-
CompTIA Security+ Certification Study Guide: Network Security Essentials
Author Ahmed F. Sheikh
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and yo....
Release Date 2020/09 -
Author Matthew J. Coles , Izar Tarandach
Threat modeling is one of the most essential—and most misunderstood—parts of the development lifecycle. Whether you’re a security practitioner or application developer, this book will help you gain a better understanding of core concepts and how to apply them to yo....
Release Date 2020/09 -
Author Tom Piens
Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platformKey FeaturesUnderstand how to optimally use PAN-OS featuresBuild firewall solutions to safeguard local, cloud, and mobile networksProtec....
Release Date 2020/09 -
Successful Cybersecurity Professionals
Author Dr. Steven Brown
This book provides a unique perspective into the mindset of psychology and cybersecurity.It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals’ behavior, but our b....
Release Date 2020/09 -
Author Chris Eagle , Kara Nance
The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency’s most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the wo....
Release Date 2020/08 -
Implementing Cryptography Using Python
Author Shannon W. Bray
Learn to deploy proven cryptographic tools in your applications and servicesCryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cr....
Release Date 2020/08 -
Author Charles Read
The Payroll Book is the only book that demystifies payroll with clear, concise, and real-world examples on how to tackle the process."The Payroll Book will be a valuable resource for the small business owner as well as for the entrepreneur planning a new venture. Thorough....
Release Date 2020/08 -
Author Tara Powers
Create a space for a healthy work–life balanceStay connected with Slack, Zoom, and Microsoft TeamsMaintain productivity and stay healthy and saneWorking from home is the new normalWorking from home was already on the rise, but when COVID-19 hijacked our reality, it became....
Release Date 2020/08 -
GCIH GIAC Certified Incident Handler All-in-One Exam Guide
Author Nick Mitropoulos
This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler examPrepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide. Written by a reco....
Release Date 2020/08 -
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will.... -
Author Jennifer C. Wolfe
No boardroom in any industry is safe from new market threats in this time of rapid technological growth. We’ve all heard the stories of corruption by CEOs at WeWork and Theranos and witnessed whistleblowers revealing crises at Wells Fargo and Uber. The board’s responsibil....
Release Date 2020/08 -
Microservices Security in Action
Author Wajjakkara Kankanamge Anthony Nuwan Dias , Prabath Siriwardena
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you’ve learned i....
Release Date 2020/08 -
CISA - Certified Information Systems Auditor Study Guide
Author Hemang Doshi
This CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA's latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questionsKey FeaturesGain tactical skills in auditing, con....
Release Date 2020/08 -
The Complete Coding Interview Guide in Java
Author Anghel Leonard
Explore a wide variety of popular interview questions and learn various techniques for breaking down tricky bits of code and algorithms into manageable chunksKey FeaturesDiscover over 200 coding interview problems and their solutions to help you secure a job as a Java dev....
Release Date 2020/08 -
Author Chris Brogan , Julien Smith
The 10th Anniversary Edition of Trust Agents helps companies get back on track in their efforts to build reputation, attention, and trust In the years since authors Chris Brogan and Julien Smith first released their groundbreaking book Trust Agents, social media....
Release Date 2020/07 -
Cyber Breach Response That Actually Works
Author Andrew Gorecki
You will be breached—the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But....
Release Date 2020/07 -
CompTIA CySA+ Study Guide Exam CS0-002, 2nd Edition
Author Mike Chapple , David Seidl
This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics!Where can you find 100% coverage of the revised CompTIA Cybersecurity Analyst+ (CySA+) e....
Release Date 2020/07 -
Author Theodore J. Sarenski
The long-term future of the American Social Security system which provides retirement, disability, and survivor benefits to millions, is uncertain. This is triggering big concerns for many workers who are paying into the system and need to make decisions about their retir....
Release Date 2020/07 -
Author Scott Davis , Carter Copeland , Rob Wertheimer
Three top Wall Street analysts reveal enduring lessons in sustainable success from the great industrial titans—the high-tech companies of their day—to the disruptors that now dominate the economy.Before Silicon Valley disrupted the world with new technologies and business....
Release Date 2020/07 -
Mastering Windows Security and Hardening
Author Mark Dunkerley , Matt Tumbarello
Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and A....
Release Date 2020/07 -
Author Malcolm McDonald
The world has changed. Today, every time you make a site live, you’re opening it up to attack.A first-time developer can easily be discouraged by the difficulties involved with properly securing a website. But have hope: an army of security researchers is out there discov....
Release Date 2020/06 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Morey J. Haber
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization wi....
Release Date 2020/06 -
Author Andrew Hoffman
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both defensive and offensive security concepts that software engineers can easily ....
Release Date 2020/06 -
ISO22301: 2019 - An introduction to a business continuity management system (BCMS)
Author Alan Calder
Understand the basics of business continuity and ISO 22301:2019 with this concise pocket guide, which will help you ensure your organisation can continue to operate in the event of a disruption.
Release Date 2020/06 -
Mastering Metasploit - Fourth Edition
Author Nipun Jaswal
Discover the next level of network defense and penetration testing with the Metasploit 5.0 frameworkKey FeaturesMake your network robust and resilient with this updated edition covering the latest pentesting techniques Explore a variety of entry points to compromise a sy....
Release Date 2020/06 -
The Handbook of Board Governance, 2nd Edition
Author Richard Leblanc
The revised new edition of the must-read guide for executives—provides comprehensive coverage of topics in corporate governance by leading subject-matter expertsThe Handbook of Board Governance is the marketing-leading text on public, nonprofit, and private board governan....
Release Date 2020/05 -
Penetration Testing For Dummies
Author Robert Shimonski
Target, test, analyze, and report on security vulnerabilities with pen testingPen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It ....
Release Date 2020/05 -
Hands-On Web Penetration Testing with Metasploit
Author Harpreet Singh , Himanshu Sharma
Identify, exploit, and test web application security with easeKey FeaturesGet up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerab....
Release Date 2020/05