• Defensive Security Handbook: Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastruc... [Read More]

    • ASIN: 1491960388
    • ASIN: 1491960388
    • ISBN: 9781491960387
    • Brand: OREILLY
    • Manufacturer: O'Reilly Media

  • Network Defense and Countermeasures: Principles and Practices (3rd Edition) (Pearson IT Cybersecurity Curriculum (ITCC))

    All you need to know about defending networks, in one book ·         Clearly explains concepts, terminology, challenges, tools, and skills ·         Covers key security standards and models for business and government ·         The perfect introduction for all network/computer security professionals and students Welcome to today’s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you’ll need to... [Read More]

    • ASIN: 0789759969
    • ASIN: 0789759969
    • ISBN: 0789759969
    • Manufacturer: Pearson IT Certification

  • Information Security Best Practices: 205 Basic Rules

    Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also es... [Read More]

    • ASIN: 1878707965
    • ASIN: 1878707965
    • ISBN: 1878707965
    • Brand: Brand: Butterworth-Heinemann
    • Manufacturer: Butterworth-Heinemann

  • Microsoft Azure Security Center (IT Best Practices - Microsoft Press)

    Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and ri... [Read More]

    • ASIN: B07D5J97JV
    • ASIN: B07D5J97JV
    • Manufacturer: Microsoft Press

  • Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

    Comprehensive coverage is given in this up-to-date and practical guide to Web services security--the first to cover the final release of new standards SAML 1.1 and WS-Security. Rosenberg and Remy are security experts who co-founded GeoTrust, the #2 Web site certificate authority.

    • ASIN: 0672326515
    • UPC: 752063326510
    • ASIN: 0672326515
    • ISBN: 9780672326516
    • Brand: Brand: Sams Publishing
    • Manufacturer: Sams Publishing

  • CompTIA Security+ Certification Practice Exams, Second Edition (Exam SY0-401) (Certification Press)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Don't Let the Real Test Be Your First Test!Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.CompTIA Security+ Certification Practice Exams,Second Edition (Exam SY0-401) is filled with more than 800 realistic practice questions--including new pe... [Read More]

    • ASIN: 0071833447
    • ASIN: 0071833447
    • ISBN: 0071833447
    • Brand: McGraw-Hill Osborne Media
    • Manufacturer: McGraw-Hill Education

  • The Birth of Plenty: How the Prosperity of the Modern World was Created

    “Compact and immensely readable . . . a tour de force. Prepare to be amazed.” ― John C. Bogle, Founder and Former CEO, The Vanguard Group “Vital―a cogent, timely journey through the economic history of the modern world.” ― Publishers Weekly In The Birth of Plenty, William Bernstein, the bestselling author of The Four Pillars of Investing, presents his provocative, highly acclaimed theory of why prosperity has been the engine of civilization for the last 200 years. This is a fascinating, irresistibly written “big-picture” work that highlights and explains the impact of four ... [Read More]

    • ASIN: 0071747044
    • UPC: 884168779486
    • ASIN: 0071747044
    • ISBN: 9780071747042
    • Brand: McGraw-Hill
    • Manufacturer: McGraw-Hill Education

  • Windows Group Policy Troubleshooting: A Best Practice Guide for Managing Users and PCs Through Group Policy

    Find out how to isolate, understand, and solve problems encountered when managing users and PCs on Windows. Learn from a Microsoft MVP with many years' experience supporting Windows users with their Group Policy issues. This book will help you face the complexity of real world hardware and software systems and the unpredictability of user behavior, so you can get to the heart of the problem and set it right.Windows Group Policy Troubleshooting is your best-practice guide to Group Policy, showing you all that it can achieve, and how to repair problems when they occur.What You'll LearnUnderstan... [Read More]

    • ASIN: 148421885X
    • ASIN: 148421885X
    • ISBN: 148421885X
    • Manufacturer: Apress

  • Intelligence Analysis; A Target-Centric Approach Fifth Edition

    Robert M. Clark’s Intelligence Analysis: A Target-Centric Approach demonstrates that a collaborative, target-centric approach leads to sharper and more effective analysis, while better meeting the needs of the customer. Thoroughly revised to reflect the changes in the constantly shifting landscape of intelligence, the Fifth Edition contains a new chapter that frames the nature of intelligence in 21st century conflict. The book also accounts for recent events such as the rise of ISIL and the conflict in Ukraine, and contains new examples throughout.  Clark’s practical information and insid... [Read More]

    • ASIN: 1506316816
    • ASIN: 1506316816
    • ISBN: 1506316816
    • Brand: CQ Press
    • Manufacturer: CQ Press

  • Maritime Security: An Introduction

    Maritime Security: An Introduction, Second Edition, provides practical, experience-based, and proven knowledge - and a "how-to-guide" - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shippi... [Read More]

