-
Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), 3rd Edition
An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike Meyers Take the latest version of the CompTIA Security+ exam (exam SY0-601) with confidence using the comprehensive information contained in this highly effective self-study resource. Like the test, the guide go.... -
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey FeaturesConvert the theory of your security certifications into actionable changes to secure your organizationDiscover how to structure policies and procedures in order .... -
CTS-I Certified Technology Specialist-Installation Exam Guide, Second Edition, 2nd Edition
The Most Complete, Up-to-Date CTS-I Exam Study System Published with AVIXA™, CTS®-I Certified Technology Specialist-Installation Exam Guide, Second Edition provides comprehensive coverage of all exam objectives on the leading internationally recognized certification for audiovisual installation pr.... -
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)), 6th Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This fully updated study guide covers every topic on the current version of the CompTIA Security+ examTake the .... -
Microsoft 365 Compliance : A Practical Guide to Managing Risk
Use the information presented in this book to implement an end-to-end compliance program in your organization using Microsoft 365 tools. You will learn about the solutions available in the Microsoft 365 Compliance Center, including best practices and common pitfalls. IT professionals will benefit fr.... -
Protective Security: Creating Military-Grade Defenses for Your Digital Business
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-crit.... -
The Cybersecurity Manager's Guide
Author Todd Barnum
If you're a leader in Cybersecurity, then you know it often seems like no one cares about--or understands--information security. Infosec professionals struggle to integrate security into their companies. Most are under resourced. Most are at odds with their organization....
Release Date 2021/04 -
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start .... -
Agile Model-Based Systems Engineering Cookbook
Discover recipes for addressing the growing complexity of modern systems by applying agile methodologies and techniques in model-based systems engineering (MBSE)Key FeaturesLearn how Agile and MBSE can work iteratively and collaborate to overcome system complexityDevelop essential systems engineerin.... -
Author Jessica Barker , Adrian Davis , Bruce Hallas , Ciarán Mc Mahon
Cybersecurity problems don’t always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness, behaviour and culture change (ABCs). This book guides organisations looking to create an enhanced security culture through improved understanding and practic....
Release Date 2021/02 -
The Ransomware Threat Landscape
Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in p.... -
Practical Threat Intelligence and Data-Driven Threat Hunting
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat h.... -
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
Focused coverage of every topic on the current version of the CompTIA CySA+ examGet on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersecurity professional Bobby Rogers guides you on your career path, providing expert tips and sound advice .... -
Mike Meyers CompTIA Security+ Certification Passport (Exam SY0-601), 6th Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This quick review, cram-style study guide offers 100% coverage of every topic on the latest version of the Comp.... -
CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition
This up-to-date study aid contains hundreds of accurate practice questions and detailed answer explanationsCompTIA Security+™ Certification Practice Exams, Fourth Edition (Exam SY0-601) is filled with more than 1000 realistic practice questions—including new performance-based questions—to prepare yo.... -
Systems Engineering Demystified
Get to grips with systems engineering life cycles, processes, and best practices and discover techniques to successfully develop complex systemsKey FeaturesDiscover how to manage increased complexity and understand systems better via effective communicationAdopt a proven model-based approach for sys.... -
Mastering Python for Networking and Security - Second Edition
Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapyKey FeaturesEnhance your Python programming skills in securing systems and executing networking tasksExplore Python scripts to debug and secure complex networksLearn to avoid common cyber events wi.... -
Consumer Protection in E-Retailing in ASEAN
This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef.... -
Legal and Privacy Issues in Information Security, 3rd Edition
Author Joanna Lyn Grama
Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information security. Information systems securi....
Release Date 2020/12 -
Authentication and Access Control: Practical Cryptography Methods and Tools
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked.This book begins with the theoretical background of cryptography and the foundations of authentica.... -
The Art of Network Penetration Testing
The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. As you brute force passwords,....