• Defensive Security Handbook: Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastruc... [Read More]

    • ASIN: 1491960388
    • ASIN: 1491960388
    • ISBN: 9781491960387
    • Brand: OREILLY
    • Manufacturer: O'Reilly Media

  • Third Eye Awakening: 5 in 1 Bundle: Open Your Third Eye Chakra, Expand Mind Power, Psychic Awareness, Enhance Psychic Abilities, Pineal Gland, Intuition, and Astral Travel

    **Buy the paperback version of this book and get the kindle version FREE**The third eye chakra is the center to your intuition and psychic abilities. It holds certain powers that most people never even thought were possible or available to them. The third eye and the pineal gland complement each other and the power of both lie dormant, in most people, for all of their lives. But simple focusing and meditation techniques can help to open a dormant third eye...This 5-in-1-Bundle series includes the following 5 books:1. Third Eye Awakening: Guided Meditation to Open Your Third Eye, Ex... [Read More]

    • ASIN: B077ZYD8BF
    • ASIN: B077ZYD8BF

  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an ... [Read More]

    • ASIN: 1593275099
    • ASIN: 1593275099
    • ISBN: 1593275099
    • Brand: Brand: No Starch Press
    • Manufacturer: No Starch Press

  • Building Secure and Reliable Systems: SRE and Security Best Practices

    Can a system ever truly be considered reliable if it isn't fundamentally secure?In two previous O'Reilly books, experts from Google showed how reliability is fundamental to service design. Site Reliability Engineering and The Site Reliability Workbook demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems.Security is also crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, reliability, and availability. In a... [Read More]

    • ASIN: 1492083127
    • ASIN: 1492083127
    • ISBN: 1492083127
    • Manufacturer: O'Reilly Media

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It


    • ASIN: B00N6PCZMC
    • ASIN: B00N6PCZMC
    • Manufacturer: Anchor

  • Threat Modeling: Designing for Security

    The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs aga... [Read More]

    • ASIN: 1118809998
    • UPC: 001118809998
    • ASIN: 1118809998
    • ISBN: 1118809998
    • Brand: imusti
    • Manufacturer: Wiley

  • Writing Secure Code, Second Edition (Developer Best Practices)

    Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes u... [Read More]

    • ASIN: 0735617228
    • UPC: 790145172280
    • ASIN: 0735617228
    • ISBN: 0735617228
    • Brand: Microsoft
    • Manufacturer: Microsoft Press

  • SFPE Handbook of Fire Protection Engineering

    Revised and significantly expanded, the fifth edition of this classic work offers both new and substantially updated information. As the definitive reference on fire protection engineering, this book provides thorough treatment of the current best practices in fire protection engineering and performance-based fire safety. Over 130 eminent fire engineers and researchers contributed chapters to the book, representing universities and professional organizations around the world. It remains the indispensible source for reliable coverage of fire safety engineering fundamentals, fire dynamics, hazar... [Read More]

    • ASIN: 1493925644
    • ASIN: 1493925644
    • ISBN: 1493925644
    • Manufacturer: Springer

  • New Technology, Big Data and the Law (Perspectives in Law, Business and Innovation)

    This edited collection brings together a series of interdisciplinary contributions in the field of Information Technology Law. The topics addressed in this book cover a wide range of theoretical and practical legal issues that have been created by cutting-edge Internet technologies, primarily Big Data, the Internet of Things, and Cloud computing. Consideration is also given to more recent technological breakthroughs that are now used to assist, and ― at times ― substitute for, human work, such as automation, robots, sensors, and algorithms. The chapters presented in this edition address t... [Read More]

    • ASIN: 9811050376
    • ASIN: 9811050376
    • ISBN: 9789811050374
    • Manufacturer: Springer

  • Water is for Fighting Over: and Other Myths about Water in the West

    "Illuminating." —New York TimesWIRED's Required Science Reading 2016When we think of water in the West, we think of conflict and crisis. In recent years, newspaper headlines have screamed, “Scarce water and the death of California farms,” “The Dust Bowl returns,” “A ‘megadrought’ will grip U.S. in the coming decades.” Yet similar stories have been appearing for decades and the taps continue to flow. John Fleck argues that the talk of impending doom is not only untrue, but dangerous. When people get scared, they fight for the last drop of water; but when they actually have... [Read More]

    • ASIN: B01IY20IZ2
    • ASIN: B01IY20IZ2
    • Manufacturer: Island Press

  • Information Security: Principles and Practices (2nd Edition) (Certification/Training)

    Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, in One Book Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)² CBK]. Thoroughly updated for today’s challenges, technologies, procedures, and best practices. The perfect resource for anyone pursuing an IT security career.   Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains o... [Read More]

    • ASIN: 0789753251
    • ASIN: 0789753251
    • ISBN: 0789753251
    • Brand: Pearson IT Certification
    • Manufacturer: Pearson IT Certification

  • Guard Your ID Advanced Roller Identity Theft Protection for Confidential Security Stamp (Regular 3-Pack, Mixed Color: Green, White, Turquoise)

    Ideal for hiding addresses and personal data from paper mail disposal, this handy theft prevention stamp effectively masks typed and handwritten information. Identity theft is the fastest growing crime in America, the Guard Your ID advanced roller helps keep others from seeing your confidential information. Quickly stamp over your personal information and feel confident that it is safe from prying eyes. Easy to Use & Great Alternative to Shredders.

