Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term.
Learn to set up the latest CentOS Linux network services including DNS, DHCP, SSH and VNC, Web, FTP, Mail, Firewall, and LDAP, enabling you to provide these services on your own network.
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure.
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization.
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely.
Writing in their famous Harvard Law Review article of 1890, Louis Brandeis and Samuel Warren asserted what many have considered one of the most cherished American values: the right to be let alone.
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager.
Master the SAPproduct ecosystem, the client environment, and the feasibility of implementingcritical business process with the required technical and functionalconfiguration.
Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise.
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road.
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.
Defend Your Digital World and Reclaim Your Peace of MindIn an era where your personal and professional life hinges on technology, threats lurk at every byte.
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.
This book provides a unique in-depth focus on how financial organizations and suppliers of computer security are currently addressing - in strategic terms - the problem of computer security.
Computers and the General Practitioner focuses on the applications of computers in various aspects of health service, including ECG analysis, primary care, and diagnosis.
Defence Electronics: Standards and Quality Assurance is a reference manual for the standards and organizations involved in quality assurance in the general field of defense electronics.
Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind.
Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised.
Offering hundreds of tips, templates, checklists, and pointers to information in the public domain, Business Resumption Planning, Second Edition assists you in creating a rock solid recovery plan for any size organization.