Master the latest digital security automation technologiesAchieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume.
Defend against corporate espionage launched from social networksProtect your organization from devastating social media attacks with instruction from a team of information security experts.
The best fully integrated study system available for Exam CN0-201With hundreds of practice questions and hands-on exercises, CompTIA CTP+ Convergence Technologies Professional Certification Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.
Security Smarts for the Self-Guided IT Professional An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of your security program and how to do it.
The latest Web app attacks and countermeasures from world-renowned practitionersProtect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker.
Implement an Effective Security Metrics Project or ProgramIT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization.
Mike Meyers, the industry expert on professional certification, and Shon Harris, author of the leading CISSP Certification Exam Guide, bring you this concise, affordable, and portable study tool for the CISSP certification exam.
"e;Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies.
Cutting-edge techniques from leading Oracle security expertsThis Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments.
Completely revised to include the latest security tools, including wireless toolsNew tips on how to configure the recent tools on Linux, Windows, and Mac OSXNew on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and moreNew case studies in each chapter
* Organized around common problems rather than technology or protocols, this reference shows readers all their options* Helps make the best decisions based on available budget* Explains the limitations and risks of each solution* Excellent visuals--intuitive illustrations and maps, not graphs and charts* How to implement the chosen solution
In the wake of 9/11 companies from a broad array of industries have demanded that their IT divisions create strategies to maintain network availability and business continuity in event of disaster.
Ensure corporate privacy online with this step-by-step guide Whether your company needs to safeguard your customers'personal information, or keep e-intruders from accessing company secrets, your organization must have an effective, organization-wide privacy plan.
A Pulitzer Prize winning investigative journalist’s journey into a billon-dollar secret industry that is shaping our world – the booming business of private spying, operatives-for-hire retained by companies, political parties and the powerful to dig up dirt on their enemies and, if need be, destroy them.
Implementing appropriate security measures will be an advantage when protecting organisations from regulatory action and litigation in cyber security law: can you provide a defensive shield?
Implementing appropriate security measures will be an advantage when protecting organisations from regulatory action and litigation in cyber security law: can you provide a defensive shield?
Essential Skills for a Successful IT CareerWritten by Mike Meyers, the leading expert on CompTIA certification and training, this up-to-date, full-color text will prepare you for CompTIA Network+ exam N10-006 and help you become an expert networking technician.
This in-depth guide reveals the art of mobile forensics investigation with comprehensive coverage of the entire mobile forensics investigation lifecycle, from evidence collection through advanced data analysis to reporting and presenting findings.
Essential Skills for a Successful IT CareerWritten by CompTIA certification and training expert Mike Meyers, this instructive, full-color guide will help you pass CompTIA Network+ exam N10-005 and become an expert networking technician.
All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, tools, and skills Covers key security standards and models for business and government The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks.
The best IT certification exam study system available for CompTIA Network+ Exam N10-006With hundreds of practice exam questions, including new performance-based types, CompTIA Network+ Certification Study Guide, Sixth Edition (Exam N10-006) covers everything you need to know to prepare for this challenging exam.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality.
Avoid MFA pitfalls-learn how to choose, implement, and troubleshoot MFA in your companyKey FeaturesGain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domainThwart authentication breaches using pragmatic strategies and lessons derived from real-world scenariosChoose the right MFA solutions to enhance your organization's securityBook DescriptionMFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity.