• Defensive Security Handbook: Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastruc... [Read More]

    • ASIN: 1491960388
    • ASIN: 1491960388
    • ISBN: 9781491960387
    • Brand: OREILLY
    • Manufacturer: O'Reilly Media

  • MotoGP


    • ASIN: B07NZC2CFK
    • ASIN: B07NZC2CFK
    • Brand: Dorna Sports SL
    • Manufacturer: Dorna Sports SL

  • CompTIA A+ Certification All-in-One Exam Guide, Tenth Edition (Exams 220-1001 & 220-1002)

    This bestselling on-the-job reference and test preparation guide has been fully revised for the new 2019 CompTIA A+ exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1001 & 220-1002. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: •Work with CPUs, RAM, BIOS, mother... [Read More]

    • ASIN: B07PPY7P1T
    • ASIN: B07PPY7P1T
    • Manufacturer: McGraw-Hill Education

  • Nolo's Guide to Social Security Disability: Getting & Keeping Your Benefits

    Qualify for Social Security disability benefits, quickly and easily Here’s the step-by-step guidance you need if you’re dealing with a long-term or permanent disability. This comprehensive and compassionate book covers both Social Security Disability Insurance and Supplemental Security Income. Newly updated, it shows you how to prove a disability and explains how your age, education and work experience affect your chances. Parents will find special information about benefits available to children with a disability. Learn how to: find the disability criteria for your medical condition pr... [Read More]

    • ASIN: 1413322239
    • ASIN: 1413322239
    • ISBN: 1413322239
    • Brand: Nolo
    • Manufacturer: NOLO

  • Basic Security Concepts


    • ASIN: B07CM7B2Q3
    • ASIN: B07CM7B2Q3

  • Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity... [Read More]

    • ASIN: B01GP09AS6
    • ASIN: B01GP09AS6
    • Manufacturer: O'Reilly Media

  • Enterprise IoT: Strategies and Best Practices for Connected Products and Services

    Current hype aside, the Internet of Things will ultimately become as fundamental as the Internet itself, with lots of opportunities and trials along the way. To help you navigate these choppy waters, this practical guide introduces a dedicated methodology for businesses preparing to transition towards IoT-based business models.With a set of best practices based on case study analysis, expert interviews, and the authors’ own experience, the Ignite | IoT Methodology outlined in this book delivers actionable guidelines to assist you with IoT strategy management and project execution. You’ll a... [Read More]

    • ASIN: 1491924837
    • ASIN: 1491924837
    • ISBN: 9781491924839
    • Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It


    • ASIN: B00N6PCZMC
    • ASIN: B00N6PCZMC
    • Manufacturer: Anchor

  • CWSP Certified Wireless Security Professional Study Guide: Exam CWSP-205, 2nd Edition

    The most detailed, comprehensive coverage of CWSP-205 exam objectives CWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objectives and gives you access to the Sybex interactive online learning system so you can go into the test fully confident in your skills. Coverage includes WLAN discovery, intrusion and attack, 802.11 protocol analysis, wireless intrusion prevention system implementation, Layer 2 and 3 VPN over 802.11 networks, managed endpoint security ... [Read More]

    • ASIN: 1119211085
    • ASIN: 1119211085
    • ISBN: 1119211085
    • Manufacturer: Sybex

  • The Complete Privacy & Security Desk Reference: Volume I: Digital (Volume 1)

    This textbook, at nearly 500 pages, will explain how to become digitally invisible. You will make all of your communications private, data encrypted, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden. You will remove all personal information from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will take yourself out of 'the system'. You will use covert aliases and misinformation to eliminate current and future threats toward your privacy... [Read More]

    • ASIN: 152277890X
    • ASIN: 152277890X
    • ISBN: 152277890X
    • Manufacturer: CreateSpace Independent Publishing Platform

  • Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)

    THE LEGACY…First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.WHY A THIRD EDITION?The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to ... [Read More]

    • ASIN: 1584885084
    • ASIN: 1584885084
    • ISBN: 1584885084
    • Brand: Chapman Hall CRC
    • Manufacturer: Chapman and Hall/CRC

  • Web Browsing Best Practices


    • ASIN: B01HE5KB2A
    • ASIN: B01HE5KB2A

  • EZVIZ FULL HD 1080p Outdoor IP PoE Surveillance System, 4 Weatherproof HD Security Cameras, 8 Channel 2TB NVR Storage, 100ft Night Vision, Customizable Motion Detection, ONVIF Compliant

