The definitive practical guide to Azure Security Center, 50%+ rewritten for new features, capabilities, and threats Extensively revised for updates through spring 2021 this guide will help you safeguard cloud and hybrid environments at scale.
The complete guide to Cisco(R) IWAN: features, benefits, planning, and deployment Using Cisco Intelligent WAN (IWAN), businesses can deliver an uncompromised experience, security, and reliability to branch offices over any connection.
The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible.
Securing Enterprise Networks with Cisco Meraki Discover the Power of Cisco Meraki Unlock the full potential of Cisco Meraki with this in-depth guide, designed to help you build and secure modern, cloud-managed networks.
Normal 0 false false false EN-US X-NONE X-NONE The perfect introduction to pen testing for all IT professionals and students * Clearly explains key concepts, terminology, challenges, tools, and skills * Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing.
Cisco(R) ASA All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Identify, mitigate, and respond to today's highly-sophisticated network attacks.
Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them.
DCOM -- the Distributed Component Object Model -- is a recent upgrade of a time-honored and well-tested technology promoted by Microsoft for distributed object programming.
In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world.
The complete guide to Cisco(R) IWAN: features, benefits, planning, and deployment Using Cisco Intelligent WAN (IWAN), businesses can deliver an uncompromised experience, security, and reliability to branch offices over any connection.
All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and technical professionals Today, cyberattacks can place entire organizations at risk.
Introduction to Networks Companion Guide is the official supplemental textbook for the Introduction to Networks course in the Cisco Networking Academy CCNA curriculum.
Increasingly, organizations are modernizing application development by integrating open source technologies into a holistic architecture for delivering high-quality workloads to the cloud.
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation.
What you must know to protect yourself today The digital technology explosion has blown everything to bits--and the blast has provided new challenges and opportunities.
Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN The IKEv2 protocol significantly improves VPN security, and Cisco's FlexVPN offers a unified paradigm and command line interface for taking full advantage of it.
All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, tools, and skills Covers key security standards and models for business and government The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks.
All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, tools, and skills Covers key security standards and models for business and government The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks.
As artificial intelligence (AI) becomes more and more woven into our everyday lives-and underpins so much of the infrastructure we rely on-the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world.
Provides the fundamental principles and practical tools needed to design next-generation wireless networks that are both energy- and spectrum-efficient.
The Definitive Insider's Guide to Auditing Software Security This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written.
The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity.
Leading HP security expert Wenbo Mao explains why "e;textbook"e; crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks.
Why do businesses continue to use Microsoft's BizTalk Server as the backbone to integrate line-of-business applications with their trading partners and how do recent changes make it even more effective?
THE DEFINITIVE GUIDE TO DIGITAL FORENSICS-NOW THOROUGHLY UPDATED WITH NEW TECHNIQUES, TOOLS, AND SOLUTIONS Complete, practical coverage of both technical and investigative skills Thoroughly covers modern devices, networks, and the Internet Addresses online and lab investigations, documentation, admissibility, and more Aligns closely with the NSA Knowledge Units and the NICE Cybersecurity Workforce Framework As digital crime soars, so does the need for experts who can recover and evaluate evidence for successful prosecution.
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Dr.
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity.