• Defensive Security Handbook: Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools,...

    • ASIN: 1491960388
    • Brand: OREILLY

  • Information Security: Principles and Practices (Certification/Training)

    Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, in One Book Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)² CBK]. Thoroughly updated for today’s challenges, technologies, proce...

    • ASIN: B00KKNO8VO

  • CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide and Official ISC2 Practice Tests Kit

    This value-packed packed set for the serious CISSP certification candidate combines the bestselling CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition with an all new collection of Practice Exams to give you the best preparation ever for the high-stakes CISSP Exam. CISSP (ISC)2 Certified Information S...

    • ASIN: 1119314011
    • Brand: Sybex

  • Microsoft Azure Security Center (IT Best Practices - Microsoft Press)

    Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features a...

    • ASIN: B07D5J97JV

  • CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide

    Pass the First Time.The CompTIA Security+ Get Certified Get Ahead SY0-501 Study Guide is an update to the top-selling SY0-201, SY0-301, and SY0-401 study guides, which have helped thousands of readers pass the exam the first time they took it. It covers all of the SY0-501 objectives and includes the same elements readers raved about in the previou...

    • ASIN: 1939136059
    • Brand: YCDA, LLC

  • (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8e & CISSP Official (ISC)2 Practice Tests, 2e

    This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition with an all new collection of Practice Exams to give you the best preparation ever for the high-stakes CISSP Exam. (ISC)² CISSP Study Guide, 8th Ed...

    • ASIN: 1119523265

  • AWS: Security Best Practices on AWS: Learn to secure your data, servers, and applications with AWS

    Delve deep into various security aspects of AWS to build and maintain a secured environmentKey FeaturesLearn to secure your network, infrastructure, data, and applications in AWS cloudUse AWS managed security services to automate securityDive deep into various aspects such as the security model, compliance, access management and much more to build ...

    • ASIN: 178913451X

  • The Book on Managing Rental Properties: A Proven System for Finding, Screening, and Managing Tenants With Fewer Headaches and Maximum Profit

    No matter how great you are at finding good rental property deals, you could lose everything if you don’t manage your properties correctly! But being a landlord doesn’t have to mean middle-of-the-night phone calls, costly evictions, or daily frustrations with ungrateful tenants. Being a landlord can actually be fun IF you do it right. That’s...

    • ASIN: B018W8HSP6

  • Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

    This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situ...

    • ASIN: 1484220528

  • Information Governance: Concepts, Strategies and Best Practices (Wiley CIO)

    The essential guide to effective IG strategy and practice Information Governance is a highly practical and deeply informative handbook for the implementation of effective Information Governance (IG) procedures and strategies. A critical facet of any mid- to large-sized company, this “super-discipline” has expanded to cover the management and ou...

    • ASIN: 1119491444

  • Foundations Of Information Security Based On ISO27001 And ISO27002 (Best Practice)

    This book is intended for everyone in an organization who wishes to have a basic understanding of information security. Knowledge about information security is important to all employees. It makes no difference if you work in a profit- or non-profit organization because the risks that organizations face are similar for all organizations. It clearly...

    • ASIN: 940180012X
    • Brand: Van Haren Publishing

  • Attached: The New Science of Adult Attachment and How It Can Help YouFind - and Keep - Love

    "A groundbreaking book that redefines what it means to be in a relationship."--John Gray, PhD., bestselling author of Men Are from Mars, Women Are from VenusWe already rely on science to tell us what to eat, when to exercise, and how long to sleep. Why not use science to help us improve our relationships? In this revolutionary book, psychiatrist a...

    • ASIN: 1585429139
    • Brand: Unknown
    • UPC: 619580015955

  • Information Security Best Practices: 205 Basic Rules

    Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and...

    • ASIN: 1878707965
    • Brand: Brand: Butterworth-Heinemann

  • Self-Compassion: The Proven Power of Being Kind to Yourself

    Kristin Neff, Ph.D., says that it’s time to “stop beating yourself up and leave insecurity behind.” Self-Compassion: Stop Beating Yourself Up and Leave Insecurity Behind offers expert advice on how to limit self-criticism and offset its negative effects, enabling you to achieve your highest potential and a more contented, fulfilled life.More ...

