Catalog Search Results
Author
Series
Pub. Date
[2023]
Language
English
Description
"Computers hold all kinds of important information for individuals, businesses, and beyond. Cybersecurity is needed to keep that information safe from hackers and other threats. As computer technology advances, cybersecurity must keep up. Explore how cybersecurity works, what threatens cybersecurity, and how this technology helps people. It's a key current events topic made approachable for all!"--
Author
Pub. Date
2022.
Language
English
Description
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing and conducting a hunt Customize a defensive cyber framework needed to grow and mature a hunt team Book Description Threat hunting is a concept that takes...
Author
Pub. Date
[2016]
Language
English
Description
This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. Although written primarily for building designers and maintenance personnel, much of the terminology applies to cyber-physical attacks in general. Buildings today are automated because the systems...
Pub. Date
2013
Language
English
Description
This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly...
Author
Language
English
Formats
Description
"With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques...
Author
Series
Language
English
Formats
Description
"Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and...
Author
Pub. Date
2022.
Language
English
Description
How packages are built, sourced, and integrated is vital to efficient and secure supply chains. Complete control over packages, from provenance to deployment, is critical for security during the software development lifecycle. As recent breaches attest, securing your software supply chain is now more critical than ever. What can you do? Simple package management strategies are not enough. You need a single source of truth for dependencies that you...
Author
Series
Language
English
Formats
Description
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness For Dummies...
Author
Pub. Date
2024.
Language
English
Description
This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins.
Author
Pub. Date
[2024]
Language
English
Description
"In Critical Infrastructure Resilience and Sustainability Reader, Ted G. Lewis delivers a clear and compelling discussion of what infrastructure requires protection, how to protect it, and the consequences of failure. Through the book, you'll examine the intersection of cybersecurity, climate change, and sustainability as you reconsider and reexamine the resilience of your infrastructure systems"--
Author
Series
Language
English
Description
Keep your Mac safe from intruders, malware, and more! Version 1.0.1, updated February 10, 2021 Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders who might tap physically into your computer. Glenn teaches how to secure your data at rest and in motion. Learn...
Author
Pub. Date
2022
Language
English
Description
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments,...
Pub. Date
2023.
Language
English
Description
LLMs introduce new attack vectors that can compromise your AI systems. This intensive workshop equips you with hands-on skills to tackle the OWASP Top 10 most critical risks for securing enterprise-grade LLM applications. Led by cybersecurity expert Clint Bodungen, this masterclass focuses on fortifying your LLM stack against the OWASP Top 10 most critical risks. Diving deep into the attack vectors unique to these powerful generative models, you will...
Author
Pub. Date
2023.
Language
English
Formats
Description
Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks Key Features Leverage best practices and emerging technologies to effectively audit a cloud environment Get better at auditing and unlock career opportunities in cloud audits and compliance Explore multiple assessments of various features in a cloud environment to see how it's done Book Description As more and more companies...
Author
Language
English
Formats
Description
With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in increasing the business's cyber resilience due to its complex nature and the lack of a clear return on investment. This book demystifies the perception that cybersecurity is a technical problem,...
18) Shopping
Author
Series
Language
English
Formats
Description
"Shopping online can be fun and easy, and there are many ways to do it. Explore the world of online shopping. Then, learn some helpful tips on spotting scams and staying safe online. Colorful illustrations paired with bright photos help young readers gain digital literacy"--
Author
Series
Language
English
Formats
Description
"Organizations in every industry from healthcare to finance rely on cybersecurity professionals to protect one of their most valuable assets - information. For those interested in both high-tech security and computer science, there are many roles and career opportunities from designing network security systems to conducting penetration testing to identifying security weaknesses. This book examines several of those careers, highlighting different jobs,...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request