-
CEH v11 Certified Ethical Hacker Study Guide
As protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The.... -
Hacking: The Art of Exploitation, 2nd Edition
Author Jon Erickson
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to reall....
Release Date 2008/01 -
Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition
Author Omar Santos , Michael Gregg
In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 10 exam and advance your career in IT security. The authors' concise, focused appro....
Release Date 2019/07 -
The Basics of Hacking and Penetration Testing, 2nd Edition
Author Patrick Engebretson
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the result....
Release Date 2013/06 -
CompTIA® Security+ SY0-501 Cert Guide
Author David L. Prowse
This is the most comprehensive core study tool for CompTIA's latest Security+ exam. Perfect for every candidate preparing for this challenging exam, its comprehensive coverage offers all the information and insight readers need to succeed. From start to finish, th....
Release Date 2017/10 -
Author Matthew Hickey , Jennifer Arcuri
A fast, hands-on introduction to offensive hacking techniquesHands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author....
Release Date 2020/09 -
CompTIA® Security+ SY0-501 Cert Guide, Academic Edition, Second Edition
Author David L. Prowse
Learn, prepare, and practice for CompTIA Security+ SY0-501 exam success with this full-color CompTIA Authorized Cert Guide, Academic Edition from Pearson IT Certification, a leader in IT Certification learning. This book includes access to four complete practice te....
Release Date 2017/12 -
Eleventh Hour CISSP®, 3rd Edition
Author Joshua Feldman , Seth Misenar , Eric Conrad
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presente....
Release Date 2016/09 -
Zero Trust Networks, 2nd Edition
Author Razi Rais , Christina Morillo , Evan Gilman , Doug Barth
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method....
Release Date 2023/12 -
CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide, Second Edition
Author Robin Abernathy , Troy McMillan
Learn, prepare, and practice for CompTIA Advanced Security Practitioner (CASP) CAS-003 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner.Master CompTIA A....
Release Date 2018/05 -
Author Roger A. Grimes
Meet the world's top ethical hackers and explore the tools of the tradeHacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms ....
Release Date 2017/05 -
Applied Network Security Monitoring
Author Jason Smith , Chris Sanders
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring i....
Release Date 2013/11 -
CEH v10 Certified Ethical Hacker Study Guide
Author Ric Messier
As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10....
Release Date 2019/06 -
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition
Author Stephen Sims , Ryan Linn , Branko Spasojevic , Jonathan Ness , Chris Eagle , Allen Ha
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker’s....
Release Date 2018/04 -
The Definitive Guide to Plone, Second Edition
Author Andy McKay , Fabrizio Reale , Alice Narduzzo , Davide Moro , Maurizio Delmonte
The Definitive Guide to Plone, Second Edition has been completely updated to cover version 3 of Plone and its newest features. This book provides a complete and detailed overview of Plone. It is divided into three parts, which cover using, configuring, and developin....
Release Date 2009/04 -
Kali Linux Intrusion and Exploitation Cookbook
Author Ishan Girdhar , Dhruv Shah
Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsAbout This BookSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsImprove your testing efficien....
Release Date 2017/04 -
Wireless Network Security: A Beginner’s Guide
Author Tyler Wrightson
Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and....
Release Date 2012/04 -
SyncML®: Synchronizing and Managing Your Mobile Data
Author Phillipe Kahn , Peter Thompson , Apratim Purakayastha , Riku Mettälä , Uwe Hansmann
Discover SyncML, the new global standard for synchronizing virtually any mobile deviceCovers both the technical and business issuesCovers personal and enterprise applications, new mobile services, security, device management, and moreIncludes practical guidance for ....
Release Date 2002/09 -
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. Adopting an.... -
The Official (ISC)2 CCSP CBK Reference, 4th Edition
Author Aaron Kraus
The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the clo....
Release Date 2022/10 -
Author Stoyan Stefanov , Jeremy Rogers
Secure your Linux server and protect it from intruders, malware attacks, and other external threatsAbout This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as ....
Release Date 2006/02 -
Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Author Noel Rivera , Richard Bedwell , William Wilson , Chris Carthern
This book is a one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification preparation. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions fo....
Release Date 2015/12 -
Author Tony Crescenzi
During the Great Depression, legendary British economist Keynes advocated using government money to fill the economic void until consumer spending and business investment recovered. But what happens when governments can't do that anymore? You've arrived at "The Ke....
Release Date 2011/10 -
Official (ISC)2 Guide to the CAP CBK, 2nd Edition
Author Patrick D. Howard
Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization....
Release Date 2016/04 -
CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition, 4th Edition
Author Peter H. Gregory
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This up-to-date self-study system delivers complete coverage of every topic ....
Release Date 2019/11 -
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2
Author Yvonne Wilson , Abhishek Hingnikar
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building ....
Release Date 2022/11 -
Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners
Cybersecurity is a pressing issue across industries, as well as increasingly important in people’s personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and con.... -
Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)
Practice the Skills Essential for a Successful Career in Cybersecurity!This hands-on guide contains more than 90 labs that challenge you to solve real-world problems and help you to master key cybersecurity concepts. Clear, measurable lab results map to exam objectives, offering direct correlation t.... -
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
Author Graham Thompson
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This effective study guide provides 100% coverage of every topic on the challenging....
Release Date 2020/03