Security Books

Browse our extensive library of books and Book Summaries.

FILTERS

  • TYPE

  • DATE PUBLISHED

Showing 805 Results.

  • Book

    10 Dont's on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

    Through ten vignettes told in accessible language and illustrated with helpful screenshots, this engaging book teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy.

    By Daniel G. Bachrach, Eric J. Rzeszut

  • Book

    70 Tips and Tricks for Mastering the CISSP Exam

    Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter.

    By R. Sarma Danturthi

  • Book

    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

    Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

    By Kim Crawley

  • Book

    802.11 Wireless Networks: Security and Analysis

    Demonstrating how to configure equipment in order to implement various network solutions, this unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards.

    By Alan Holt, Chi-Yu Huang

  • Book

    802.11 WLANs and IP Networking: Security, QoS, and Mobility

    Fully addressing the most critical WLAN and Wireless IP issues today, this practical book provides guidance on deployment, insights on interworking with 3G mobile communications systems, and discussions on the market and business aspects of WLANs.

    By Anand R. Prasad, Neeli R. Prasad

  • Book

    A Classical Introduction to Cryptography: Applications for Communications Security

    By providing appropriate mathematical concepts to prove or break the security of cryptographic schemes, this advanced-level text introduces fundamentals of information and communication security.

    By Serge Vaudenay

  • Book

    A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities

    Use this comprehensive guide to learn the practical aspects of Burp Suite-from the basics to more advanced topics. This book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps.

    By Sagar Rahalkar

  • Book

    A Comprehensive Guide to 5G Security

    Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, this insightful resource covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks.

    By Ahmed Bux Abro, Andrei Gurtov (eds), Ijaz Ahmad, Madhusanka Liyanage, Mika Ylianttila

  • Book

    A Comprehensive Look at Fraud Identification and Prevention

    Presenting proven tips, advice, and recommendations for fraud awareness, protection, and prevention, this book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.

    By James R. Youngblood

  • Book

    A Dictionary of Information Security Terms, Abbreviations and Acronyms

    If you don't know the difference between a cookie and a worm, or war-chalking and digital watermarking, this enlightening guide will provide you with authoritative explanations of those information security terms that are used across the ISO framework.

    By Alan Calder, Steve G. Watkins

  • Book

    A Guide to Effective Internal Management System Audits: Implementing Internal Audits as a Risk Management Tool

    Providing a model for the management and implementation of internal audits, this book shows how you can transform your internal auditing process to become a tool for development and continual improvement in your management systems.

    By Andrew W. Nichols

  • Book

    A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

    Presenting a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0, this book details the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly.

    By Anne Kohnke, Dan Shoemaker, Ken Sigler

  • Book

    A Machine Learning Approach to Phishing Detection and Defense

    Helping your business or organization avoid costly damage from phishing sources, this thorough guide demonstrates how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats.

    By Elahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi

  • Book

    A Practical Guide to Security Assessments

    With a focus on the fundamental process areas of security, this step-by-step text provides a methodology for security practitioners to uncover security weaknesses in existing business processes.

    By Sudhanshu Kairab

  • Book

    A Practical Guide to the Payment Card Industry Data Security Standard (PCI DSS)

    Preview Chapter 1 of A Practical Guide to the Payment Card Industry Data Security Standard (PCI DSS). This sample content provides an overview the PCI DSS and features the full first chapter titled "Understanding the Payment Card Industry."

    By ISACA

  • Book

    A Semantic Web Primer, Third Edition

    Including exercises, project descriptions, and annotated references to relevant materials, this text provides an introduction to the continuously evolving field of the Semantic Web, and describes its key ideas, languages, and technologies.

    By Frank van Harmelen, Grigoris Antoniou, Paul Groth, Rinke Hoekstra

  • Book

    AAA Identity Management Security

    Presenting pitfalls, warnings, and tips throughout, this book is a complete, authoritative, single-source guide to implementing, configuring, and managing AAA identity management with CiscoSecure Access Control Server (ACS) 4 and 5.

    By Brandon J. Carroll, Premdeep Banga, Vivek Santuka

  • Book

    Access Control Systems: Security, Identity Management and Trust Models

    Detailing access control mechanisms that are emerging with the latest Internet programming technologies, this thorough text provides an introduction to the foundations of programming systems security, identity management, trust models, and much more.

    By Messaoud Benantar

  • Book

    Adaptive Autonomous Secure Cyber Systems

    k establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment.

    By Sushil Jajodia

  • Book

    Advanced Malware Analysis

    A critical resource for every information security professional's anti-malware arsenal, this must-read guide offers proven troubleshooting techniques and will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware.

    By Christopher C. Elisan

  • Book

    Advanced Penetration Testing with Kali Linux: Unlocking Industry-Oriented VAPT Tactics

    This book is a comprehensive guide to Vulnerability Assessment and Penetration Testing (VAPT), designed to teach and empower readers of all cybersecurity backgrounds.

