At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.
Mike Meyers, the industry expert on professional certification, and Shon Harris, author of the leading CISSP Certification Exam Guide, bring you this concise, affordable, and portable study tool for the CISSP certification exam.
Take your Microsoft Visual Studio 2008 programming skills to the top tier"e;A must-read for experienced developers who want to dive deeply into Visual Studio 2008.
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects.
An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike MeyersIn Mike Meyers CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effective methodology to IT security for the first time.
Fully revised for the CEH v8 exam objectives, this money-saving self-study bundle includes two eBooks, electronic content, and a bonus quick review guide.
Ambient Assisted Living and Enhanced Living Environments: Principles, Technologies and Control separates the theoretical concepts concerning the design of such systems from their real-world implementations.
The purpose of this book is to avail students of the many different reasons and back-stories equated with the advent of interaction design and its effect on our world.
A hands-on, beginner-friendly intro to web application pentesting In A Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date exploration of web app pentesting.
The Practical, Foundational Technical Introduction to the World's #1 Cloud Platform Includes access to several hours of online training video: Mark Wilkins' expert training video library guides you through setting up core services and prepares you to deploy your own apps and resources.
Prepare for CompTIA Cloud Essentials Exam CLO-001 with McGraw-Hill Professional-a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.
Previous McGraw-Hill SQL Server 2005 titles have sold more than 40,000 copiesHigh availability is an important new focus for SQL Server 2005--IT professionals must be skilled in maximizing system uptime
The authoritative, general reference that has been sorely missing in the field of mobile computing This book teaches all the main topics via the hottest applications in a rapidlygrowing field.
The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity.
Current data centre networks, based on electronic packet switches, are experiencing an exponential increase in network traffic due to developments such as cloud computing.
Security Smarts for the Self-Guided IT Professional An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of your security program and how to do it.
Implement an Effective Security Metrics Project or ProgramIT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization.
An all-new exam guide for the industry-standard information technology risk certification, Certified in Risk and Information Systems Control (CRISC)Prepare for the newly-updated Certified in Risk and Information Systems Control (CRISC) certification exam with this comprehensive exam guide.
Maximize the latest iCloud capabilitiesThis all-new edition of How To Do Everything: iCloud fully covers iCloud s versatile features and offers step-by-step directions on how to use each one, including Shared Photo Streams, the iWork for iCloud apps, and iCloud Keychain.
Maximize Microsoft SharePoint 2013Written by a former member of the SharePoint development team, How to Do Everything: Microsoft SharePoint 2013 shows you how to get the most out of the latest release of this dynamic business collaboration platform.
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis.
The latest techniques for averting UC disasterEstablish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal.
Prepare for the 2015 CISSP exam with this up-to-date, money-saving study packageDesigned as a complete self-study program, this collection offers a variety of proven, exam-focused resources to use in preparation for the 2015 CISSP exam.
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world"e;There's no question that attacks on enterprise networks are increasing in frequency and sophistication.
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets.
What you must know to protect yourself today The digital technology explosion has blown everything to bits-and the blast has provided new challenges and opportunities.
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions - Volume II brings together more expert-level instruction in security design, deployment, integration, and support.
From Mike Meyers, the #1 name in CompTIA training and exam preparation, a thorough revision of his bestselling exam guide-updated to cover the 2015 release of the CompTIA Network+ exam.
The only official study guide for CWNA Exam PW0-100Fully authorized by the exam developers at the CWNP program, this comprehensive study guide thoroughly covers all the topics on the CWNA certification exam.
Achieve Extreme Application Performance for a Private Cloud with Oracle Exalogic Elastic CloudTransition to a private cloud computing infrastructure and achieve unmatched levels of performance with help from this Oracle Press guide.
Completely revised to include the latest security tools, including wireless toolsNew tips on how to configure the recent tools on Linux, Windows, and Mac OSXNew on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and moreNew case studies in each chapter
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated.