• AWS: Security Best Practices on AWS: Learn to secure your data, servers, and applications with AWS

    Delve deep into various security aspects of AWS to build and maintain a secured environmentKey FeaturesLearn to secure your network, infrastructure, data, and applications in AWS cloudUse AWS managed security services to automate securityDive deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secured environmentExplore Cloud Adoption Framework (CAF) and its componentsEmbedded with assessments that will help you revise the concepts you have learned in this bookBook DescriptionWith organizations moving their workloads, applic... [Read More]

    • ASIN: 178913451X
    • ASIN: 178913451X
    • ISBN: 178913451X
    • Manufacturer: Packt Publishing

  • Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity... [Read More]

    • ASIN: B01GP09AS6
    • ASIN: B01GP09AS6
    • Manufacturer: O'Reilly Media

  • Defensive Security Handbook: Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastruc... [Read More]

    • ASIN: 1491960388
    • ASIN: 1491960388
    • ISBN: 9781491960387
    • Brand: OREILLY
    • Manufacturer: O'Reilly Media

  • Microsoft Azure Security Center (IT Best Practices - Microsoft Press)

    Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and ri... [Read More]

    • ASIN: B07D5J97JV
    • ASIN: B07D5J97JV
    • Manufacturer: Microsoft Press

  • The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations

    Increase profitability, elevate work culture, and exceed productivity goals through DevOps practices.More than ever, the effective management of technology is critical for business competitiveness. For decades, technology leaders have struggled to balance agility, reliability, and security. The consequences of failure have never been greater―whether it's the healthcare.gov debacle, cardholder data breaches, or missing the boat with Big Data in the cloud.And yet, high performers using DevOps principles, such as Google, Amazon, Facebook, Etsy, and Netflix, are routinely and reliably deploying ... [Read More]

    • ASIN: 1942788002
    • ASIN: 1942788002
    • ISBN: 1942788002
    • Brand: IT REVOLUTION
    • Manufacturer: IT Revolution Press

  • Microsoft Azure Security Infrastructure (IT Best Practices - Microsoft Press)

    This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.   Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure ,1/e  three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to he... [Read More]

    • ASIN: B01L9D1NH0
    • ASIN: B01L9D1NH0
    • Manufacturer: Microsoft Press

  • Eleventh Hour CISSP®: Study Guide

    Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. ... [Read More]

    • ASIN: 0128112484
    • ASIN: 0128112484
    • ISBN: 0128112484
    • Manufacturer: Syngress

  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an ... [Read More]

    • ASIN: 1593275099
    • ASIN: 1593275099
    • ISBN: 1593275099
    • Brand: Brand: No Starch Press
    • Manufacturer: No Starch Press

  • The Security Development Lifecycle (Developer Best Practices)

    Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL—from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organizat... [Read More]

    • ASIN: 0735622140
    • ASIN: 0735622140
    • ISBN: 9780735622142
    • Manufacturer: Microsoft Press

  • Option Volatility and Pricing: Advanced Trading Strategies and Techniques, 2nd Edition

    WHAT EVERY OPTION TRADER NEEDS TO KNOW. THE ONE BOOK EVERY TRADER SHOULD OWN. The bestselling Option Volatility & Pricing has made Sheldon Natenberg a widely recognized authority in the option industry. At firms around the world, the text is often the first book that new professional traders are given to learn the trading strategies and risk management techniques required for success in option markets. Now, in this revised, updated, and expanded second edition, this thirty-year trading professional presents the most comprehensive guide to advanced trading strategies and techniques now in print... [Read More]

    • ASIN: 0071818774
    • ASIN: 0071818774
    • ISBN: 0071818774
    • Manufacturer: McGraw-Hill Education

  • RHCSA/RHCE Red Hat Linux Certification Study Guide, Seventh Edition (Exams EX200 & EX300)

    Based on Red Hat Enterprise Linux 7, the new edition of this bestselling study guide covers the updated Red Hat Certified System Administrator (RHCSA) and Red Hat Certified Engineer (RHCE) exams. RHCSA/RHCE Red Hat Linux Certification Study Guide, 7th Edition is fully revised to cover the recently released Red Hat Enterprise Linux 7 and the corresponding RHCSA and RHCE certification exams. This new edition provides complete coverage of all official exam objectives for the new exams. An integrated study system based on proven pedagogy, this revised bestseller features special elements that rein... [Read More]

    • ASIN: B01DB3H8AM
    • ASIN: B01DB3H8AM
    • Manufacturer: McGraw-Hill Education

  • Charting and Technical Analysis

    To invest successfully or trade in Stocks, Options, Forex, or even Mutual Funds, it is imperative to know AND understand price and market movements that can only be learned from Technical Analysis. You should NEVER attempt Trading or Investing without it!My 25 years experience has taught me that 'every book on the market' regarding Charting and Technical Analysis is seemingly worthless. All seem to find yet another creative way to tell you to “Buy Low and Sell High.” And they offer NO in-depth understanding or analysis about WHO is buying and WHO is selling, and when.Point is, anyone, expe... [Read More]

    • ASIN: 1456468693
    • ASIN: 1456468693
    • ISBN: 1456468693
    • Brand: Brand: CreateSpace Independent Publishing Platform
    • Manufacturer: CreateSpace Independent Publishing Platform

  • Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery (The Morgan Kaufmann Series in Data Management Systems)