    By Ummed Meel

  • Book

    Advanced Penetration Testing: Hacking the World's Most Secure Networks

    Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments.

    By Wil Allsopp

  • Book

    Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

    Using such recent high profile cases as Target, Sony, and Home Depot, this important book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.

    By Araceli Treu Gomes, Ira Winkler

  • Book

    Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

    Discussing the critical information that readers need to know about Advanced Persistent Threat (APT) and how to avoid being a victim, this book reveals how attackers are breaking into systems and what to do to protect and defend against these intrusions.

    By Eric Cole

  • Book

    Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

    Security policies and procedures are often times inconvenient, technically complex, and hard to understand. This unique resource provides numerous tips from a wide range of disciplines to handle these especially difficult situations.

    By Jordan Schroeder

  • Book

    Advances in Biometrics for Secure Human Authentication and Recognition

    Filled with comprehensive graphical and modular illustrations, this text provides an up-to-date review of intelligence techniques and theories used in biometric technologies for secure human authentication and identification.

    By Dakshina Ranjan Kisku, Jamuna Kanta Sing (eds), Phalguni Gupta

  • Book

    Advances in Face Presentation Attack Detection, 2nd Edition 2023

    This book revises and expands upon the prior edition of Multi-Modal Face Presentation Attack Detection. The authors begin with fundamental and foundational information on face spoofing attack detection, explaining why the computer vision community has intensively studied it for the last decade.

    By Guodong Guo, Hugo Jair Escalante, Jun Wan, Sergio Escalera, Stan Z. Li

  • Book

    Advances in User Authentication

    Dedicated to advances in the field of user authentication, this book covers detailed descriptions of the authentication process as well as types of authentication modalities along with their several features (authentication factors).

    By Abhijit Nag, Arunava Roy, Dipankar Dasgupta

  • Book

    Agile Governance and Audit: An Overview for Auditors and Agile Teams

    Bridging the gap between traditional auditing approaches and the requirements of Agile methodologies, this book tells Agile teams what auditors and risk professionals need, and the sort of questions they are likely to ask.

    By Christopher Wright

  • Book

    Algorithms and Data Structures for Massive Datasets

    Algorithms and Data Structures for Massive Datasets reveals a toolbox of new methods that are perfect for handling modern big data applications.

    By Dzejla Medjedovic, Emin Tahirovic, Ines Dedovic

  • Book

    All-in-One CCIE Security V5.0: Written Exam 400-251 Cert Guide, 3rd Edition

    Including Exam Essentials sections in each chapter to help reinforce key concepts, this all-purpose CCIE study guide methodically and precisely covers all of the objectives of the CCIE Security Written 400-251 V5.0 exam.

    By Paul Adam

  • Book

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Taking us under the hood of the Android security system, this book describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.

    By Nikolay Elenkov

  • Book

    Anti-Spam Techniques Based on Artificial Immune System

    Introducing research on anti-spam techniques based on the artificial immune system (AIS) to identify and filter spam, this authoritative book provides a centralized source of detailed information on efficient models and algorithms of AIS-based anti-spam techniques

    By Ying Tan

  • Book

    Application Security in the ISO 27001:2013 Environment, 2nd Edition

    Describing the methods used by criminal hackers to attack organizations via their web applications, this book explains how organisations can implement and maintain effective security practices to protect their web applications - and the servers on which they reside - as part of a wider information security management system.

    By Vinod Vasudevan, et al.

  • Book

    Application Security Program Handbook: A Guide for Software Engineers and Team Leaders

    The Application Security Program Handbook delivers effective guidance on establishing and maturing a comprehensive software security plan. In it, you'll master techniques for assessing your current application security, determining whether vendor tools are delivering what you need, and modeling risks and threats.

    By Derek Fisher

  • Book

    Applied Cryptography: Protocols, Algorithms, and Source Code in C, 20th Anniversary Edition

    Including source-code listings and extensive advice, this definitive reference covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms.

    By Bruce Schneier

  • Book

    Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

    Providing an in-depth explanation of the potential of the Smart Grid, this insightful resource provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.

    By Eric D. Knapp, Raj Samani

  • Book

    Applied Incident Response

    This book discusses effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them.

    By Steve Anson

  • Book

    Applied Network Security Monitoring: Collection, Detection, and Analysis

    Providing an essential guide to becoming a Network Security Monitoring (NSM) analyst from the ground up, this practical book takes a fundamental approach, complete with real-world examples that teach you the key concepts of NSM.

    By Chris Sanders, Jason Smith

  • Book

    Architecture & Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children, Second Edition

    Using the concept of design patterns, this book presents dozens of visual models documenting challenging problems in integrating IT management, showing how process, data, and IT management systems must work together to enable IT and its business partners.

    By Charles Betz

  • Book

    ASN.1 Complete

    A technical guide and reference to ASN.1, a standard language often used to describe data protocols.

    By John Larmouth

  • Book

    Assessing Information Security: Strategies, Tactics, Logic and Framework, Second Edition

    Providing expert guidance on information security, underpinned by a profound understanding of human conflict, this book draws on the work of Clausewitz and Sun Tzu, and applies it to the understanding of information security.

    By Andrew Vladimirov, Andriej Michajlowski, Konstantin Gavrilenko

  • Book

    Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

    Helping you to get ahead of threats and protect your organization with an effective asset protection strategy, this essential resource will help you build a vulnerability management program designed to work in the modern threat environment.

    By Brad Hibbert, Morey J. Haber

  • Book

    Asset Protection Through Security Awareness

    Supplying a high-level overview of how to protect your company's physical and intangible assets, this concise guide explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks.

    By Tyler Justin Speed

  • Book

    Asterisk For Dummies

    Presenting essential tools to create and maintain an economical Asterisk phone system from scratch, this invaluable guide shows how to choose and install the right hardware, handle necessary programming to set up the system, and keep it running smoothly.

    By Brady Kirby, Stephen P. Olejniczak

  • Book

    Asterisk Hacking

    With power tips that show how to make the most out of the phone system, this guide teaches readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat.

    By Ben Chapman, Champ Clark

  • Book

    Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

    A deep dive into network protocol security, this comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities.

    By James Forshaw

  • Book

    Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

    This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind.

    By Dr. Timo Steffens

  • Book

    Audit Effectiveness: Meeting the IT Challenge

    Shedding light on practical subjects such as audit automation, continuous online auditing and computer auditing, this book introduces some theory that helps explain the motivation for the use of new tools and techniques, and assists understanding of their impact on the quality of audit judgment.

    By Kamil Omoteso

  • Book

    Auditor's Guide to Information Systems Auditing

    Emphasizing the practical implementation of principles and techniques through the use of realistic case studies, this book was written for those who need to gain a working knowledge of the risks and control opportunities within an IP environment.

    By Richard E. Cascarino

  • Book

    Authentication and Access Control: Practical Cryptography Methods and Tools

    Discussing fundamental mistakes and vulnerabilities from classic authentication protocols and the future of authentication technologies, this book shows you how authentication technologies work and how they can help reduce the risks of being a victim of attacks.

    By Sirapat Boonkrong

  • Book

    Automated Secure Computing for Next-Generation Systems NEW!

    This book provides cutting-edge chapters on machine-empowered solutions for next-generation systems for today's society.

    By Amit Kumar Tyagi

  • Book

    Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide

    This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA).

    By Alexander Kott

  • Book

    Basic Guide to System Safety, Second Edition

    Designed to familiarize readers with the application of scientific and engineering principles for timely identification of hazards, this book efficiently outlines the essentials of system safety and its impact on day-to-day occupational safety and health.

    By Jeffrey W. Vincoli

  • Book

    Bayesian Inference for Probabilistic Risk Assessment: A Practitioner's Guidebook

    Employing a modern computational approach known as Markov chain Monte Carlo (MCMC), this book provides an analytical structure for combining data and information from various sources to generate estimates of the parameters of uncertainty distributions used in risk and reliability models.

    By Curtis Smith, Dana Kelly

  • Book

    Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

    Whether you are new to ethical hacking or a seasoned veteran, this book will help you understand and master many of the powerful and useful hacking-related tools of Kali Linux and the techniques that are widely used in the industry today.

    By Sanjib Sinha

  • Book

    Beginning Ethical Hacking with Python

    Teaching you the basics of ethical hacking and offering insights into the logic, algorithms, and syntax of Python, this book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future.

    By Sanjib Sinha

  • Book

    Beyond Cybersecurity: Protecting Your Digital Business

    An essential resource for business leaders who want to protect their organizations against cyber-attacks, this book arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise.

    By Alan Marcus, Chris Rezek, Derek O'Halloran, James M. Kaplan, Tucker Bailey

  • Book

    Big Breaches: Cybersecurity Lessons for Everyone

    In engaging and exciting fashion, this book covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more.

    By Moudy Elbayadi, Neil Daswani

  • Book

    Big Data Analytics for Cyber Security

    Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article documents and discusses such examples where big data analytics techniques can be used to tackle some of the difficult security challenges like Advanced Persistent Threat (APT), big ticket breaches plaguing both private and public sectors today.

    By Bharath Krishnappa

  • Book

    Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting

    This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications.

    By Aiman Hanna, Amr Youssef, Ashkan Rahimian, Djedjiga Mouheb, He Huang, Lina Nouh, Lingyu Wang, Mourad Debbabi, Paria Shirani, Saed Alrabaee

  • Book

    Blackhatonomics: An Inside Look at the Economics of Cybercrime

    Using cases and extensive interviews that place you right into the mindset of the cyber criminal, this unique guide explains the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world.

