Catalog Search Results
Author
Language
English
Description
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and...
Author
Series
Language
English
Formats
Description
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness For Dummies...
Author
Language
Deutsch
Description
Penetrationstests mit Metasploit als effektiver Teil der IT-Sicherheitsstrategie Der komplette Workflow: Portscanning mit Nmap, Hacking mit Metasploit, Schwachstellen scannen mit Nessus Die Techniken der Angreifer verstehen und geeignete Gegenmaßnahmen ergreifen Metasploit ist ein mächtiges Werkzeug, mit dem auch unerfahrene Administratoren gängige Angriffsmethoden verstehen und nachstellen können. Der Autor erklärt das Framework dabei nicht...
Author
Language
English
Formats
Description
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission....
Author
Pub. Date
[2021]
Language
English
Description
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography and the foundations of authentication technologies and attack mechanisms. You will learn about the mechanisms that are available to protect computer networks, systems, applications, and...
Author
Pub. Date
2021
Language
English
Description
Cybersecurity is a pressing issue across industries, as well as increasingly important in people's personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner, Choose Your InfoSec Path is an informative, fun, interactive cybersecurity adventure that has been written specifically with...
Author
Series
Pub. Date
2010
Language
English
Description
In this day of frequent acquisitions and perpetual application integrations, systems are often an amalgamation of multiple programming languages and runtime platforms using new and legacy content. Systems of such mixed origins are increasingly vulnerable to defects and subversion. System Assurance: Beyond Detecting Vulnerabilities addresses these critical issues. As a practical resource for security analysts and engineers tasked with system assurance,...
Author
Pub. Date
2019
Language
English
Description
Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid....
Author
Pub. Date
2021
Language
English
Description
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organizations resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develop. Security controls and responses can then be applied...
Author
Pub. Date
[2021]
Language
English
Description
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised: cyberattack, data breach, system outage, pandemic, natural disaster, and many more. Rather than being compliance-concentric,...
Author
Pub. Date
2022.
Language
English
Description
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the...
Author
Pub. Date
2005.
Language
English
Description
An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux...
Author
Pub. Date
[2022]
Language
English
Description
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure. The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal...
Author
Pub. Date
2016.
Language
English
Description
"It's an unfortunate truism that many good developers are bad at software security. They cling to the belief that security is something you can just buy and bolt on, but that's not the case. It's not that developers want to be bad at security, they just don't know where to start and where they should go. This video offers a clear route. It begins with a high level overview of today's security threats and the organizational strategies used to counter...
Author
Pub. Date
2016.
Language
English
Description
Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practica.
Author
Pub. Date
[2019]
Language
English
Description
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate...
Author
Pub. Date
2020
Language
English
Description
Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements. The guidance provided in this book will help you effectively apply PCI DSS in your business environments, enhance your payment card defensive posture, and reduce the opportunities for criminals to compromise your network or steal sensitive data assets. Businesses are seeing an increased volume of...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request