-
Cybersecurity Threats, Malware Trends, and Strategies
Author Tim Rains
After scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor provides unique insights on the evolution of the threat landscape and how enterprises can address modern cybersecurity challenges.Key FeaturesProtect your organization ....
Release Date 2020/05 -
31 Days Before your CCNA Exam: A Day-By-Day Review Guide for the CCNA 200-301 Certification Exam
Author Allan Johnson
31 Days Before Your CCNA Exam: A Day-By-Day Review Guide for the CCNA 200-301 Certification Exam is the friendliest, most practical way to understand the CCNA Routing & Switching certification process, commit to taking your CCNA 200-301 exam, and finish your pr....
Release Date 2020/04 -
Author Heather E. McGowan , Chris Shipley , Thomas L. Friedma
A guide for individuals and organizations navigating the complex and ambiguous Future of WorkForeword by New York Times columnist and best-selling author Thomas L. FriedmanTechnology is changing work as we know it. Cultural norms are undergoing tectonic shifts. A global p....
Release Date 2020/04 -
Securing Cloud Services - A pragmatic approach, second edition
Author Lee Newcombe
Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated wi....
Release Date 2020/04 -
Digital Forensics with Kali Linux - Second Edition
Author Shiva V. N. Parasram
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety o....
Release Date 2020/04 -
Practical Mobile Forensics - Fourth Edition
Author Rohit Tamma , Oleg Skulkin , Heather Mahalik
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenariosKey FeaturesApply advanced forensic techniques to recover deleted data from mobile devices Retrieve and analyze data ....
Release Date 2020/04 -
Author William Oettinger
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensics to acquire and secure digital evidence skillfully Conduct a digital fo....
Release Date 2020/04 -
Metasploit 5.0 for Beginners - Second Edition
Author Sagar Rahalkar
A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilitiesKey FeaturesPerform pentesting in highly secured environments with Metasploit 5.0 Become well-versed with th....
Release Date 2020/04 -
Tribe of Hackers Security Leaders
Author Marcus J. Carey , Jennifer Jin
Tribal Knowledge from the Best in Cybersecurity LeadershipThe Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential securit....
Release Date 2020/03 -
CISA Certified Information Systems Auditor Practice Exams
Author Peter H. Gregory
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Hundreds of accurate practice questions that cover every topic on the latest versio....
Release Date 2020/03 -
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
Author Graham Thompson
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This effective study guide provides 100% coverage of every topic on the challenging....
Release Date 2020/03 -
Cybersecurity for Space: Protecting the Final Frontier
Author Jacob G. Oakley
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must ....
Release Date 2020/03 -
Author Stephen Bussey
Give users the real-time experience they expect, by using Elixir and Phoenix Channels to build applications that instantly react to changes and reflect the application's true state. Learn how Elixir and Phoenix make it easy and enjoyable to create real-time applications ....
Release Date 2020/03 -
Cyber Security: Essential principles to secure your organisation
Author Alan Calder
Cyber Security – Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks.
Release Date 2020/03 -
Cybersecurity Attacks – Red Team Strategies
Author Johann Rehberger
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team program Leve....
Release Date 2020/03 -
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, 2nd Edition
Author Ben Malisow
The only official CCSP practice test product endorsed by (ISC)²With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the bi....
Release Date 2020/02 -
Author Michael G. Rogers
Create loyal, engaged and results focused teams and organizations using a practical five-part servant leadership formula.Think of a world where people go to work completely engaged, are inspired to do more than they ever thought possible, remain 100% loyal to the teams an....
Release Date 2020/02 -
Author Ric Messier
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Manage your own robust, inexpensive cybersecurity testing environment Thi....
Release Date 2020/02 -
CompTIA PenTest+ Certification Passport (Exam PT0-001)
Author Heather Linn
This effective self-study guide serves as an accelerated review of all exam objectives for the CompTIA PenTest+ certification examThis concise, quick-review test preparation guide offers 100% coverage of all exam objectives for the new CompTIA PenTest+ exam. Design....
Release Date 2020/02 -
CompTIA Cloud Essentials+ Certification Study Guide, Second Edition (Exam CLO-002), 2nd Edition
Author Daniel Lachance
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The best IT certification exam study system availableFilled with hands-on ex....
Release Date 2020/02 -
Author Eric C. Thompson
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecu....
Release Date 2020/02 -
Security Operations in Practice
Author Mike Sheward
This book walks you through how to establish and grow a strong security operations team, including hiring the right people, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a ....
Release Date 2020/02 -
Mastering Linux Security and Hardening - Second Edition
Author Donald A. Tevault
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a L....
Release Date 2020/02 -
Cyber Warfare - Truth, Tactics, and Strategies
Author Dr. Chase Cunningham , Gregory J. Touhill
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy based on current and past ....
Release Date 2020/02 -
Author Steve Anson
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced atta....
Release Date 2020/01 -
Author Laura B. Madsen
Data governance is broken. It's time we fix it. Why is data governance so ineffective? The truth is data governance programs aren't designed for the way we run our data teams, they aren't even designed for a modern organization at all. They were designed ....
Release Date 2020/01 -
Data Diplomacy: Keeping Peace and Avoiding Data Governance Bureaucracy
Author Håkan Edvinsson
Successful data governance requires replacing governance with diplomacy. This book is your guide to applying a lean and friendly yet proven approach to data governance and data design by leveraging your existing workforce, and allowing these data workers to create ....
Release Date 2020/01 -
Information Security Management Principles, 3rd Edition
Author Andy Taylor , David Alexander , Amanda Finch , David Sutton
This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book support....
Release Date 2020/01 -
ISO/IEC 27701:2019: An introduction to privacy information management
Author Alan Shipman , Steve Watkins
ISO/IEC 27701:2019: An introduction to privacy information management offers a concise introduction to the Standard, aiding those organisations looking to improve their privacy information management regime, particularly where ISO/IEC 27701:2019 is involved. ....
Release Date 2020/01 -
Digital Forensics and Incident Response - Second Edition
Author Gerard Johansen
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident r....
Release Date 2020/01