    • ASIN: 0128036729
    • ASIN: 0128036729
    • ISBN: 9780128036723
    • Manufacturer: Butterworth-Heinemann

  • FISMA Principles and Best Practices: Beyond Compliance

    While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approach for establishing and implementing a comprehensive information security program, FISMA Principles and Best Practices: Beyond Compliance integrates compliance review, technical monitoring, and remediation efforts to explain how to achieve and maintain ... [Read More]

    • ASIN: 1420078291
    • ASIN: 1420078291
    • ISBN: 1420078291
    • Brand: Brand: Auerbach Publications
    • Manufacturer: Auerbach Publications

  • Counterinsurgency

    David Kilcullen is one of the world's most influential experts on counterinsurgency and modern warfare, a ground-breaking theorist whose ideas "are revolutionizing military thinking throughout the west" (Washington Post). Indeed, his vision of modern warfare powerfully influenced the United States' decision to rethink its military strategy in Iraq and implement "the Surge," now recognized as a dramatic success. In Counterinsurgency, Kilcullen brings together his most salient writings on this vitally important topic. Here is a picture of modern warfare by someone who has had his boots on the gr... [Read More]

    • ASIN: 0199737495
    • ASIN: 0199737495
    • ISBN: 9780199737499
    • Manufacturer: Oxford University Press

  • Security Policies and Procedures: Principles and Practices

    Security Policies and Procedures: Principles and Practices was created to teach information security policies and procedures and provide students with hands-on practice developing a security policy.This book provides an introduction to security policy, coverage of information security regulation and framework, and policies specific to industry sectors, including financial, healthcare and small business.

    • ASIN: 0131866915
    • ASIN: 0131866915
    • ISBN: 0131866915
    • Manufacturer: Prentice Hall

  • Training Guide Installing and Configuring Windows Server 2012 R2 (MCSA) (Microsoft Press Training Guide)

    Fully updated for Windows Server 2012 R2! Designed to help enterprise administrators develop real-world, job-role-specific skills - this Training Guide focuses on deploying and managing core infrastructure services in Windows Server 2012 R2. Build hands-on expertise through a series of lessons, exercises, and suggested practices - and help maximize your performance on the job. This Microsoft Training Guide: Provides in-depth, hands-on training you take at your own pace Focuses on job-role-specific expertise for deploying and managing core infrastructure services Creates a foundation of skills ... [Read More]

    • ASIN: 0735684332
    • ASIN: 0735684332
    • ISBN: 9780735684331
    • Brand: Microsoft Press
    • Manufacturer: Microsoft Press

  • How HIPAA Can Crush Your Medical Practice: HIPAA Compliance Kit & Manual For 2019: Why Most Medical Practices Don't Have A Clue About Cybersecurity or HIPAA And What To Do About It

    How can you protect yourself against an enemy hacker that you can’t see? How can you meet the online privacy regulations of a HIPAA security policy you aren’t aware of? Buy "How HIPAA Can Crush Your Medical Practice" Today and Get 1-Year of HIPAA Security Awareness Training. Details at https://petronellatech.com/hipaa/If you are involved in the medical industry, you know that today’s technology often complicates patient-record confidentiality and privacy. You also know that security, privacy and regulations meant to protect patient records, like the Health Insurance Portability and Affor... [Read More]

    • ASIN: B01K54IXRC
    • ASIN: B01K54IXRC
    • Manufacturer: Craig A. Petronella

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide - Law Enforcement and First Responder Coordination; Run, Hide, Fight Response Plan - eBook

    This report has been professionally converted for accurate flowing-text e-book format reproduction.The primary mission of the ISC Active Shooter Working Group is to streamline existing ISC documents on active shooter into one cohesive policy and

    • UPC: 214608808

  • CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert Greatest Tips - eBook

    There has never been a CCNA Guide like this. Whether you're a beginner or experienced, you need to know the basics of CCNA. This book can teach you everything fundamental you need to know. It

    • UPC: 812622361

  • CCIE Top Success Secrets and Best Practices: CCIE Experts Share The World's Cisco Certified Internetwork Expert Greatest Tips - eBook

    There has never been a CCIE Guide like this. Whether you're a beginner or experienced, you need to know the basics of CCIE. This book can teach you everything fundamental you need to know. It

    • UPC: 637265210

  • Security Program and Policies : Principles and Practices

    Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today's challenges, laws, regulations,

    • UPC: 24751909

  • Cisco Firepower Threat Defense (Ftd) : Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (Ngfw), Next-Generation Intrusion Prevention System (Ngips), and Advanced Malware Protection (Amp)

    The authoritative visual guide to Cisco Firepower Threat Defense (FTD) This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA

    • UPC: 56042616

  • Lesson 3: Common Mistakes and Best Practices for Designing Network Security Zones

    Tutorial: Configuring Your Security Policy

    Firewalls and Network Security - Information Security Lesson #7 of 12