    • ASIN: B06XCV4BCT
    • UPC: 817371017724
    • ASIN: B06XCV4BCT
    • Brand: Plus
    • Size: Regular 3-Pack
    • Manufacturer: PLUS Corporation of America

  • Security Risk Assessment: Managing Physical and Operational Security

    Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-finding process that determines an organization’s state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it’s used, or how to evaluate what they have found. Security Risk Assessment offers securi... [Read More]

    • ASIN: B00MEB4K90
    • ASIN: B00MEB4K90
    • Manufacturer: Butterworth-Heinemann

  • CHST Exam Secrets Study Guide: CHST Test Review for the Construction Health and Safety Technician Exam

    This CHST study guide includes practice test questions. Our study guide contains easy-to-read essential summaries that highlight the key areas of the CHST test. Mometrix's CHST test study guide reviews the most important components of the CHST exam.The CHST Exam is extremely challenging, and thorough test preparation is essential for success. CHST Exam Secrets Study Guide is the ideal prep solution for anyone who wants to pass the CHST.Not only does it provide a comprehensive guide to the CHST Exam as a whole, it also provides practice test questions as well as detailed explanations of each an... [Read More]

    • ASIN: 1609713508
    • ASIN: 1609713508
    • ISBN: 1609713508
    • Manufacturer: Mometrix Media LLC

  • Hypnosis - How to Hypnotize Anyone: The Beginner's Guide to Hypnotism - Includes the History of Hypnosis, How Hypnotism Works, The Dark Side of Hypnosis, ... How to Hypnotize Anyone, Anywhere, Anytime

    If you’ve ever been interested in the powerful science of hypnotism or becoming a hypnotist, you’ve come to the right place.By the end of this book you will be able to hypnotize anyone, literally!The history of hypnosis is discussed, bringing you all the way to how you can hypnotize someone anywhere, anyplace, at anytime. You will learn the definition of hypnotism, as well as how it was used historically, and how it is used today.The dark side of hypnosis will also be investigated, to some degree.The book will give you an overview of some of the terrible and frightening ways that hypnotism... [Read More]

    • ASIN: B07KGKJT95
    • ASIN: B07KGKJT95
    • Manufacturer: CAC Publishing LLC

  • Big Data : Principles and Best Practices of Scalable Realtime Data Systems

    Teaches readers how to build big data systems using Lambda Architecture, an architecture designed specifically to capture and analyze web-scale

    • UPC: 21851283
    • Rating: 5.0

  • Data Modeling Master Class Training Manual 7th Edition : Steve Hoberman's Best Practices Approach to Understanding and Applying Fundamentals Through Advanced Modeling Techniques

    This is the seventh edition of the training manual for the Data Modeling Master Class that Steve Hoberman teaches onsite and through public

    • UPC: 405934151

  • Developing Data Migrations and Integrations with Salesforce: Patterns and Best Practices (Paperback)

    9781484242087

    • UPC: 843371572

  • Data at Work : Best Practices for Creating Effective Charts and Information Graphics in Microsoft Excel

    Information visualization is a language. Like any language, it can be used for multiple purposes. A poem, a novel, and an essay all share the same language, but each one has its own set of

    • UPC: 46510716

  • Best Practices in Data Cleaning : A Complete Guide to Everything You Need to Do Before and After Collecting Your Data

    Many researchers jump from data collection directly into testing hypothesis without realizing these tests can go profoundly wrong without clean data. This book provides a clear, accessible, step-by-step process of important best practices in preparing

    • UPC: 16825709

  • Agile Architektur mit .NET - Grundlagen und Best Practices - eBook

    Agile Vorgehensmodelle sind aus der modernen Softwareentwicklung nicht mehr wegzudenken. Kurze Entwicklungszyklen und sich stetig ändernde Anforderungen stellen insbesondere für Softwarearchitekten eine besondere Herausforderung dar. Big Upfront Design war gestern. Die Architektur des Systems muss

    • UPC: 321585229

  • Data Analytics : 4 Books in 1- Bible of 4 Manuscipts- Beginner's Guide+ Tips and Tricks+ Effective Strategies+ Best Practices to Learn Data Analytics Efficiently

    It doesn't matter if your business has three employees or three hundred, you are likely generating far more information that you may realize, and certainly far more than you are likely tracking effectively. Understanding what

    • UPC: 684237095

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • Best Practices for Environmental Health : Environmental Pollution, Protection, Quality and Sustainability

    9781138196407

    • UPC: 55219484

  • Practical Web Scraping for Data Science : Best Practices and Examples with Python

    This book provides a complete and modern guide to web scraping, using Python as the programming language, without glossing over important details or best practices. Written with a data science audience in mind, the book

    • UPC: 716883063

  • Best Practices for Data Protection and Privacy : Leading Lawyers on Creating...

    • UPC: 193017696824
    • Category: Adult Learning & University
    • Price: 171 USD

  • Information Security: Best Practice Methods for Protecting Your Business (IOD ,

    • UPC: 132755927424
    • Category: Non-Fiction
    • Price: 2 GBP

  • Data Protection Best Practices with EBS Snapshots - AWS Online Tech Talks

    AWS re:Invent 2018: Data Protection Best Practices for AWS (DEM76)

    8 Best Practices of Data Protection