    By Daniel Molina, John Pirc, Nick Selby, Will Gragido

  • Book

    Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures

    Providing an overview of Bluetooth security, this clear and thorough guide examines network vulnerabilities and provides a literature-review comparative analysis of recent security attacks.

    By Keijo Haataja, Konstantin Hyppönen, Pekka Toivanen, Sanna Pasanen

  • Book

    Botnets

    Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. This book provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts.

    By Elmar Gerhards-Padilla, Heli Tiirmaa-Klaar, Jan Gassen, Peter Martini

  • Book

    Breaking into Information Security: Crafting a Custom Career Path to Get the Job You Really Want

    Whether you want to break into information security, move from one job to another, or transition into management, this practical book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role.

    By Anthony J. Stieber, Chris Liu, Josh More

  • Book

    Buffer Overflow Attacks: Detect, Exploit, Prevent

    Written by a computer security professional, this informative text shows Internet developers how to defend against buffer overflow attacks by implementing a comprehensive design, coding, and test plan.

    By James C. Foster, et al.

  • Book

    Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web Sites and Applications

    Taking a close look at the types of tools available to you, this book explains how learning to find vulnerabilities in websites will help you become a better penetration tester.

    By Sanjib Sinha

  • Book

    Build a Security Culture

    Using the psychology of group behaviour and explaining how and why people follow social and cultural norms, this book highlights the underlying cause for many successful and easily preventable attacks.

    By Kai Roer

  • Book

    Build Your Own Cybersecurity Testing Lab: Low-Cost Solutions for Testing in Virtual and Cloud-Based Environments

    Providing some inspiration and guidance about how to go about solving some of the issues that arise from putting a lab together, this hands-on guide shows clearly how to administer an effective cybersecurity testing lab using affordable technologies and cloud resources.

    By Ric Messier

  • Book

    Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

    Explaining the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups, this book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.

    By Jeremy Wittkop

  • Book

    Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility

    Designed to meet the needs of IT professionals and law enforcement, as well as consultants, this timely, non-technical book explores the establishment and management of a computer forensics laboratory and its subsequent support to successfully conduct computer-related crime investigations.

    By Andy Jones, Craig Valli

  • Book

    Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

    Focusing on a specific requirement within the Administrative Safeguards of the HIPAA Security, this detailed guide shows readers how to build a cybersecurity program to achieve compliance while attempting to protect health information.

    By Eric C. Thompson

  • Book

    Building an Effective Cybersecurity Program, 2nd Edition

    Including numerous design templates and self-study questions, this book instructs security architects, security managers, and security engineers how to properly construct effective cybersecurity programs using contemporary architectures, frameworks, and models.

    By Tari Schreider

  • Book

    Building an Information Security Awareness Program: Defending against Social Engineering Hacks and Technical Threats

    Featuring real-world examples that show how cyber criminals commit their crimes, this practical guide walks you through the process of developing an engaging and successful training program that will help you and your staff defend your systems, networks, mobile devices, and data.

    By Bill Gardner, Valerie Thomas

  • Book

    Building an Intelligence-Led Security Program

    Helping you to understand your network in-depth so that you can protect it in the best possible way, this practical book will show you how to implement a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence.

    By Allan Liska

  • Book

    Building Effective Cybersecurity Programs: A Security Manager's Handbook

    Intended to give you the knowledge and guidance that will allow you to choose wisely and avoid pitfalls, this practical resource lays out a step-by-step roadmap you can follow as you build or enhance your cybersecurity program.

    By Tari Schreider

  • Book

    Business Continuity Management Systems: Implementation and Certification to ISO 22301

    Enriched with checklists, worksheets and invaluable top tips, this practical guide will fully equip those new to business continuity management or to management systems with survival skills for the ups and downs of the journey.

    By Hilary Estall

  • Book

    Case Study: Real World Effects of Cyber-Attacks

    Looking at mechanisms of advanced cyber-attacks and their effect on production companies, this case study analyzes actions which production companies can take to secure their systems and provides the reader with examples of how to prevent cyber-attacks in the future.

    By Lucian Tipi

  • Book

    Case Study: The Nuclear Effect of Computer Malware

    Aimed at students on operations management, supply chain, logistics and business systems courses, this fascinating case study focuses on the destructive malware that is specifically designed to target the industrial computer-controlled systems.

    By Lucian Tipi

  • Book

    CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003)

    Designed to help you pass the exam with ease, this definitive volume provides complete coverage of every topic on the exam and also serves as an essential on-the-job reference.

    By Dwayne Williams, Gregory White, Nicholas Lane, Wm. Arthur Conklin

  • Book

    CCISO Certified Chief Information Security Officer All-in-One Exam Guide

    Take the challenging CCISO exam with confidence using the comprehensive information contained in this effective study guide.