    • ASIN: B004JN1DBO
    • Brand: HarperCollins e-books

  • The Whole-Brain Child: 12 Revolutionary Strategies to Nurture Your Child's Developing Mind

    NEW YORK TIMES BESTSELLER • The authors of No-Drama Discipline and The Yes Brain explain the new science of how a child’s brain is wired and how it matures in this pioneering, practical book. “Simple, smart, and effective solutions to your child’s struggles.”—Harvey Karp, M.D. In this pioneering, practical book, Daniel J. Siegel, neur...

    • ASIN: 0553386697
    • Brand: Bantam

  • (isc)2 Cissp Certified Information Systems Security Professional Official Study Guide, 8e & Cissp Official (Isc)2 Practice Tests, 2e

    This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition with an all new collection of Practice Exams to give

    • UPC: 326998267

  • Thriving from A to Z : Best Practices to Increase Resilience, Satisfaction, and Success

    Thriving from A to Z provides you with 26 best practices proven to help you learn, grow, and succeed. The essential best practices, valuable implementation tips, and engaging reflection activities help you build resilience and

    • UPC: 662577702

  • Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work - eBook

    Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate

    • UPC: 917148583

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Becoming an Independent Security Consultant : A Practical Guide to Starting and Running a Successful Security Consulting Practice

    The demand for security consulting services is at an all-time high. Organizations of all types face unprecedented challenges in dealing with workplace violence, internal and external theft, robbery and crimes of all varieties. These organizations

    • UPC: 350951682

  • Maintenance and Reliability Best Practices

    Drawing upon the authors many years of shop floor and management experience in a variety of industries,

    • UPC: 17374072

  • Implementing Diversity: Best Practices for Making Diversity Work in Your Organization

    This practical and provocative guide provides the strategies and tactics used by organizations committed to implementing diversity from the top down. Focusing on the necessity for a strategic change initiative, Loden discusses: how to position

    • UPC: 25455699

  • Entertainment Management : Towards Best Practice

    ENTERTAINMENT MANAGEMENT

    • UPC: 34069283

  • Essentials of Health Information Management : Principles and Practices

    Get in the know and learn in the now with ESSENTIALS OF HEALTH INFORMATION MANAGEMENT: PRINCIPLES AND PRACTICES, FOURTH EDITION! Electronic health records are the norm in health care today, so you must master technology

    • UPC: 435003780

  • Building a World-Class Compliance Program : Best Practices and Strategies for Success

    Written by a long-standing practitioner in the field, this timely and critical work is your best source for understanding all the complex issues and requirements associated with corporate compliance. It provides clear guidance for those

    • UPC: 8041910

  • Information System Security Best Practices for Uocava- Supporting Systems by U.S

    • UPC: 391835226567
    • Category: Nonfiction
    • Price: 20 USD

  • Information Security Best Practices : 205 Basic Rules by George L. Stefanek

    • UPC: 143250021391
    • Category: School Textbooks & Study Guides
    • Price: 7 USD

  • AWS: Security Best Practices on AWS Learn to secure your data, ... 9781789134513

    • UPC: 333204689047
    • Category: Non Fiction
    • Price: 29 GBP

  • Information Security: Best Practice Methods for Protecting Your Business (IOD ,

    • UPC: 132755927424
    • Category: Non Fiction
    • Price: 2 GBP

  • AWS: Security Best Practices on AWS: Learn to secure your data, servers, and app

    • UPC: 362353934999
    • Category: School Textbooks & Study Guides
    • Price: 57 USD

  • Identity and Data Security for Web Development : Best Practices, Paperback by...

    • UPC: 263585951702
    • Category: Nonfiction
    • Price: 26 USD

  • Information Security Best Practice Methods for Protecting Your Busines-ExLibrary

    • UPC: 293080834003
    • Category: Non Fiction
    • Price: 2 GBP

  • [PDF] Identity and Data Security for Web Development Best Practices 1st Edition

    • UPC: 312538886634
    • Category: Other Books
    • Price: 9 USD

  • Information Security Management with ITIL V3 Best Practice Series

    • UPC: 183789188559
    • Category: Non-Fiction Books
    • Price: 83 AUD

  • Implementing Information Security based on ISO 27001/ISO 27002 (Best Practice…

    • UPC: 143219349798
    • Category: Nonfiction
    • Price: 45 USD

  • Cybersecurity Best Practices Part 1 - Preventing Opportunistic Attacks in 5 Easy Steps

    Information Security Best Practices

    Microsoft shares tips on how to secure your identity against cybersecurity threats