• Defensive Security Handbook: Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastruc... [Read More]

    • ASIN: 1491960388
    • ASIN: 1491960388
    • ISBN: 9781491960387
    • Brand: OREILLY
    • Manufacturer: O'Reilly Media

  • Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)

    A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document filtering practices in dozens of countries.Many countries around the world block or filter Internet content, denying access to information that they deem too sensitive for ordinary citizens―most often about politics, but sometimes relating to sexuality, culture, or religion. Access Denied documents and analyzes Internet filtering practices in more than three dozen countries, offering the first rigorously conducted study of an accelerating trend. Internet filtering tak... [Read More]

    • ASIN: 0262541963
    • ASIN: 0262541963
    • ISBN: 9780262541961
    • Manufacturer: The MIT Press

  • A New Approach to the Nuclear Fuel Cycle: Best Practices for Security, Nonproliferation, and Sustainable Nuclear Energy (CSIS Reports)

    The Nuclear Threat Initiative and the Center for Strategic and International Studies joined to launch the New Approaches to the Fuel Cycle project. This project sought to build consensus on common goals, address practical challenges, and engage a spectrum of actors that influence policymaking regarding the nuclear fuel cycle. The project also tackled one of the toughest issues—spent nuclear fuel and high level waste—to see if solutions there might offer incentives to states on the front end of the nuclear fuel cycle and address the inherent inertia and concerns about additional burdens and... [Read More]

    • ASIN: 1442240539
    • ASIN: 1442240539
    • ISBN: 1442240539
    • Manufacturer: Center for Strategic & International Studies

  • Information Security Policies, Procedures, and Standards: A Practitioner's Reference

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are develo... [Read More]

    • ASIN: 1482245892
    • ASIN: 1482245892
    • ISBN: 1482245892
    • Brand: Taylor Francis
    • Manufacturer: Auerbach Publications

  • Oman's Foreign Policy: Foundation and Practice (Praeger Security International)

    This is the first book in more than a decade to look systematically at the foundations and practices of Oman's foreign policy and its impact on the production and distribution of oil.

    • ASIN: 0313352240
    • ASIN: 0313352240
    • ISBN: 0313352240
    • Manufacturer: Praeger

  • Security Policies and Procedures: Principles and Practices

    Security Policies and Procedures: Principles and Practices was created to teach information security policies and procedures and provide students with hands-on practice developing a security policy.This book provides an introduction to security policy, coverage of information security regulation and framework, and policies specific to industry sectors, including financial, healthcare and small business.

    • ASIN: 0131866915
    • ASIN: 0131866915
    • ISBN: 0131866915
    • Manufacturer: Prentice Hall

  • CompTIA Security+ Certification Practice Exams, Second Edition (Exam SY0-401) (Certification Press)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Don't Let the Real Test Be Your First Test!Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.CompTIA Security+ Certification Practice Exams,Second Edition (Exam SY0-401) is filled with more than 800 realistic practice questions--including new pe... [Read More]

    • ASIN: 0071833447
    • ASIN: 0071833447
    • ISBN: 0071833447
    • Brand: McGraw-Hill Osborne Media
    • Manufacturer: McGraw-Hill Education

  • Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide - Law Enforcement and First Responder Coordination; Run, Hide, Fight Response Plan

    The primary mission of the ISC Active Shooter Working Group is to streamline existing ISC documents on active shooter into one cohesive policy and guidance document that agencies housed in Federal facilities can use as a reference to enhance prevention, protection, mitigation, response, and recovery efforts related to an active shooter incident. The goal of the ISC's Active Shooter Working Group is to promote the highest chance of victim and responder survivability through awareness, prevention, education, and training. This guidance is designed to be applicable to all buildings and facilities... [Read More]

    • ASIN: 1983094129
    • ASIN: 1983094129
    • ISBN: 1983094129
    • Manufacturer: Independently published

  • Information Security Best Practices: 205 Basic Rules

    Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also es... [Read More]

    • ASIN: 1878707965
    • ASIN: 1878707965
    • ISBN: 1878707965
    • Brand: Brand: Butterworth-Heinemann
    • Manufacturer: Butterworth-Heinemann

  • Social Security Law, Policy, and Practice (American Casebook Series)

    This casebook covers Social Security law and practice, including selected current policy issues related to the scope and administration of the program. The book begins with an introductory chapter that places the Social Security Act in its historical and constitutional context. It also explores the future of Social Security with a brief discussion of selected contemporary policy issues. The remainder of the book can be divided into two parts. The first part consists of chapters on the eligibility requirements for benefits, including both financial and categorical criteria. The second part focu... [Read More]