    By Jordan Genung, Steven Bennett

  • Book

    CDPSE Certified Data Privacy Solutions Engineer All-in-One Exam Guide

    Designed to help you pass the CDPSE exam, this comprehensive guide also serves as an essential on-the-job reference for new and established privacy and security professionals.

    By Peter H. Gregory

  • Book

    CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition

    Designed to help you pass the EC-Council's Certified Ethical Hacker exam with ease, this authoritative, comprehensive guide features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.

    By Matt Walker

  • Book

    CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition

    Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam.

    By Matt Walker

  • Book

    CEHv9: Certified Ethical Hacker Version 9 Study Guide (Exam 312-50)

    Designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material, this comprehensive, in-depth study guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material.

    By Sean-Philip Oriyano

  • Book

    Certification Exam Preparation Course in a Book for Passing the GSEC: The How To Pass on Your First Try Certification Study Guide, Second Edition

    Including numerous questions and detailed answers modeled after the actual exam, this no-gimmicks, no-nonsense book offers concise yet comprehensive coverage of each topic included in the GSEC exam so you can pass on your first try.

    By William Manning

  • Book

    Certified Ethical Hacker (CEH) Foundation Guide

    With hands-on exercises, and practical real-world scenarios and examples, this book will help you prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization.

    By Sagar Ajay Rahalkar

  • Book

    Certified Exam Preparation Course in a Book for Passing the GCIH: The How to Pass on Your First Try Certification Study Guide, 2nd Edition

    Offering numerous sample questions, critical time-saving tips, plus exercises, this self-study exam prep guide is designed to strengthen your understanding of GCIH concepts and prepare you for exam success on the first attempt.

    By David Evans

  • Book

    Check Point NGX R65 Security Administration

    Covering Check Point's new, flagship NGX R65 Firewall/VPN, this guide provides all you need to know about this underlying security software platform for all of your company's enterprise firewall, VPN and management solutions.

    By Ralph Bonnell

  • Book

    CIPM Certified Information Privacy Manager All-in-One Exam Guide

    Designed to help you pass the CIPM exam, this comprehensive guide also serves as an essential on-the-job reference for new and established privacy and security professionals.

    By Peter H. Gregory

  • Book

    CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition

    Covering all five exam domains developed by the Information Systems Audit and Control Association (ISACA), this effective self-study system features learning objectives at the beginning of each chapter, in-depth explanations of each topic, and accurate practice questions.

    By Peter H. Gregory

  • Book

    CISA: Certified Information Systems Auditor Study Guide, 3rd Edition

    Covering the very latest version CISA exam, this practical guide is packed with instruction on all CISA knowledge areas, as well as the most up-to-date standards, regulations, information system auditing best practices, and compliances.

    By David L. Cannon

  • Book

    CISA: Certified Information Systems Auditor Study Guide, Fourth Edition

    Including chapter summary highlights and review questions to help you gauge your understanding of the material, this complete resource provides guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples.

    By Allen Keele, Brian T. O'Hara, David Cannon

  • Book

    Cisco ASA, PIX and FWSM Firewall Handbook, Second Edition

    Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, this book helps you achieve maximum protection of your network resources.

    By David Hucaby

  • Book

    Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance: Identify, Mitigate, and Respond to Network Attacks, Second Edition

    Offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples, this book provides an authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA.

    By Jazib Frahim, Omar Santos

  • Book

    Cisco Firewalls: Concepts, Design and Deployment for Cisco Stateful Firewall Solutions

    Using step-by-step examples that demonstrate theory in action, this unique guide thoroughly explains each of the leading Cisco firewall products, features, and solutions, and shows how they can add value to any network security design or operation.

    By Alexandre M.S.P. Moraes

  • Book

    Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

    For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this concise, one-stop reference lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices.

    By Chris Carthern, Noel Rivera, Richard Bedwell, William Wilson

  • Book

    Cisco PIX Firewalls: Configure, Manage, & Troubleshoot

    Covering Cisco PIX Security Appliance Software Version 7.0, as well as the entire family of Cisco PIX 500 Series Firewalls, this book clearly explains how to leverage the integrated remote access and site-to-site VPN capabilities found in PIX Firewalls.

    By Daniel Kligerman, et al.

  • Book

    Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity

    Devoted to forensic analysis of routers and switches, this book details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony.

    By Dale Liu

  • Book

    Cisco Secure Firewall Services Module (FWSM)

    Comprehensively answering how and why the FWSM functions as it does, this book provides practical examples throughout and enables you to successfully deploy the FWSM and gain the greatest functional benefit from your deployment.

    By Arvind Durai, Ray Blair

  • Book

    CISO Leadership: Essential Principles for Success

    Capturing years of hard knocks, success stories, and failures, this practical book delineates information needed by security leaders and includes from-the-trenches advice on how to have a successful career in the field.

