Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques.
Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
CompTIA Security+ Certification Study Guide: Exam SYO-201, Third Edition, offers a practical guide for those interested in pursuing CompTIA Security+ certification.
We live more and more of our lives online; we rely on the internet as we work, correspond with friends and loved ones, and go through a multitude of mundane activities like paying bills, streaming videos, reading the news, and listening to music.
We live more and more of our lives online; we rely on the internet as we work, correspond with friends and loved ones, and go through a multitude of mundane activities like paying bills, streaming videos, reading the news, and listening to music.
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.
Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA's fastest-growing credential, CompTIA Security+.
Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations.
A Developer's Guide to Blockchain Programming Fundamentals Blockchain development is entering a period of explosive growth, as real applications gain traction throughout multiple industries and cryptocurrencies earn greater acceptance throughout the financial sector.
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
A Developer's Guide to Blockchain Programming Fundamentals Blockchain development is entering a period of explosive growth, as real applications gain traction throughout multiple industries and cryptocurrencies earn greater acceptance throughout the financial sector.
The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain "e;Blockchain's potential to transform businesses has generated a tremendous amount of excitement across industries.
If you're a security or network professional, you already know the "e;do's and don'ts"e;: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants .
If you're a security or network professional, you already know the "e;do's and don'ts"e;: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants .
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering.
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering.
Cybersecurity is set to be one of the dominant themes in EU governance in the coming years, and EU law has begun to adapt to the challenges presented by security with the adoption of the Network and Information Security (NIS) Directive.
The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security.
The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security.
"e;While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements.
The Best Fully Integrated Study System Available for Exam CAS-001With hundreds of practice questions and lab exercises, CASP CompTIA Advanced Security Practitioner Certification Study Guide covers what you need to know and shows you how to prepare for this challenging exam.
This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks.
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by avoidable software defects.
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by avoidable software defects.
Since 2001, the CERT(R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets.