• AWS: Security Best Practices on AWS: Learn to secure your data, servers, and applications with AWS

    Delve deep into various security aspects of AWS to build and maintain a secured environmentKey FeaturesLearn to secure your network, infrastructure, data, and applications in AWS cloudUse AWS managed security services to automate securityDive deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secured environmentExplore Cloud Adoption Framework (CAF) and its componentsEmbedded with assessments that will help you revise the concepts you have learned in this bookBook DescriptionWith organizations moving their workloads, applic... [Read More]

    • ASIN: B07BHRLJLL
    • ASIN: B07BHRLJLL
    • Manufacturer: Packt Publishing

  • CompTIA A+ Certification All-in-One Exam Guide, Tenth Edition (Exams 220-1001 & 220-1002)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This bestselling on-the-job reference and test preparation guide has been fully revised for the new 2019 CompTIA Core 1 and Core 2 CompTIA A+ exam objectivesThis fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1001 & 220-1002. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations... [Read More]

    • ASIN: 1260454037
    • ASIN: 1260454037
    • ISBN: 1260454037
    • Manufacturer: McGraw-Hill Education

  • AWS Security Best Practices (AWS Whitepaper)

    August 2016This whitepaper provides security best practices that will help you define your Information Security Management System (ISMS) and build a set of security policies and processes for your organization so you can protect your data and assets in the AWS Cloud. It also provides an overview of different security topics such as identifying, categorizing and protecting your assets on AWS, managing access to AWS resources using accounts, users and groups and suggesting ways you can secure your data, your operating systems and applications and overall infrastructure in the cloud.

    • ASIN: B01LX8J2S9
    • ASIN: B01LX8J2S9
    • Manufacturer: Amazon Web Services

  • Cryptography and Network Security: Principles and Practice (7th Edition)

    The Principles and Practice of Cryptography and Network Security Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by pr... [Read More]

    • ASIN: 0134444280
    • ASIN: 0134444280
    • ISBN: 0134444280
    • Manufacturer: Pearson

  • The Plot to Destroy Democracy: How Putin and His Spies Are Undermining America and Dismantling the West

    New York Times and USA Today bestselling author provides a provocative, comprehensive analysis of Vladimir Putin and Russia's master plan to destroy democracy in the age of Donald Trump, with a foreword by Rob Reiner."A convincing cry that treason is afoot." - Kirkus Reviews"[E]ven as this plot gets more intricate (and, yes, sometimes it does read like a political thriller), readers will be turning pages quickly, feeling both anxiety and betrayal. . . . [E]ven supporters of the president will have something to think about." - BooklistIn the greatest intelligence operation in the history of t... [Read More]

    • ASIN: B079RB155J
    • ASIN: B079RB155J
    • Manufacturer: Hachette Books

  • CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This fully updated study guide covers every topic on the current version of the CompTIA Security+ examTake the latest version of the CompTIA Security+ exam with complete confidence using the detailed information contained in this highly effective self-study system. Written by a team of leading information security experts, this authoritative guide addresses the skills required for securing a network and ma... [Read More]

    • ASIN: 1260019322
    • ASIN: 1260019322
    • ISBN: 1260019322
    • Manufacturer: McGraw-Hill Education

  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an ... [Read More]

    • ASIN: 1593275099
    • ASIN: 1593275099
    • ISBN: 1593275099
    • Brand: Brand: No Starch Press
    • Manufacturer: No Starch Press

  • Embedded Systems Architecture: Explore architectural concepts, pragmatic design patterns, and best practices to produce robust systems

    A comprehensive guide to reaping the benefits of architectural modeling in embedded designKey FeaturesIdentify and overcome challenges in embedded environmentsUnderstand the steps required to increase the security of IoT solutionsBuild safety-critical and memory-safe parallel and distributed embedded systemsBook DescriptionEmbedded systems are self-contained units that have a dedicated purpose within a device. We come across a variety of applications of embedded systems in navigation tools, telecom applications, and networking equipment, to name just a few.Embedded Systems Architecture begins ... [Read More]

    • ASIN: 1788832507
    • ASIN: 1788832507
    • ISBN: 1788832507
    • Manufacturer: Packt Publishing - ebooks Account

  • Russian Roulette: The Inside Story of Putin's War on America and the Election of Donald Trump

    #1 NEW YORK TIMES BESTSELLER #1 USA TODAY BESTSELLER"RUSSIAN ROULETTE is...the most thorough and riveting account." --The New York Times The incredible, harrowing account of how American democracy was hacked by Moscow as part of a covert operation to influence the U.S. election and help Donald Trump gain the presidency. p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Arial} p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; text-indent: 36.0px; font: 12.0px Arial} RUSSIAN ROULETTE is a story of political skullduggery unprecedented in American history. It weaves together tales of international intrig... [Read More]

    • ASIN: B075WVX3MS
    • ASIN: B075WVX3MS
    • Manufacturer: Twelve

  • RESTful API Design: Best Practices in API Design with REST (API-University Series Book 3)

    Looking for Best Practices for RESTful APIs?This book is for you! Why? Because this book is packed with practical experience on what works best for RESTful API Design.You want to design APIs like a Pro?Use API description languages to both design APIs and develop APIs efficiently. The book introduces the two most common API description languages RAML, OpenAPI, and Swagger.Your company cares about its customers?Learn API product management with a customer-centric design and development approach for APIs. Learn how to manage APIs as a product and how to follow an API-first approach. Build APIs y... [Read More]

    • ASIN: B01L6STMVW
    • ASIN: B01L6STMVW
    • Manufacturer: API-University Press

  • Hacking: The Art of Exploitation, 2nd Edition

    Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacke... [Read More]

    • ASIN: 1593271441
    • UPC: 884870524442
    • ASIN: 1593271441
    • ISBN: 1593271441
    • Brand: imusti
    • Manufacturer: No Starch Press

  • IoT Inc: How Your Company Can Use the Internet of Things to Win in the Outcome Economy

    Grab the top spot in your industry by seizing the power of IoT Smart products are everywhere. They’re in our companies, in our homes, in our pockets. People love these products. But what they love more is what these products do—and for anyone running a business today, outcomes are the key. The Internet of Things (IoT) is the point of connection between products and the results they deliver—it’s where products become software. IoT Inc. explains everything you need to know to position your company within this powerful new network. And once you do, you’ll leave the competition in the du... [Read More]

    • ASIN: B071DZZRQS
    • ASIN: B071DZZRQS
    • Manufacturer: McGraw-Hill Education

  • Foundations Of Information Security Based On ISO27001 And ISO27002 (Best Practice)

    This book is intended for everyone in an organization who wishes to have a basic understanding of information security. Knowledge about information security is important to all employees. It makes no difference if you work in a profit- or non-profit organization because the risks that organizations face are similar for all organizations. It clearly explains the approaches that most organizations can consider and implement which helps turn Information Security management into an approachable, effective and well-understood tool. It covers: * The quality requirements an organization may have for ... [Read More]

    • ASIN: 940180012X
    • ASIN: 940180012X
    • ISBN: 940180012X
    • Brand: Van Haren Publishing
    • Manufacturer: Van Haren Publishing

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It


    • ASIN: B00N6PCZMC
    • ASIN: B00N6PCZMC
    • Manufacturer: Anchor

  • The Hacker Playbook 3: Practical Guide To Penetration Testing

    Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ... [Read More]

    • ASIN: 1980901759
    • ASIN: 1980901759
    • ISBN: 1980901759
    • Manufacturer: Independently published

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide - Law Enforcement and First Responder Coordination; Run, Hide, Fight Response Plan - eBook

    This report has been professionally converted for accurate flowing-text e-book format reproduction.The primary mission of the ISC Active Shooter Working Group is to streamline existing ISC documents on active shooter into one cohesive policy and

    • UPC: 214608808

  • Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work - eBook

    Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate

    • UPC: 917148583

  • IIS Best Practices and Security Hardening: A Straightforward Guide to a Successful and Secure Deployment of IIS

    IIS Best Practices and Security Hardening: A Straightforward Guide to a Successful and Secure Deployment of

    • UPC: 834053743

  • Army Cyber Mission Force: Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices - eBook

    The 2010 US Army Training and Doctrine Commands Concept Capability Plan for Cyberspace Operations directed the Army to begin development of a Cyber Mission Force. The direction to build a Cyber Mission Force followed a

    • UPC: 231330152

  • Aws : Security Best Practices on Aws

    Aws: Security Best Practices on

    • UPC: 227304853

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • AWS: Security Best Practices on AWS - eBook

    Delve deep into various security aspects of AWS to build and maintain a secured environmentKey Features●Learn to secure your network, infrastructure, data, and applications in AWS cloud●Use AWS managed security services to automate security●Dive deep

    • UPC: 411933873

  • Best Practices for Investment Committees - eBook

    An indispensable guide to avoiding the legal and financial pitfalls and of retirement plan investmentWhile it has always been true that a well-staffed and managed investment committee is key to the success of a corporate

    • UPC: 162171780

  • Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning - eBook

    Two excellent reports have been professionally converted for accurate flowing-text e-book format reproduction.Book 1: Cybersecurity Capability Maturity Model White Paper - Cybersecurity is a leading national security challenge facing this country today. An emerging topic

    • UPC: 175775309

  • Microsoft shares tips on how to secure your identity against cybersecurity threats

    Accenture: Securing AWS Accounts According to CIS (Center for Internet Security) Best Practices

    Internet of Things (IoT) Security Best Practices With Google Cloud (Cloud Next '19)