• Microsoft Azure Sentinel (IT Best Practices - Microsoft Press)

    Using Microsoft’s cloud-based Azure Sentinel, security organizations can leverage the full power of advanced artificial intelligence to automate threat identification and response – without the management complexity and scalability challenges of conventional SIEM solutions. In Microsoft Azure Sentinel , three of Microsoft’s leading Azure Sentinel experts review the problems Azure Sentinel can solve, and guide you step-by-step through planning, deployment, and day-to-day usage. Leveraging unsurpassed expertise helping early customers succeed with Azure Sentinel, they offer the most tho... [Read More]

    • ASIN: 0136485456
    • ASIN: 0136485456
    • ISBN: 0136485456
    • Manufacturer: Microsoft Press

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

    Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive ... [Read More]

    • ASIN: 0131463071
    • ASIN: 0131463071
    • ISBN: 0131463071
    • Manufacturer: Prentice Hall

  • Modernizing the Datacenter with Windows Server and Hybrid Cloud (IT Best Practices - Microsoft Press)

    Transform your datacenter for breakthrough flexibility, agility, and scalability! Using public, private, and hybrid cloud services, you can transform your datacenter to serve fast-changing workloads, process and analyze enormous amounts of data, and achieve unprecedented flexibility and value. In this guide, two world-renowned experts in Microsoft datacenter technology show how to effectively leverage current legacy systems as you incorporate your optimal mix of cloud services. Drawing on extensive experience implementing Microsoft cloud solutions, they walk you step-by-step through your en... [Read More]

    • ASIN: 1509308024
    • ASIN: 1509308024
    • ISBN: 1509308024
    • Manufacturer: Microsoft Press

  • Microsoft Azure Security Infrastructure (IT Best Practices - Microsoft Press)

    Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security a... [Read More]

    • ASIN: 150930357X
    • ASIN: 150930357X
    • ISBN: 150930357X
    • Manufacturer: Microsoft Press

  • Business Continuity Planning: Protecting Your Organization's Life (Best Practices)

    Once considered a luxury, a business continuity plan has become a necessity. Many companies are required to have one by law. Others have implemented them to protect themselves from liability, and some have adopted them after a disaster or after a near miss. Whatever your reason, the right continuity plan is essential to your organization. Business Continuity Planning: Protecting Your Organization's Life explains how to evaluate your current plan for completeness, create an effective plan if you don't have one, and ensure it remains up-to-date.From fires, floods, and power outages to hackers an... [Read More]

    • ASIN: 0849309077
    • ASIN: 0849309077
    • ISBN: 0849309077
    • Brand: Auerbach Publications
    • Manufacturer: Auerbach Publications

  • Microsoft Azure Security Center (IT Best Practices - Microsoft Press)

    Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and ri... [Read More]

    • ASIN: 1509307036
    • ASIN: 1509307036
    • ISBN: 1509307036
    • Manufacturer: Microsoft Press

  • Microsoft Azure Security Center (IT Best Practices - Microsoft Press)

    NOW FULLY UPDATED: high-value Azure Security Center insights, tips, and operational solutions   Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center’s robust protection, detection, and response capabilities in key operational scenarios. You’ll walk through securing any Azure workload, and optimizing key facets of modern security, from policies and identity to incident respon... [Read More]

    • ASIN: B07XD5TDLV
    • ASIN: B07XD5TDLV
    • Manufacturer: Microsoft Press

  • Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency

    Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency provides readers with the proven strategies, methods, and techniques they need to present ideas and a sound business case for improving or enhancing security resilience to senior management. Presented from the viewpoint of a leading expert in the field, the book offers proven and integrated strategies that convert threats, hazards, risks, and vulnerabilities into actionable security solutions, thus enhancing organizational resiliency in ways that executive management will accept. The book deliver... [Read More]

    • ASIN: 0128020199
    • ASIN: 0128020199
    • ISBN: 0128020199
    • Manufacturer: Butterworth-Heinemann

  • The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

    As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear non technical explanations of how infosec works and how to apply these principle... [Read More]

    • ASIN: 0128007443
    • ASIN: 0128007443
    • ISBN: 0128007443
    • Brand: Syngress
    • Manufacturer: Syngress

  • Enterprise IoT: Strategies and Best Practices for Connected Products and Services

    Current hype aside, the Internet of Things will ultimately become as fundamental as the Internet itself, with lots of opportunities and trials along the way. To help you navigate these choppy waters, this practical guide introduces a dedicated methodology for businesses preparing to transition towards IoT-based business models.With a set of best practices based on case study analysis, expert interviews, and the authors’ own experience, the Ignite | IoT Methodology outlined in this book delivers actionable guidelines to assist you with IoT strategy management and project execution. You’ll a... [Read More]