    By Micki Krause (eds), Todd Fitzgerald

  • Book

    CISSP All-in-One Exam Guide, Eighth Edition

    Featuring learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanation, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference.

    By Fernando Maymí, Shon Harris

  • Book

    CISSP For Dummies, 4th Edition

    Taking a down-to-earth approach, this popular guide covers all the latest CISSP Body of Knowlege updates, includes various self-assessment tools to help you gauge your progress, and offers test-taking tips so you approach the exam with confidence and earn your certification.

    By Lawrence Miller, Peter H. Gregory

  • Book

    CISSP for Dummies, 6th Edition

    If you're a security professional seeking your CISSP certification, this expert guide is a perfect way to prepare for the exam.

    By Lawrence C. Miller, Peter H. Gregory

  • Book

    CISSP Practice Exams, Fourth Edition

    Fully updated and featuring new exam question formats, this in-depth self-study tool contains more than 1250 realistic practice exam questions and offers 100% coverage of the 2015 CISSP Common Body of Knowledge.

    By Jonathan Ham, Shon Harris

  • Book

    CISSP Study Guide, Third Edition

    With clearly-stated exam objectives, unique terms and definitions, exam warnings, "learning by example" modules, hands-on exercises, and chapter-end questions, this book provides a complete and effective study guide to prepare users for passing the CISSP exam.

    By Eric Conrad, Joshua Feldman, Seth Misenar

  • Book

    CISSP: Certified Information Systems Security Professional Study Guide, Sixth Edition

    Including changes made to the CISSP Body of Knowledge in 2012, this highly respected guide prepares you with both the knowledge and the confidence to pass each section of the CISSP exam.

    By Darril Gibson, James M. Stewart, Mike Chapple

  • Book

    Client-Side Attacks and Defense

    Discussing the most current type of attacks along with their delivery methods, this book presents a framework for defending your network against client-side attacks in an environment where it might seem impossible.

    By Robert Shimonski, Sean-Philip Oriyano

  • Book

    COBIT(r) 5 for Information Security (2013)

    Presenting a sample chapter from the full-text book, this publication examines COBIT 5 from a security view, placing a security lens over the concepts, enablers and principles within COBIT 5.

    By ISACA

  • Book

    Codebreaking: A Practical Guide, Expanded Edition

    Solve history's most hidden secrets alongside expert codebreakers Elonka Dunin and Klaus Schmeh, as they guide you through the world of encrypted texts.

    By Elonka Dunin, Klaus Schmeh

  • Book

    Coding for Penetration Testers: Building Better Tools

    Providing an understanding of the scripting languages that are commonly used when developing tools for penetration testing, this book guides you through specific examples of custom tool development and the situations where such tools might be used.

    By Jason Andress, Ryan Linn

  • Book

    Collaborative Approaches for Cyber Security in Cyber-Physical Systems

    This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.

    By Fabio Martinelli, Javier Lopez, Theo Dimitrakos

  • Book

    Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI

    Defining 900+ ready to use metrics that measure compliance, resiliency, and ROI, this book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including SOX, HIPAA, and the Data Protection Act-UK.

    By Debra S. Herrmann

  • Book

    Complexity and Cryptography: An Introduction

    Combining an informal style with rigorous proofs of the key results, this book provides knowledge of both computational complexity and a range of topics in pure mathematics necessary for understanding the principles on which cryptography is based.

    By Dominic Welsh, John Talbot

  • Book

    CompTIA CASP+ Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition

    Covering 100 percent of the exam objectives, this hands-on guide provides expert walk-throughs of essential security concepts and processes to help you tackle this challenging exam with full confidence.

    By Jeff T. Parker, Michael Gregg

  • Book

    CompTIA CASP+ CAS-004 Exam Guide: A-Z of Advanced Cybersecurity Concepts, Mock Exams, Real-world Scenarios with Expert Tips

    CompTIA CASP+ certification evaluates advanced technical security skills, such as security engineering and operations, enterprise-level risk assessments and IT governance, and the implementation of secure systems and network design and controls.

    By Dr. Akashdeep Bhardwaj

  • Book

    CompTIA PenTest+ Study Guide: Exam PT0-001

    Whether you're just embarking on your certification journey or finalizing preparations for the big day, this invaluable resource helps you solidify your understanding of essential skills and concepts.

    By David Seidl, Mike Chapple

  • Book

    CompTIA Security+ Deluxe Study Guide: Exam SY0-501, Fourth Edition

    Fully updated to cover 100% of the latest exam, this book is packed with essential information on critical security concepts including architecture and design, attacks and vulnerabilities, identity and access management, cryptography and PKI, risk management, and more.

    By Emmett Dulaney

  • Book

    CompTIA Security+ Review Guide: Exam SY0-301, Second Edition

    A concise and focused exam review, this guide covers all six domains of exam SY0-301, all exam objectives, and includes a helpful "Exam Essentials" section after each domain to help you zero in on what you need to know for the exam.

    By James M. Stewart

  • Book

    Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

    Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques.

    By Brij B. Gupta, Dharma P. Agrawal, Haoxiang Wang (eds)

  • Book

    Computer and Information Security Handbook, Second Edition

    Exploring practical solutions to a wide range of security issues, this comprehensive guide offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advancements.

    By John R. Vacca (ed)

  • Book

    Computer Forensics For Dummies

    Including lists of things that everyone interested in computer forensics should know, do, and build, this book explains the basics of computer forensics, from digging out electronic evidence to solving the case.

    By Linda Volonino, Reynaldo Anzaldua

  • Book

    Computer Forensics InfoSec Pro Guide

    Filled with real-world case studies that demonstrate the concepts covered in the book, this guide explains what it takes to transition from an IT professional to a computer forensic examiner in the private sector, and will help you excel in the field of computer forensics investigations.

    By David Cowen

  • Book

    Computer Forensics JumpStart, Second Edition

    Updated to cover the latest tools, practices, and core information you need to launch a career in this rapidly growing field, this book discusses the essentials of computer forensics and can be applied to both criminal investigations and corporate incident response.

    By Diane Barrett, Ed Tittel, K. Rudolph, Michael G. Solomon, Neil Broom

  • Book

    Computer Forensics, Second Edition

    Entering into the world of cybercrime to explore what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence, this book introduces the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining, and storing electronic evidence.

    By Marie-Helen Maras

  • Book

    Computer Forensics: A Pocket Guide

    How would your organisation cope with a cyber attack? This guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation.

    By Nathan Clarke

  • Book

    Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers

    Written for the nontechnical professional in business and law, this book offers a solid understanding of how computers facilitate fraud and financial crime, and explains how they can be used to investigate, prosecute, and prevent these crimes.

    By Michael Sheetz

  • Book

    Computer Forensics: Computer Crime Scene Investigation

    This title will be removed from the Skillsoft library on May 24, 2024.

    By John R. Vacca

  • Book

    Computer Fraud Casebook: The Bytes that Bite

    Consisting of actual cases written by fraud examiners out in the field, this comprehensive book reveals the wealth of resources available to snare criminals and, even more importantly, prevent fraud from happening in the first place.

    By Joseph T. Wells (ed)

  • Book

    Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response

    Including tools, references, and research sources, this book provides security professionals with the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

    By Leighton R. Johnson III

  • Book

    Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

    Presenting expert information to reinforce your organization's security posture, this tactical guide shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size.

    By N. K. McCarthy

  • Book

    Computer Network Security

    Developed in collaboration with a training and certification team from Cisco, this book is an exploration of the state-of-the-art and good practices in setting up a secure computer system.

    By Ali Sadiqui

  • Book

    Computer Security and Encryption, 2nd Edition

    This book has been developed for data security, network security and Internet security.

    By Dr Surender Jangra, Sumant Raj Chauhan

  • Book

    Computer Security and Encryption: An Introduction

    Designed to meet the needs of beginners as well as more advanced readers, this book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems.

    By S. Jangra, S. R. Chauhan

  • Book

    Computer Security Handbook, Sixth Edition

    A compilation of advice from top professionals working in the real world about how to minimize the possibility of computer security breaches, this book provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more.

    By Eric Whyne (eds), Michel E. Kabay, Seymour Bosworth

  • Book

    Computer-Aided Fraud Prevention and Detection: A Step by Step Guide

    Including case studies, theory and examples, this guide will help those interested in improving their ability to access data and use data-extraction and analysis software to detect and deter fraud and wasteful practices.

    By David Coderre

  • Book

    Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career

    Giving you a clear overview of the world of cyber security, this jargon-busting guide is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security.

    By Jessica Barker

  • Book

    Confident Cyber Security: The Essential Insights and How to Protect from Threats, Second Edition

    The world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career.

    By Jessica Barker

  • Book

    Configuring Symantec AntiVirus, Corporate Edition

    Whether you are managing an existing NAVCE 7.6 configuration or implementing SAVCE version 8.x, this book will help you get the most out of your software installation.

    By Robert J. Shimonski, et al.

  • Book

    Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity

    Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership guidebook outlining a new strategy for improving organizational cybersecurity and mitigating cyber risk.

    By Eric Rosenbach, Gregory J. Falco

  • Book

    Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Alex Chi Keung Ng

  • Book

    Controller-Based Wireless LAN Fundamentals: An End-to-End Reference Guide to Design, Deploy, Manage, and Secure 802.11 Wireless Networks

    Written by senior Cisco wireless experts, this guide presents all the practical and conceptual knowledge professionals need to confidently design, configure, deploy, manage, and troubleshoot 802.11n networks with Cisco Unified Wireless Network (CUWN) technologies.