    EZVIZ HD 1080p IP PoE Surveillance System Starter Kit – 4 Bullet Cameras + 8 Channel NVR + 2TB Hard Drive View High definition 1080p with 99° wide angle coverage. Night vision up to 100 feet or 65 feet in total darkness. Placement Easy installation security system for your home and business: indoor, outdoor, and in any weather condition. Storage Powerful 8 Channel NVR records all video to a built-in security-grade 2TB hard drive. Add-On 4 included cameras with 8 total available channels. Easily add up to 4 additional EZVIZ cameras as you need them. Setup Each camera in the IP kit can b... [Read More]

    • ASIN: B01682JT82
    • UPC: 813908022780
    • ASIN: B01682JT82
    • Brand: EZVIZ
    • Size: 8 Channels + 4 Cameras
    • Manufacturer: EZVIZ Inc.

  • Mens Nylon Military Tactical Belts Adjustable Outdoor Belt (Black: M-125)

    Quality Service All Jookin customers enjoy 30 Day Money Back Guarantee. Customers can return and get refunded in case the purchasing is not satisfactory for any reason. We will provide the best service until our customers are satisfied. You have no risk to try! ADD TO CART RIGHT NOW!

    • ASIN: B07G8FNLMV
    • UPC: 654913068956
    • ASIN: B07G8FNLMV
    • Brand: Jookin
    • Size: M (Waist 36"-42")

  • SNAPTAIN A15 Foldable FPV WiFi Drone w/Voice Control/120°Wide-Angle 720P HD Camera/Trajectory Flight/Altitude Hold/G-Sensor/3D Flips/Headless Mode/One Key Return/2 Modular Batteries/App Control

    Specification: Control Distance: 90 meters Maximum Flight Relative Height: 30 meters Drone Battery: 3.7V 800mAh(rechargeable) Battery for controller: 3*AAA/1.5V battery (not included) Charge time: About 90 minutes Flight time: 7-9 minutes Video Resolution: 720P Flight Calibration When the drone cannot vertically ascend, move both control sticks towards center of the remote in 45°. Calibration completes when LED light turns solid on from flashing. Intelligent Voice Control Drone Control your drone hands-free with simple voice commands like “take off", "landing", "left", "right", "forward", "... [Read More]

    • ASIN: B07P6PRXLH
    • UPC: 606098235838
    • ASIN: B07P6PRXLH
    • Brand: SNAPTAIN
    • Manufacturer: SNAPTAIN

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Effective Cybersecurity : A Guide to Using Best Practices and Standards

    The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use

    • UPC: 56133768

  • Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide - Law Enforcement and First Responder Coordination; Run, Hide, Fight Response Plan - eBook

    This report has been professionally converted for accurate flowing-text e-book format reproduction.The primary mission of the ISC Active Shooter Working Group is to streamline existing ISC documents on active shooter into one cohesive policy and

    • UPC: 214608808

  • Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work - eBook

    Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate

    • UPC: 917148583

  • Army Cyber Mission Force: Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices - eBook

    The 2010 US Army Training and Doctrine Commands Concept Capability Plan for Cyberspace Operations directed the Army to begin development of a Cyber Mission Force. The direction to build a Cyber Mission Force followed a

    • UPC: 231330152

  • CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert Greatest Tips - eBook

    There has never been a CCNA Guide like this. Whether you're a beginner or experienced, you need to know the basics of CCNA. This book can teach you everything fundamental you need to know. It

    • UPC: 812622361

  • Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning - eBook

    Two excellent reports have been professionally converted for accurate flowing-text e-book format reproduction.Book 1: Cybersecurity Capability Maturity Model White Paper - Cybersecurity is a leading national security challenge facing this country today. An emerging topic

    • UPC: 175775309

  • Best Practices for Investment Committees - eBook

    An indispensable guide to avoiding the legal and financial pitfalls and of retirement plan investmentWhile it has always been true that a well-staffed and managed investment committee is key to the success of a corporate

    • UPC: 162171780

  • Best Practices for commercial use of open source software - eBook

    This book describes the state-of-the-art of creating open source based business models and of managing open source in the development cycle of commercial software and during due diligence in mergers and acquisitions. Practitioners and consultants

    • UPC: 782687022

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • Top 10 Security Best Practices to secure your Microservices - AppSecUSA 2017

    Password Security Best Practices

    Power BI Security Best Practices