-
CompTIA Security+ Practice Tests SY0-501
Author Ian Neil
Learn from Ian Neil, one of the world's top CompTIA Security+ trainers in the world, and enhance your analytical skills to pass the CompTIA Security+ SY0-501 examKey FeaturesBecome a pro at answering questions from all six of the domains of the SY0-501 exam Learn ....
Release Date 2020/01 -
Information Governance, 2nd Edition
Author Robert F. Smallwood
The essential guide to effective IG strategy and practiceInformation Governance is a highly practical and deeply informative handbook for the implementation of effective Information Governance (IG) procedures and strategies. A critical facet of any mid- to large-si....
Release Date 2019/12 -
The Official (ISC)2 SSCP CBK Reference, 5th Edition
Author Mike Wills
The only official body of knowledge for SSCP—(ISC)2’s popular credential for hands-on security professionals—fully revised and updated.Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to i....
Release Date 2019/12 -
Joint Ventures Involving Tax-Exempt Organizations, 4th Edition
Author Michael I. Sanders
Effective strategies for non-profit entities in a profit-based worldJoint Ventures Involving Tax-Exempt Organizations examines the procedures, rules, and regulations surrounding joint ventures and partnerships, emphasizing tax-exempt status preservation. Revised and ....
Release Date 2019/12 -
CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition, 2nd Edition
Author Daniel Carter
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Comprehensive coverage of every domain on the CCSP exam This highly effect....
Release Date 2019/12 -
Advanced API Security: OAuth 2.0 and Beyond
Author Prabath Siriwardena
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is conv....
Release Date 2019/12 -
Author Abhishek Hingnikar , Yvonne Wilson
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and t....
Release Date 2019/12 -
Author Mukund Chaudhary , Abhishek Chopra
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the tim....
Release Date 2019/12 -
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Author David Both
Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.This book....
Release Date 2019/12 -
Author Ric Messier
With nation-states, organized crime groups, and other attackers scouring systems to steal funds, information, or intellectual property, incident response has become one of today’s most important technology sectors. If you’re not familiar with incident response, thi....
Release Date 2019/12 -
CompTIA Linux+ XK0-004 Cert Guide
Author William J. Rothwell , Ross Brunson
Learn, prepare, and practice for CompTIA Linux+ (XK0-004) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.Master CompTIA Linux+ XK0-004 exam topicsAssess your knowledge with chapter-ending quizzesReview key con....
Release Date 2019/11 -
CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition, 4th Edition
Author Peter H. Gregory
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This up-to-date self-study system delivers complete coverage of every topic ....
Release Date 2019/11 -
Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
Author Nihad A. Hassan
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, re....
Release Date 2019/11 -
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
Author Sanjib Sinha
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your....
Release Date 2019/11 -
How Cyber Security Can Protect Your Business - A guide for all stakeholders
Author Christopher Wright
How Cyber Security Can Protect your Business – A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their pe....
Release Date 2019/11 -
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless netwo....
Release Date 2019/11 -
Data Breaches: Crisis and Opportunity
Author Sherri Davidoff
Protect Your Organization Against Massive Data Breaches and Their ConsequencesData breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines ....
Release Date 2019/10 -
Author Matthew Berninger , Ric Messier
There’s a powerful new tool in the fight against malware. The US National Security Agency (NSA) recently released its reverse engineering framework, Ghidra, as free and open source software. This practical report explains how engineers can use Ghidra to analyze mal....
Release Date 2019/10 -
Foundations of Information Security
Author Jason Andress
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.Using real-world se....
Release Date 2019/10 -
Author Mike Chapple
Ace the CompTIA Security+ exam with over 700 practice exam questions written using the style and format of the Security+ examKey FeaturesGet a detailed breakdown of the type of questions and the exam environmentDiscover a step-by-step process that guides you throug....
Release Date 2019/10 -
Author Allison Cerra
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can tak....
Release Date 2019/09 -
The Customer Revolution in Healthcare: Delivering Kinder, Smarter, Affordable Care for All
Author David W Johnson
Customer-centric, market-driven solutions for fixing America’s broken healthcare system—from one of the industry’s most innovative thought leaders. Healthcare accounts for nearly a fifth of the U.S. economy. Everyone agrees that the current system is broken and in ....
Release Date 2019/09 -
Elementary Information Security, 3rd Edition
Author Richard E. Smith
An ideal text for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cyber security and technology. Thoroughly updated with an increase....
Release Date 2019/09 -
Author Daniel Sawano , Dan Bergh Johnsson , Daniel Deogun
Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you’ll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You’ll also master security-centric t....
Release Date 2019/09 -
Establishing an occupational health & safety management system based on ISO 45001
Author Naeem Sadiq
This book provides a comprehensive explanation of the detailed requirements of ISO 45001. The author draws out key parts of the Standard, which can often be confusing for non-experts or newcomers to ISO standards, and explains what they mean and how to comply. ....
Release Date 2019/09 -
ISO 27001 controls – A guide to implementing and auditing
Author Bridget Kenyon
Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001. Show and h....
Release Date 2019/09 -
ISO/IEC 38500: A pocket guide, second edition
Author Alan Calder
This useful pocket guide is an ideal introduction for those wanting to understand more about ISO 38500. It describes the scope, application and objectives of the Standard and outlines its six core principles. Show and hide more
Release Date 2019/09 -
Author Jennifer Jin , Marcus J. Carey
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published asTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introd....
Release Date 2019/08 -
GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Ric Messier
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Fully updated coverage of every topic on the current version of the GSEC exa....
Release Date 2019/08 -
Waging Cyber War: Technical Challenges and Operational Constraints
Author Jacob G. Oakley
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....
Release Date 2019/08