    • ASIN: 1634603591
    • ASIN: 1634603591
    • ISBN: 1634603591
    • Manufacturer: West Academic Publishing

  • Microsoft Azure Security Center (IT Best Practices - Microsoft Press)

    Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and ri... [Read More]

    • ASIN: B07D5J97JV
    • ASIN: B07D5J97JV
    • Manufacturer: Microsoft Press

  • Information Governance: Concepts, Strategies and Best Practices (Wiley CIO)

    The essential guide to effective IG strategy and practice Information Governance is a highly practical and deeply informative handbook for the implementation of effective Information Governance (IG) procedures and strategies. A critical facet of any mid- to large-sized company, this “super-discipline” has expanded to cover the management and output of information across the entire organization; from email, social media, and cloud computing to electronic records and documents, the IG umbrella now covers nearly every aspect of your business. As more and more everyday business is conducted el... [Read More]

    • ASIN: 1119491444
    • ASIN: 1119491444
    • ISBN: 1119491444
    • Manufacturer: Wiley

  • Education Law, Policy, and Practice, Third Edition (Aspen Casebook)

    Challenging students to question the political and philosophical assumptions underlying the law, Education Law, Policy, and Practice promotes a depth of understanding about the key cases and statutes. The authors integrate the law with policy and practice, following related political, financial, and practical issues. The law is presented through a teachable mix of key cases and materials on the practice and political aspects of school law, and an effective macro organization helps place topics into an integrated framework. Each of the major issues in education law is discussed at length: the b... [Read More]

    • ASIN: 1454825081
    • ASIN: 1454825081
    • ISBN: 1454825081
    • Manufacturer: Aspen Publishers

  • Foundations of Homeland Security: Law and Policy

    This book is the complete guide to understanding the structure of homeland security – its underlying law and policy. Created from a broad and in depth, yet edited collection of statutes, policy papers, presidential directives, and other documents, it cultivates a detailed understanding of the foundations of homeland security. It is arranged in a topic-by-topic format structured to include only the documents and statues that affect a particular subject, making for much easier understanding. Thus, the chapter on FEMA contains only the portions of the statutes and other documents that relate to... [Read More]

    • ASIN: 0470596988
    • ASIN: 0470596988
    • ISBN: 0470596988
    • Manufacturer: Wiley

  • Chinese Foreign Policy: Theory and Practice (Studies on Contemporary China)

    What decision making process is used by the People's Republic of China in forming its foreign policy? Has this process changed at all in recent years, and what can the world expect in their relations with China after Deng Xiaoping? This work offers and unprecedented survey of China's foreign relations since 1949. The contributors include leading historians, economists, and political scientists in the field of Chinese studies, as well as noteworthy international relations specialists. Beginning with an analysis of the historical, perceptual, economic, and political sources of Chinese foreign po... [Read More]

    • ASIN: 0198290160
    • ASIN: 0198290160
    • ISBN: 9780198290162
    • Manufacturer: Clarendon Press

  • Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide - Law Enforcement and First Responder Coordination; Run, Hide, Fight Response Plan - eBook

    This report has been professionally converted for accurate flowing-text e-book format reproduction.The primary mission of the ISC Active Shooter Working Group is to streamline existing ISC documents on active shooter into one cohesive policy and

    • UPC: 214608808

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • What a Security Guard Needs to Know for Best Practices

    What a Security Guard Needs to Know for Best

    • UPC: 352302178

  • Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work - eBook

    Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate

    • UPC: 917148583

  • Security Program and Policies : Principles and Practices

    Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today's challenges, laws, regulations,

    • UPC: 24751909

  • IIS Best Practices and Security Hardening: A Straightforward Guide to a Successful and Secure Deployment of IIS

    IIS Best Practices and Security Hardening: A Straightforward Guide to a Successful and Secure Deployment of

    • UPC: 834053743

  • Best Practices for Investment Committees - eBook

    An indispensable guide to avoiding the legal and financial pitfalls and of retirement plan investmentWhile it has always been true that a well-staffed and managed investment committee is key to the success of a corporate

    • UPC: 162171780

  • America's Voluntary Standards System : A 'Best Practice' Model for Asian Innovation Policies?

    New

    • UPC: 53371897

  • Security Operations Best Practices

    Security Operations Best Practices

    • UPC: 433277143

  • Army Cyber Mission Force: Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices - eBook

    The 2010 US Army Training and Doctrine Commands Concept Capability Plan for Cyberspace Operations directed the Army to begin development of a Cyber Mission Force. The direction to build a Cyber Mission Force followed a

    • UPC: 231330152

  • Tutorial: Configuring Your Security Policy

    Password Security Best Practices

    Get Started with Well-Architected Security Best Practices - AWS Online Tech Talks