    Transactional Information Systems is the long-awaited, comprehensive work from leading scientists in the transaction processing field. Weikum and Vossen begin with a broad look at the role of transactional technology in today's economic and scientific endeavors, then delve into critical issues faced by all practitioners, presenting today's most effective techniques for controlling concurrent access by multiple clients, recovering from system failures, and coordinating distributed transactions. The authors emphasize formal models that are easily applied across fields, that promise to remain val... [Read More]

    • ASIN: 1558605088
    • ASIN: 1558605088
    • ISBN: 1558605088
    • Manufacturer: Morgan Kaufmann

  • Alan Ellman's Selling Cash-Secured Puts: Investing to Generate Monthly Cash Flow

    Using stocks and stock options to develop a low-risk, wealth-building strategy for retail investors. Selling puts is a strategy similar to, but not precisely the same as, covered call writing. Mastering either strategy is a huge opportunity for retail investors to secure our financial futures. Mastering both will allow us focus in on the best investment choices depending on market conditions and personal risk tolerance. --- -- --- About This Book: The purpose of this book is to give the reader the tools to master a conservative stock and option strategy with the goals of generating monthly cas... [Read More]

    • ASIN: B00QXQQW5C
    • ASIN: B00QXQQW5C
    • Manufacturer: Digital Publishing of Florida

  • Threat Modeling: Designing for Security

    The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs aga... [Read More]

    • ASIN: 1118809998
    • UPC: 001118809998
    • ASIN: 1118809998
    • ISBN: 1118809998
    • Brand: imusti
    • Manufacturer: Wiley

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide - Law Enforcement and First Responder Coordination; Run, Hide, Fight Response Plan - eBook

    This report has been professionally converted for accurate flowing-text e-book format reproduction.The primary mission of the ISC Active Shooter Working Group is to streamline existing ISC documents on active shooter into one cohesive policy and

    • UPC: 214608808

  • Big Data : Principles and Best Practices of Scalable Realtime Data Systems

    Teaches readers how to build big data systems using Lambda Architecture, an architecture designed specifically to capture and analyze web-scale

    • UPC: 21851283
    • Rating: 5.0

  • Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work - eBook

    Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate

    • UPC: 917148583

  • IIS Best Practices and Security Hardening: A Straightforward Guide to a Successful and Secure Deployment of IIS

    IIS Best Practices and Security Hardening: A Straightforward Guide to a Successful and Secure Deployment of

    • UPC: 834053743

  • Best Practices for Investment Committees - eBook

    An indispensable guide to avoiding the legal and financial pitfalls and of retirement plan investmentWhile it has always been true that a well-staffed and managed investment committee is key to the success of a corporate

    • UPC: 162171780

  • Data at Work : Best Practices for Creating Effective Charts and Information Graphics in Microsoft Excel

    Information visualization is a language. Like any language, it can be used for multiple purposes. A poem, a novel, and an essay all share the same language, but each one has its own set of

    • UPC: 46510716

  • Agile Architektur mit .NET - Grundlagen und Best Practices - eBook

    Agile Vorgehensmodelle sind aus der modernen Softwareentwicklung nicht mehr wegzudenken. Kurze Entwicklungszyklen und sich stetig ändernde Anforderungen stellen insbesondere für Softwarearchitekten eine besondere Herausforderung dar. Big Upfront Design war gestern. Die Architektur des Systems muss

    • UPC: 321585229

  • Army Cyber Mission Force: Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices - eBook

    The 2010 US Army Training and Doctrine Commands Concept Capability Plan for Cyberspace Operations directed the Army to begin development of a Cyber Mission Force. The direction to build a Cyber Mission Force followed a

    • UPC: 231330152

  • Identity and Data Security for Web Development : Best Practices, Paperback by...

    • UPC: 382718896213
    • Category: Nonfiction
    • Price: 40 USD

  • Identity and Data Security for Web Development: Best Practices by Jonathan LeBla

    • UPC: 361607220085
    • Category: Nonfiction
    • Price: 44 USD

  • Information Technology Security Audit Best Practices A Complete Guide - 2020 Edi

    • UPC: 392624784072
    • Category: Nonfiction
    • Price: 110 USD

  • Foundations of information security (Best Practice) by Hintzbergen, Jule (Pap…

    • UPC: 383459629153
    • Category: Nonfiction
    • Price: 64 USD

  • Information Security: Best Practice Methods for Protecting Your Business (IOD ,

    • UPC: 132755927424
    • Category: Non-Fiction
    • Price: 2 GBP

  • AWS: Security Best Practices on AWS: Learn to secure your data, servers, and app

    • UPC: 174193337032
    • Category: Non-fiction
    • Price: 54 EUR

  • Information Security Best Practices: 205 Basic Rules by Stefanek - IT, Admin

    • UPC: 233462808331
    • Category: Adult Learning & University
    • Price: 4 USD

  • AWS: Security Best Practices on AWS: Learn to secure your data, servers, and app

    • UPC: 362353934999
    • Category: Adult Learning & University
    • Price: 54 USD

  • Information Security Best Practices : 205 Basic Rules by Stefanek, George L.

    • UPC: 223818604426
    • Category: Adult Learning & University
    • Price: 10 USD

  • Information System Security Best Practices for Uocava- Supporting Systems by U.S

    • UPC: 391835226567
    • Category: Dictionaries & Reference
    • Price: 19 USD

  • Microsoft shares tips on how to secure your identity against cybersecurity threats

    Great data heists and data security best practices - THR2283

    Data Security Best Practices and Solutions