward , Afua Bruce
Changing the way we use, develop, and fund technology for social change is possible, and it starts with you. The Tech That Comes Next: How Changemakers, Philanthropists, and Technologists Can Build an Equitable World outlines a vision of a more equitable and just world along with practical steps to ....
Release Date 2022/03 -
Cyber Security and Digital Forensics
Author Mangesh M. Ghonge , Sabyasachi Pramanik , Ramchandra Mangrulkar , Dac-Nhuong Le
CYBER SECURITY AND DIGITAL FORENSICSCyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.Cur....
Release Date 2022/03 -
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Author Vijay Kumar Velu
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hacking techniquesKey FeaturesExplore red teaming and play the hackers game to proactively defend your inf....
Release Date 2022/02 -
The Ultimate Kali Linux Book - Second Edition
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchPurchase of the print or Kindle book includes a free eBook in the PDF formatKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using a....
Release Date 2022/02 -
CSSLP SECURE SOFTWARE LIFECYCLE PROFESSIONAL ALL-IN-ONE EXAM GUIDE, Third Edition, 3rd Edition
Author Wm. Arthur Conklin , Daniel Paul Shoemaker
Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the examCSSLP Certification All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certific....
Release Date 2022/02 -
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Edition
Author Mike Wills
The only SSCP study guide officially approved by (ISC)2The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT....
Release Date 2022/02 -
Cybersecurity Leadership Demystified
Author Dr. Erdal Ozkaya , Melih Abdulhayoglu
Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use casesKey FeaturesDiscover tips and expert advice from the leading CISO and author of many cybersecurity booksBecome well-versed with a CISO's day-to-day responsibilities and learn how to perform the....
Release Date 2022/01 -
Author Cesar Bravo , Darren Kitchen
An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, and systems required to master the art of cybersecurityKey FeaturesGet hold of the best defensive security strategies and toolsDevelop a defensive security strategy at an en....
Release Date 2022/01 -
Author Leeza Garber , Scott Olson
Building a successful cybersecurity team is no longer optional.Cyberthreats evolve at a staggering pace, and effective cybersecurity operations depend on successful teams. Unfortunately, statistics continue to illustrate that employers are not finding the people they need.The Can. Trust. Will. syste....
Release Date 2022/01 -
Author Ryan Leirvik
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are availabl....
Release Date 2022/01 -
Computers For Seniors For Dummies, 6th Edition
Author Faithe Wempen
A simple guide to computers that'll show you what all the fuss is aboutMost people new to computers find them a little intimidating at first. But with the right guidance, even a total novice can be sending email and banking online in no time at all. Computers For Seniors For Dummies is your must-ha....
Release Date 2021/12 -
Joint Ventures Involving Tax-Exempt Organizations, 4th Edition
Author Michael I. Sanders
Stay up to date on all relevant regulatory and legislative changes, as well as leading case law, in a complicated area of law In the 2021 Cumulative Supplement to the 4th edition of Joint Ventures Involving Tax-Exempt Organizations, a renowned team of authors delivers the latest updates and developm....
Release Date 2021/12 -
Author Cynthia Brumfield , Brian Haugli
Cybersecurity Risk ManagementIn Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fund....
Release Date 2021/12 -
Getting Started with z/OS Data Set Encryption
Author Bill White , Cecilia Carranza Lewis , Eysha Shirrine Powers , David Rossi , Eric Ros
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.....
Release Date 2021/12 -
Certified Information Security Manager Exam Prep Guide
Author Hemang Doshi
Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information s....
Release Date 2021/11 -
Data Protection and Compliance, 2nd Edition
Author Stewart Room , Michelle Maher , Niall O'Brien , Adam Panagiotopoulos , Shervin Nahid
This comprehensive guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to operationalise a truly risk-based approach to data protection and compliance, beyond just emphasis on regulatory frameworks and legalistic complia....
Release Date 2021/11 -
CISSP All-in-One Exam Guide, Ninth Edition, 9th Edition
Author Fernando Maymi , Shon Harris
A new edition of Shon Harris’ bestselling exam prep guide―fully updated for the 2021 version of the CISSP examThoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed ....
Release Date 2021/11