• Defensive Security Handbook: Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastruc... [Read More]

    • ASIN: B06Y18XC5Y
    • ASIN: B06Y18XC5Y
    • Manufacturer: O'Reilly Media

  • Aerosol Wall Texture Orange Peel Oil Based 10 Oz.

    The product is easy to use. The product is highly durable and handle. The product is manufactured in china.

    • ASIN: B001007QXS
    • UPC: 041072040501
    • ASIN: B001007QXS
    • Brand: Homax
    • Size: 10-Ounce
    • Manufacturer: Homax

  • ProTapes Pro Flex Flexible Butyl All Weather Patch and Shield Repair Tape, 50' Length x 6" Width, White (Pack of 1)

    Pro tapes Pro flex patch and shield tape is an all weather, flexible butyl patch and shield repair tape. It is the heaviest, most aggressive sealing tape available. UV resistant for assured longevity. Quick, permanent repair. All weather application. Convenient ready to use patch sizes. Extremely effective in below grade concrete wall penetrations for water. VOC Free. Conforms Easily. Stable form -70 to 200 degrees F. It can be used to reinforce non-leaking seams and for additional security around curbs, vents, chimneys, AC systems, antennas or any roof-penetrating devices. This tape is easy t... [Read More]

    • ASIN: B00DYN4OG6
    • UPC: 840178015334
    • ASIN: B00DYN4OG6
    • Brand: Pro Tapes
    • Size: 1 pack
    • Manufacturer: ProTapes & Specialties

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide - Law Enforcement and First Responder Coordination; Run, Hide, Fight Response Plan - eBook

    This report has been professionally converted for accurate flowing-text e-book format reproduction.The primary mission of the ISC Active Shooter Working Group is to streamline existing ISC documents on active shooter into one cohesive policy and

    • UPC: 214608808

  • Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work - eBook

    Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate

    • UPC: 917148583

  • IIS Best Practices and Security Hardening: A Straightforward Guide to a Successful and Secure Deployment of IIS

    IIS Best Practices and Security Hardening: A Straightforward Guide to a Successful and Secure Deployment of

    • UPC: 834053743

  • Army Cyber Mission Force: Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices - eBook

    The 2010 US Army Training and Doctrine Commands Concept Capability Plan for Cyberspace Operations directed the Army to begin development of a Cyber Mission Force. The direction to build a Cyber Mission Force followed a

    • UPC: 231330152

  • Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning - eBook

    Two excellent reports have been professionally converted for accurate flowing-text e-book format reproduction.Book 1: Cybersecurity Capability Maturity Model White Paper - Cybersecurity is a leading national security challenge facing this country today. An emerging topic

    • UPC: 175775309

  • Best Practices for Investment Committees - eBook

    An indispensable guide to avoiding the legal and financial pitfalls and of retirement plan investmentWhile it has always been true that a well-staffed and managed investment committee is key to the success of a corporate

    • UPC: 162171780

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert Greatest Tips - eBook

    There has never been a CCNA Guide like this. Whether you're a beginner or experienced, you need to know the basics of CCNA. This book can teach you everything fundamental you need to know. It

    • UPC: 812622361

  • What a Security Guard Needs to Know for Best Practices

    What a Security Guard Needs to Know for Best

    • UPC: 352302178

  • VIDEO: How To Implement a Patch Management Process

    Vulnerability Management 101 - Best Practices for Success [Complete Webinar]

    Systems Manager Patch Manager - How to Enable Patch Management for Windows Systems