-
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. -
Multi-Cloud Architecture and Governance
A comprehensive guide to architecting, managing, implementing, and controlling multi-cloud environmentsKey FeaturesDeliver robust multi-cloud environments and improve your business productivityStay in control of the cost, governance, development, security, and continuous improvement of your multi-cl.... -
CompTIA Security+: SY0-601 Certification Guide - Second Edition
Become well-versed with IT security essentials and exam objectives for CompTIA Security+ SY0-601 certificationKey FeaturesWritten by Ian Neil, one of the world's top CompTIA Security+ trainersTest your knowledge of security jargon and acronyms with self-assessment and realistic exam questionsLearn .... -
Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
Author Omar Santos
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed, SOCs desperately need more qualified cybersecurity professionals. Cisco’s new Cisco Certifie....
Release Date 2020/11 -
CompTIA PenTest+ Certification For Dummies
Prepare for the CompTIA PenTest+ certification CompTIA's PenTest+ Certification is an essential certification to building a successful penetration testing career. Test takers must pass an 85-question exam to be certified, and this book—plus the online test bank—will help you reach your certifi.... -
Alice and Bob Learn Application Security
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development.... -
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
Author Raymond Nutting , Mirza Ahmed , William MacCormack
This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam This effective self-study guide fully prepares you for the Global Information Assurance Certification’s challenging Penetration Tester exam, which validates advanced....
Release Date 2020/11 -
Author Brent Chapman , Fernando Maymi
Prepare for the CompTIA CySA+ certification exam with this fully updated self-study resource This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CySA+ Cybersecurity Analyst exam. You’ll find learning objective....
Release Date 2020/11 -
70 Tips and Tricks for Mastering the CISSP Exam
Author R. Sarma Danturthi
Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick t....
Release Date 2020/11 -
A Complete Guide to Burp Suite : Learn to Detect Application Vulnerabilities
Author Sagar Rahalkar
Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps.Burp Suite is a simple, yet powerful, tool used for a....
Release Date 2020/11 -
The Enterprise Path to Service Mesh Architectures, 2nd Edition
Author Lee Calcote
Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This....
Release Date 2020/11 -
Cybersecurity in Humanities and Social Sciences
The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international rel.... -
Author Aditya Mukherjee
Build a resilient network and prevent advanced cyber attacks and breachesKey FeaturesExplore modern cybersecurity techniques to protect your networks from ever-evolving cyber threatsPrevent cyber attacks by using robust cybersecurity strategiesUnlock the secrets of networ....
Release Date 2020/11 -
Author Russell von Frank
Trust, it binds us together in our deepest most fulfilling relationships, attracts and retains the best employees, and turns clients into raving fans. Let me show you how to heal old wounds, become a sought out business leader to work for, and create a loyal following of ....
Release Date 2020/11 -
A Practical Guide to Digital Forensics Investigations, 2nd Edition
Author Darren R. Hayes
THE DEFINITIVE GUIDE TO DIGITAL FORENSICSNOW THOROUGHLY UPDATED WITH NEW TECHNIQUES, TOOLS, AND SOLUTIONSComplete, practical coverage of both technical and investigative skillsThoroughly covers modern devices, networks, and the InternetAddresses online and lab investigati....
Release Date 2020/10 -
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2nd Edition
Author Troy McMillan
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide is a best-of-breed exam study guide. Expert technology instructor and certification author Troy McMillan shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your co....
Release Date 2020/10 -
Process Systems Engineering for Biofuels Development
A comprehensive overview of current developments and applications in biofuels production Process Systems Engineering for Biofuels Development brings together the latest and most cutting-edge research on the production of biofuels. As the first book specifically devoted to process syst.... -
Network Security, Firewalls, and VPNs, 3rd Edition
Author J. Michael Stewart , Denise Kinsey
Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet.
Release Date 2020/10 -
Access Control and Identity Management, 3rd Edition
Author Mike Chapple
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact acc....
Release Date 2020/10 -
Security Policies and Implementation Issues, 3rd Edition
Author Robert Johnson , Chuck Easttom
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIESSecurity Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational ....
Release Date 2020/10 -
Computers and Information Processing for Business
Author Sergio S. Ribeiro
This book is an introduction to computers covering relevant topics that include: computers and society, the Internet, social media, Microsoft Office 2019, and high-level programming.The main goals are to help students to define computers and information processing and des....
Release Date 2020/10 -
Exam Ref MS-500 Microsoft 365 Security Administration
Author Ed Fisher , Nate Chamberlain
Prepare for Microsoft Exam MS-500: Demonstrate your real-world knowledge of Microsoft 365 security implementation and administration, including identity, access, threat and information protection, governance, and compliance. Designed for professionals with Microsoft secur....
Release Date 2020/09 -
Author Matthew Hickey , Jennifer Arcuri
A fast, hands-on introduction to offensive hacking techniquesHands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author....
Release Date 2020/09 -
CCSP For Dummies with Online Practice
Secure your CSSP certificationCCSP is the world’s leading Cloud Security certification. It covers the advanced technical skills and knowledge to design, manage, and secure data, applications, and infrastructure in the cloud using best practices, policies, and procedures. If you’re a cloud secur.... -
CompTIA CySA+ Practice Tests, 2nd Edition
Author Mike Chapple , David Seidl
Efficiently prepare yourself for the demanding CompTIA CySA+ examCompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition offers readers the fastest and best way to prepare for the CompTIA Cybersecurity Analyst exam. With five unique chapter tests and two additional practi....
Release Date 2020/09 -
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
Author Sean P. Murphy
HCISPP® HealthCare Information Security and Privacy Practitioner All-in-One Exam GuidePrepare for the current release of the HealthCare Information Security and Privacy Practitioner (HCISPP) exam using the detailed information contained in this effective self-study resour....
Release Date 2020/09 -
Author Abhijit Mohanta , Anoop Saldanha
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engi....
Release Date 2020/09