• The Practice of System and Network Administration: Volume 1: DevOps and other Best Practices for Enterprise IT (3rd Edition)

    With 28 new chapters, the third edition of The Practice of System and Network Administration innovates yet again! Revised with thousands of updates and clarifications based on reader feedback, this new edition also incorporates DevOps strategies even for non-DevOps environments.   Whether you use Linux, Unix, or Windows, this new edition describes the essential practices previously handed down only from mentor to protégé. This wonderfully lucid, often funny cornucopia of information introduces beginners to advanced frameworks valuable for their entire career, yet is structured to help e... [Read More]

    • ASIN: 0321919165
    • ASIN: 0321919165
    • ISBN: 9780321919168
    • Brand: imusti
    • Manufacturer: Addison-Wesley Professional

  • Drupal Security Best Practices: A Practical Guide

    In looking at the resources available on Drupal security, we found that none of the available resources provided a regularly updated, holistic view. Web security is a complex subject and new challenges are arising all of the time. We saw the need for a resource that would allow Systems Administrators and Web Developers to have a practical view of what they can do to secure their systems. This book is filled with resources to help people security experts understand Drupal & Drupal experts to better understand security.For more information on Drupal security, see http://openconcept.ca

    • ASIN: B015EH48MO
    • ASIN: B015EH48MO
    • Manufacturer: OpenConcept Consulting Inc.

  • Linux Server Security: Tools & Best Practices for Bastion Hosts

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as ... [Read More]

    • ASIN: 0596006705
    • ASIN: 0596006705
    • ISBN: 0596006705
    • Brand: Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • Embedded Systems Architecture: Explore architectural concepts, pragmatic design patterns, and best practices to produce robust systems

    A comprehensive guide to reaping the benefits of architectural modeling in embedded designKey FeaturesIdentify and overcome challenges in embedded environmentsUnderstand the steps required to increase the security of IoT solutionsBuild safety-critical and memory-safe parallel and distributed embedded systemsBook DescriptionEmbedded systems are self-contained units that have a dedicated purpose within a device. We come across a variety of applications of embedded systems in navigation tools, telecom applications, and networking equipment, to name just a few.Embedded Systems Architecture begins ... [Read More]

    • ASIN: 1788832507
    • ASIN: 1788832507
    • ISBN: 1788832507
    • Manufacturer: Packt Publishing - ebooks Account

  • CompTIA Security+ SYO-401 Exam Cram (4th Edition)

    CompTIA® Security+ Exam Cram, Fourth Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for every exam topic. The book contains a set of 200 questions in two full practice exams. The CD-ROM contains the powerful Pearson IT Certification Practice Test engine that provides real-time practice and feedback with all the questions so you can simulate the exam. Covers the critical information you need to know to score higher on your Security+ exam! --Categorize types of attacks, threats, an... [Read More]

    • ASIN: 0789753340
    • ASIN: 0789753340
    • ISBN: 0789753340
    • Manufacturer: Pearson IT Certification

  • A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

    Information technology is an increasingly large factor in legal proceedings. From large cases, such as the US Government's anti-trust suit against the Microsoft Corporation, to small civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical expert is essential. But an understanding of the technology in question is not enough; an expert technical witness needs to understand much more in order to ensure the effectiveness of his or her testimony.

    • ASIN: 0201752794
    • UPC: 880310457776
    • ASIN: 0201752794
    • ISBN: 0201752794
    • Manufacturer: Addison-Wesley Professional

  • FreeBSD Device Drivers: A Guide for the Intrepid

    Device drivers make it possible for your software to communicate with your hardware, and because every operating system has specific requirements, driver writing is nontrivial. When developing for FreeBSD, you've probably had to scour the Internet and dig through the kernel sources to figure out how to write the drivers you need. Thankfully, that stops now. In FreeBSD Device Drivers, Joseph Kong will teach you how to master everything from the basics of building and running loadable kernel modules to more complicated topics like thread synchronization. After a crash course in the different Fre... [Read More]

    • ASIN: 1593272049
    • UPC: 689145720495
    • ASIN: 1593272049
    • ISBN: 9781593272043
    • Brand: Brand: No Starch Press
    • Manufacturer: No Starch Press

  • RHCSA/RHCE Red Hat Linux Certification Study Guide, Seventh Edition (Exams EX200 & EX300)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Based on Red Hat Enterprise Linux 7, the new edition of this bestselling study guide covers the updated Red Hat Certified System Administrator (RHCSA) and Red Hat Certified Engineer (RHCE) exams. RHCSA/RHCE Red Hat Linux Certification Study Guide, 7th Edition is fully revised to cover the recently released Red Hat Enterprise Linux 7 and the corresponding RHCSA and RHCE certification exams. This new edition pr... [Read More]

    • ASIN: 0071841962
    • ASIN: 0071841962
    • ISBN: 0071841962
    • Brand: McGraw-Hill Education
    • Manufacturer: McGraw-Hill Education

  • The Hacker Playbook 2: Practical Guide To Penetration Testing

    Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing�... [Read More]

    • ASIN: 1512214566
    • ASIN: 1512214566
    • ISBN: 1512214566
    • Brand: Kim Peter
    • Manufacturer: CreateSpace Independent Publishing Platform

  • Infrastructure as Code: Managing Servers in the Cloud

    Virtualization, cloud, containers, server automation, and software-defined networking are meant to simplify IT operations. But many organizations adopting these technologies have found that it only leads to a faster-growing sprawl of unmanageable systems. This is where infrastructure as code can help. With this practical guide, author Kief Morris of ThoughtWorks shows you how to effectively use principles, practices, and patterns pioneered through the DevOps movement to manage cloud age infrastructure.Ideal for system administrators, infrastructure engineers, team leads, and architects, this b... [Read More]

