Catalog Search Results
Author
Language
English
Description
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and...
Author
Pub. Date
2020
Language
English
Description
The third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux. In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies....
Author
Pub. Date
2019
Language
English
Description
Know how to design and use identity management to protect your application and the data it manages.
At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid....
Author
Pub. Date
2022.
Language
English
Description
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the...
Author
Pub. Date
[2021]
Language
English
Description
Move beyond the checklist and fully protect yourself from third-party cybersecurity risk
Over the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as...
Author
Language
Deutsch
Description
Penetrationstests mit Metasploit als effektiver Teil der IT-Sicherheitsstrategie Der komplette Workflow: Portscanning mit Nmap, Hacking mit Metasploit, Schwachstellen scannen mit Nessus Die Techniken der Angreifer verstehen und geeignete Gegenmaßnahmen ergreifen Metasploit ist ein mächtiges Werkzeug, mit dem auch unerfahrene Administratoren gängige Angriffsmethoden verstehen und nachstellen können. Der Autor erklärt das Framework dabei nicht...
Author
Language
English
Formats
Description
Get the know-how you need to safeguard your data against cyber attacks
Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security-shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more, Cybersecurity For Dummies is the best-selling guide you need to learn how to protect your personal and business information...
Author
Language
English
Formats
Description
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission....
Author
Series
Pub. Date
2010
Language
English
Description
In this day of frequent acquisitions and perpetual application integrations, systems are often an amalgamation of multiple programming languages and runtime platforms using new and legacy content. Systems of such mixed origins are increasingly vulnerable to defects and subversion. System Assurance: Beyond Detecting Vulnerabilities addresses these critical issues. As a practical resource for security analysts and engineers tasked with system assurance,...
Author
Pub. Date
2021
Language
English
Description
Cybersecurity is a pressing issue across industries, as well as increasingly important in people's personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner, Choose Your InfoSec Path is an informative, fun, interactive cybersecurity adventure that has been written specifically with...
Author
Pub. Date
[2021]
Language
English
Description
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography and the foundations of authentication technologies and attack mechanisms. You will learn about the mechanisms that are available to protect computer networks, systems, applications, and...
Author
Pub. Date
2016.
Language
English
Description
"It's an unfortunate truism that many good developers are bad at software security. They cling to the belief that security is something you can just buy and bolt on, but that's not the case. It's not that developers want to be bad at security, they just don't know where to start and where they should go. This video offers a clear route. It begins with a high level overview of today's security threats and the organizational strategies used to counter...
Author
Pub. Date
[2019]
Language
English
Description
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate...
Pub. Date
2019.
Language
Deutsch
Description
Das Grundlagenwerk strukturiert das Basiswissen der Informationssicherheit in 27 aufeinander aufbauenden Kapiteln. Es stammt aus der Feder von Praktikern - alle mitwirkende Autoren sind Security Consultants bei Secorvo in Karlsruhe mit zusammen über 280 Jahren Berufserfahrung in Informationssicherheit und Datenschutz. Das Buch eignet sich auch als Begleitbuch zur T.I.S.P.-Schulung, die mit dem entsprechenden Zertifikat abgeschlossen werden kann....
Author
Pub. Date
2020
Language
English
Description
Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements. The guidance provided in this book will help you effectively apply PCI DSS in your business environments, enhance your payment card defensive posture, and reduce the opportunities for criminals to compromise your network or steal sensitive data assets. Businesses are seeing an increased volume of...
Author
Pub. Date
2021
Language
English
Description
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organizations resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develop. Security controls and responses can then be applied...
Author
Pub. Date
2005.
Language
English
Description
An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux...
Author
Pub. Date
[2022]
Language
English
Description
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure. The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request