• Microsoft Azure Security Infrastructure (IT Best Practices - Microsoft Press)

    Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security a... [Read More]

    • ASIN: 150930357X
    • ASIN: 150930357X
    • ISBN: 150930357X
    • Manufacturer: Microsoft Press

  • Defensive Security Handbook: Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastruc... [Read More]

    • ASIN: 1491960388
    • ASIN: 1491960388
    • ISBN: 9781491960387
    • Brand: OREILLY
    • Manufacturer: O'Reilly Media

  • Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

    This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.Cybercrime continues to grow ... [Read More]

    • ASIN: 1484220528
    • ASIN: 1484220528
    • ISBN: 9781484220528
    • Manufacturer: Apress

  • Building Secure and Reliable Systems: SRE and Security Best Practices

    Can a system ever truly be considered reliable if it isn't fundamentally secure? In two previous O'Reilly books, experts from Google showed how reliability is fundamental to service design. Site Reliability Engineering and The Site Reliability Workbook demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems.Security is also crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, reliability, and availability. In ... [Read More]

    • ASIN: 1492083127
    • ASIN: 1492083127
    • ISBN: 1492083127
    • Manufacturer: O'Reilly Media

  • Information Security: Principles and Practices (2nd Edition) (Certification/Training)

    Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, in One Book Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)² CBK]. Thoroughly updated for today’s challenges, technologies, procedures, and best practices. The perfect resource for anyone pursuing an IT security career.   Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains o... [Read More]

    • ASIN: 0789753251
    • ASIN: 0789753251
    • ISBN: 0789753251
    • Brand: Pearson IT Certification
    • Manufacturer: Pearson IT Certification

  • Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity... [Read More]

    • ASIN: B01GP09AS6
    • ASIN: B01GP09AS6
    • Manufacturer: O'Reilly Media

  • Writing Secure Code, Second Edition (Developer Best Practices)

    Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes u... [Read More]

    • ASIN: 0735617228
    • UPC: 790145172280
    • ASIN: 0735617228
    • ISBN: 0735617228
    • Brand: Microsoft
    • Manufacturer: Microsoft Press

  • Effective Physical Security

    Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author’s work that set the standard. This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design. Provides detailed coverage of physical security... [Read More]

    • ASIN: 0128044624
    • ASIN: 0128044624
    • ISBN: 0128044624
    • Brand: imusti
    • Manufacturer: Butterworth-Heinemann

  • Microsoft Azure Security Center (2nd Edition) (IT Best Practices - Microsoft Press)

    This book introduces readers to the wide array of security features and capabilities available in Azure Security Center. After being introduced to all of these security options, you will dig in to see how they can be used in a number of operational security scenarios so that you can get the most out of the protect, detect, and respond skills provided only by Azure Security Center. This book helps you secure Azure assets no matter what level of security experience they have. You will save hours, days and weeks of time by removing the trial and error by stepping them through how to protect, dete... [Read More]

    • ASIN: 0135752035
    • ASIN: 0135752035
    • ISBN: 0135752035
    • Manufacturer: Microsoft Press

  • Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

    Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for... [Read More]

    • ASIN: 1597496154
    • ASIN: 1597496154
    • ISBN: 1597496154
    • Brand: Syngress Publishing
    • Manufacturer: Syngress

  • The Practical Guide to HIPAA Privacy and Security Compliance

    Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supply... [Read More]

    • ASIN: 1439855587
    • ASIN: 1439855587
    • ISBN: 1439855587
    • Manufacturer: Auerbach Publications

  • Information Security Policies, Procedures, and Standards: A Practitioner's Reference

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are develo... [Read More]

    • ASIN: 1482245892
    • ASIN: 1482245892
    • ISBN: 1482245892
    • Brand: Taylor Francis
    • Manufacturer: Auerbach Publications

  • Security Risk Assessment: Managing Physical and Operational Security

    Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-finding process that determines an organization’s state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it’s used, or how to evaluate what they have found. Security Risk Assessment offers securi... [Read More]

    • ASIN: 0128002212
    • ASIN: 0128002212
    • ISBN: 0128002212
    • Brand: imusti
    • Manufacturer: Butterworth-Heinemann

  • Computer Security: Principles and Practice

    In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject.   Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Expl... [Read More]

    • ASIN: 0136004245
    • ASIN: 0136004245
    • ISBN: 0136004245
    • Manufacturer: Prentice Hall

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

    Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive ... [Read More]

    • ASIN: 0131463071
    • ASIN: 0131463071
    • ISBN: 0131463071
    • Manufacturer: Prentice Hall

  • The Development of International Refugee Protection through the Practice of the UN Security Council - eBook

    This paper examines the ambivalent influence of the UN Security Council’s practice on the development of international refugee protection since the early 1990s. While the international refugee protection regime did not originally foresee a role

    • UPC: 154651811

  • Cyberspace Cybersecurity: First American International Strategy for Cyberspace, White House and GAO Reports and Documents, Internet Data Security Protection, International Web Standards - eBook

    On May 16, 2011, the White House announced what it called the United States’ first comprehensive International Strategy for Cyberspace. Howard Schmidt, the White House Cybersecurity Coordinator, noted: "The International Strategy is a historic policy

    • UPC: 982193478

  • Developing Effective Information Security Strategies with Data Protection & Privacy Insights : A Guide for Senior Leaders and Those Aspiring to Be

    Learn from one of Information Security's leading experts, on how to secure your organization's most sensitive and valuable data. This study covers the necessary fundamentals of information security, by explaining how to establish a foundation

    • UPC: 785211291

  • Cisco Firepower Threat Defense (Ftd) : Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (Ngfw), Next-Generation Intrusion Prevention System (Ngips), and Advanced Malware Protection (Amp)

    The authoritative visual guide to Cisco Firepower Threat Defense (FTD) This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA

    • UPC: 56042616

  • Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles - eBook

    This book sheds light on aviation security, considering both technologies and legal principles. It considers the protection of individuals in particular their rights to privacy and data protection and raises aspects of international law, human rights and

    • UPC: 597212435

  • Internet of Things Security and Data Protection - eBook

    This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It

    • UPC: 433495785

  • Your Amazing Itty Bitty® Personal Data Protection Book - eBook

    Cybercrime is on track to become a six trillion dollar problem by 2021. After the Equifax breach, cybercrime advisors are alerting citizens that they should assume their personal information is in the hands of cyber

    • UPC: 758857891

  • Online Banking Security Measures and Data Protection - eBook

    Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever.

    • UPC: 293493826

  • Your Amazing Itty Bitty® Personal Data Protection Book - eBook

    Cybercrime is on track to become a six trillion dollar problem by 2021. After the Equifax breach, cybercrime advisors are alerting citizens that they should assume their personal information is in the hands of cyber

    • UPC: 399495451

  • Information Sharing and Data Protection in the Area of Freedom, Security and Justice - eBook

    Privacy and data protection in police work and law enforcement cooperation has always been a challenging issue. Current developments in EU internal security policy, such as increased information sharing (which includes the exchange of personal

    • UPC: 267056089

  • Great data heists and data security best practices - THR2283

    Best practices for protecting your company's sensitive data

    Best Practices for Security in Amazon S3 - AWS Online Tech Talks