    • ASIN: 1491924357
    • ASIN: 1491924357
    • ISBN: 1491924357
    • Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • LINUX: Learn Linux FAST! Ultimate Course Book for Beginners (Includes Practice Activities)

    "The PERFECT Kali Linux Tool-Kit"Buy It Now For $9.99 $2.99 (70% Off)☆★☆ Read This Hacking Book for FREE on Kindle Unlimited ~ Download Now! ☆★☆*OFFER* Buy a paperback copy of this linux book and receive the Kindle version for only .99 cents!Are you ready to enhancing your computer hacking experience? Learn how to use Linux OS today! "Linux: Learn Linux FAST! The Ultimate Course Book for Beginners" is the Perfect Starting Zone to Master the Linux operating system. This information will take your computer usage experience to the Next Level. "Linux: Learn Linux FAST! The Ultimate Cou... [Read More]

    • ASIN: B01MSMQ2SD
    • ASIN: B01MSMQ2SD

  • CompTIA A+ Certification All-in-One Exam Guide, Ninth Edition (Exams 220-901 & 220-902)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This bestselling on-the-job reference and test preparation guide has been fully revised for the new 2015 CompTIA A+ exam objectives for exams 901 & 902Written by the leading authority on CompTIA A+ certification and training, this self-study book and CD has been thoroughly updated to cover 100% of the exam objectives on the 2015 CompTIA A+ exams. New topics include managing and maintaining cellular devices, ... [Read More]

    • ASIN: 125958951X
    • ASIN: 125958951X
    • ISBN: 125958951X
    • Brand: McGraw-Hill Osborne Media
    • Manufacturer: McGraw-Hill Education

  • Hacking: The Ultimate Beginners Guide To Learn and Understand Hacking Effectively

    The world of technology is quickly changing the world we live in. We are in a world where things are progressing at a rapid pace, and it is common to carry all of our information around with us wherever we may go. This may make things more convenient, but it does bring in some issues that can compromise our security if we are not careful. This guidebook will go into detail and talk about the basics of hacking and how you can learn to protect your own personal information from cyberattacks. Inside this guidebook, we will discuss a lot of important aspects of hacking such as:•The basics of ha... [Read More]

    • ASIN: B07BLMPPJP
    • ASIN: B07BLMPPJP

  • Unix security Toolkit: best-practice templates, step-by-step work plans and maturity diagnostics

    The Toolkit contains the following practical and powerful enablers with new and updated Unix security specific requirements:Step 1 get your bearings resources: The quick edition of the Unix security Self Assessment book in PDF containing 49 requirements to perform a quickscan, get an overview and share with stakeholders, plus an example pre-filled Self-Assessment Excel Dashboard to get familiar with results generation. Step 2 set concrete goals resources: Featuring 660 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you id... [Read More]

    • ASIN: B07B78FWWY
    • UPC: 012868262940
    • ASIN: B07B78FWWY
    • Brand: The Art of Service
    • Manufacturer: The Art of Service

  • Plugable USB Universal Fast 1A Charge-Only Adapter for Android, Apple iOS, and Windows Mobile Devices

    USB Charging InformationMost devices can't/won't charge from normal powered USB hubs if the computer is turned off/not connected. That includes most Android, Apple iOS, and Windows devices. The phone/tablet must negotiate how much power to pull, to do so by the original USB specification, devices are supposed to only draw 100mA at first and then they can then negotiate up to 500mA. This negotiation requires a PC that's attached and on. Unfortunately even at 500mA, charging most devices will take a very long time to charge.For example, the iPhone and most other non-tablets will charge on a stan... [Read More]

    • ASIN: B00FA9GXKM
    • UPC: 819927010265
    • ASIN: B00FA9GXKM
    • Brand: Plugable
    • Manufacturer: Plugable

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide - Law Enforcement and First Responder Coordination; Run, Hide, Fight Response Plan - eBook

    This report has been professionally converted for accurate flowing-text e-book format reproduction.The primary mission of the ISC Active Shooter Working Group is to streamline existing ISC documents on active shooter into one cohesive policy and

    • UPC: 214608808

  • Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work - eBook

    Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate

    • UPC: 917148583

  • Best Practices for Investment Committees - eBook

    An indispensable guide to avoiding the legal and financial pitfalls and of retirement plan investmentWhile it has always been true that a well-staffed and managed investment committee is key to the success of a corporate

    • UPC: 162171780

  • IIS Best Practices and Security Hardening: A Straightforward Guide to a Successful and Secure Deployment of IIS

    IIS Best Practices and Security Hardening: A Straightforward Guide to a Successful and Secure Deployment of

    • UPC: 834053743

  • Army Cyber Mission Force: Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices - eBook

    The 2010 US Army Training and Doctrine Commands Concept Capability Plan for Cyberspace Operations directed the Army to begin development of a Cyber Mission Force. The direction to build a Cyber Mission Force followed a

    • UPC: 231330152

  • Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning - eBook

    Two excellent reports have been professionally converted for accurate flowing-text e-book format reproduction.Book 1: Cybersecurity Capability Maturity Model White Paper - Cybersecurity is a leading national security challenge facing this country today. An emerging topic

    • UPC: 175775309

  • What a Security Guard Needs to Know for Best Practices

    What a Security Guard Needs to Know for Best

    • UPC: 352302178

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert Greatest Tips - eBook

    There has never been a CCNA Guide like this. Whether you're a beginner or experienced, you need to know the basics of CCNA. This book can teach you everything fundamental you need to know. It

    • UPC: 812622361

  • A Modern Take on Best Practices for Unix Linux Security

    Securing Linux Servers - Best Practices & Troubleshooting Learn at Networknuts

    Unix Security: Stop leaving your most sensitive assets and credentials at risk