    • ASIN: 1491924837
    • ASIN: 1491924837
    • ISBN: 9781491924839
    • Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • Principles: Life and Work

    #1 New York Times Bestseller “Significant...The book is both instructive and surprisingly moving.” —The New York Times Ray Dalio, one of the world’s most successful investors and entrepreneurs, shares the unconventional principles that he’s developed, refined, and used over the past forty years to create unique results in both life and business—and which any person or organization can adopt to help achieve their goals.In 1975, Ray Dalio founded an investment firm, Bridgewater Associates, out of his two-bedroom apartment in New York City. Forty years later, Bridgewater has made mor... [Read More]

    • ASIN: 1501124021
    • ASIN: 1501124021
    • ISBN: 1501124021
    • Brand: Simon & Schuster
    • Manufacturer: Simon & Schuster

  • Security Risk Assessment: Managing Physical and Operational Security

    Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-finding process that determines an organization’s state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it’s used, or how to evaluate what they have found. Security Risk Assessment offers securi... [Read More]

    • ASIN: 0128002212
    • ASIN: 0128002212
    • ISBN: 0128002212
    • Brand: imusti
    • Manufacturer: Butterworth-Heinemann

  • Enterprise Mobility Suite Managing BYOD and Company-Owned Devices (IT Best Practices - Microsoft Press)

    Manage all the mobile devices your workforce relies on Learn how to use Microsoft’s breakthrough Enterprise Mobility Suite to help securely manage all your BYOD and company-owned mobile devices: Windows, iOS, and Android. Two of the leading mobile device management experts at Microsoft show you how to systematically help protect employee privacy and corporate assets without compromising productivity. You’ll find best practices, step-by-step guidance, and real-world scenarios for every stage of planning, design, deployment, and administration. Empower your mobile users while improving sec... [Read More]

    • ASIN: 0735698406
    • ASIN: 0735698406
    • ISBN: 0735698406
    • Manufacturer: Microsoft Press

  • Security Litigation: Best Practices for Managing and Preventing Security-Related Lawsuits

    Security Litigation: Best Practices for Managing and Preventing Security-Related Lawsuits provides practical guidance and examples on how to deal with the most difficult legal issues that security executives face every day, also exploring the key issues that occur before, during, and after a lawsuit. The book demonstrates scenarios that have actually played out in courtrooms, depositions, and contractual negotiations, and provides answers to challenging security litigation questions such as, What does this contractual provision mean if we get sued? Am I in legal trouble if I assign unarmed v... [Read More]

    • ASIN: 0128019247
    • ASIN: 0128019247
    • ISBN: 0128019247
    • Manufacturer: Butterworth-Heinemann

  • Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

    Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions r... [Read More]

    • ASIN: 1118836359
    • ASIN: 1118836359
    • ISBN: 1118836359
    • Manufacturer: Wiley

  • (isc)2 Cissp Certified Information Systems Security Professional Official Study Guide, 8e & Cissp Official (Isc)2 Practice Tests, 2e

    This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition with an all new collection of Practice Exams to give

    • UPC: 326998267

  • Comptia Security+ Practice Tests : Exam Sy0-501

    1,000 Challenging practice questions for Exam SY0-501 CompTIA Security+ Practice Tests provides invaluable practice for candidates preparing for Exam SY0-501. Covering 100% of exam objectives, this book provides 1,000 practice questions to help you test

    • UPC: 487953889

  • Big Data : Principles and Best Practices of Scalable Realtime Data Systems

    Teaches readers how to build big data systems using Lambda Architecture, an architecture designed specifically to capture and analyze web-scale

    • UPC: 21851283
    • Rating: 5.0

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Sscp Systems Security Certified Practitioner Practice Exams

    9781260455977

    • UPC: 119629088

  • Principles and Practice of Big Data : Preparing, Sharing, and Analyzing Complex Information

    9780128156094

    • UPC: 876280540

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work - eBook

    Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate

    • UPC: 917148583

  • Managing Corporate Design : Best Practices for In-House Graphic Design Departments

    Corporations increasingly view graphic design as a core strategic business competency in a highly competitive climate, and they are challenging their in-house designers to supply far more than a service or support function. Their new

    • UPC: 654774236

  • Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide - Law Enforcement and First Responder Coordination; Run, Hide, Fight Response Plan - eBook

    This report has been professionally converted for accurate flowing-text e-book format reproduction.The primary mission of the ISC Active Shooter Working Group is to streamline existing ISC documents on active shooter into one cohesive policy and

    • UPC: 214608808

  • Cybersecurity Best Practices Part 1 - Preventing Opportunistic Attacks in 5 Easy Steps

    Great data heists and data security best practices - THR2283

    Workstation Security Best Practices - CompTIA A+ 220-1002 - 2.7