    By Jake Woodhams, Jeff Smith, Robert Marg

  • Book

    Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

    Addressing current problems and issues emerging in cyber forensics and investigations, this thorough resource proposes new solutions that can be adopted and implemented to counter security breaches within various organizations.

    By Asnath Victy Phamila (eds), S. Geetha

  • Book

    Counterintelligence in a Cyber World

    This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain.

    By Paul A. Watters

  • Book

    Creating the Secure Managed Desktop: Using Group Policy, SoftGrid, Microsoft Deployment Toolkit, and Other Management Tools

    Packed with techniques, tips, and best practices, this guide will help you understand the tools and technologies you need to create a more secure network and manage, diagnose, configure, update, and protect multiple desktops in Active Directory.

    By Jeremy Moskowitz

  • Book

    CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide

    Serving as a test preparation tool and an on-the-job reference that will serve you well beyond the examination, this reference guide covers all four exam domains effective as of June 2015 and contains hundreds of realistic practice exam questions.

    By Bobby E. Rogers, Dawn Dunkerley

  • Book

    CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide, Second Edition

    "CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide, Second Edition" features learning objectives, explanations, exam tips, and hundreds of practice questions.

    By Bobby E. Rogers, Dawn Dunkerley, Peter H. Gregory

  • Book

    Critical Incident Management

    This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

    By Alan B. Sterneckert

  • Book

    Critical Infrastructure System Security and Resiliency

    Focusing on the design of protection strategies to enhance the robustness of the infrastructure components, this book presents risk assessment tools and necessary metrics to offer guidance to decision-makers in applying sometimes limited resources to reduce risk and ensure operational resiliency.

    By Betty E. Biringer, Drake E. Warren, Eric D. Vugrin

  • Book

    Cryptography and Network Security

    This book will cover:•What is Confidentiality, Integrity, Availability•Security Incident Events and Monitoring•Security Terminologies, Security Zones•TCP SYN Flood attack.

    By Hugo Hoffman

  • Book

    Cryptography and Network Security: A Practical Approach

    Network security is a set of protocols that allows us to use the internet comfortably without worrying about security attacks, and the most common tool for providing network security is cryptography. This book provides a practical survey of the principles of cryptography and network security.

    By K. Haribaskar

  • Book

    Cryptography and Network Security: An Introduction

    This book is an introduction to fundamental concepts in the fields of cryptography and network security.

    By R. Achary

  • Book

    Cryptography and Secure Communication

    Bringing together a fascinating mixture of topics in engineering, mathematics, computer science, and informatics, this book presents the timeless mathematical theory underpinning cryptosystems both old and new.

    By Richard E. Blahut

  • Book

    Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto

    Providing a simple quantum mechanics primer, this book is an indispensable resource for every IT and InfoSec professional responsible for making appropriate decisions to meet the challenges of the coming quantum-computing revolution.

    By Roger A. Grimes

  • Book

    Cryptography Engineering: Design Principles and Practical Applications

    Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management.

    By Bruce Schneier, Niels Ferguson, Tadayoshi Kohno

  • Book

    Cryptography For Dummies

    This guide to keeping your data safe offers the latest security techniques and advice on choosing and using cryptography products. It covers terminology, specific encryption technologies, pros and cons of different implementations, and more.

    By Chey Cobb

  • Book

    Cryptography InfoSec Pro Guide

    Featuring examples of how security is improved industry-wide by encryption techniques, this complete and practical resource provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field.

    By Sean-Philip Oriyano

  • Book

    Cryptography Made Simple

    Explaining the key topics in cryptography, this book takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout.

    By Nigel P. Smart

  • Book

    Cryptography Protocols and Algorithms

    Learn the basics of cryptography, as well as the various mathematical concepts that you use in cryptographic algorithms and protocols. Various encryption and authentication techniques that you use in cryptography are also addressed.

    By

  • Book

    Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd Edition

    This book is geared toward a broad audience. It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. It is also an authoritative overview for professionals working at financial institutions, law firms, and governments who need up-to-date information to make critical decisions.

    By Aiden A. Bruen, James M. McQuillan, Mario A. Forcinito

  • Book

    CSX Cybersecurity Fundamentals Study Guide 2015

    Preview Chapter 1 of the CSX Cybersecurity Fundamentals Study Guide. This sample content provides a description of the manual and features the full first chapter titled "Cybersecurity Introduction and Overview."

    By ISACA

  • Book

    Curve Benders: How Strategic Relationships Can Power Your Non-linear Growth in the Future of Work

    This book aims to provide you with a step-by-step guide for personal, professional, and organizational growth. The author highlights how certain relationships enable a non-linear growth trajectory. These relationships, in addition to augmenting what we can accomplish, often shape who we become. These relationships are "curve benders," and this book will show you who and where they are, how to find and engage them, and, equally valuable, how you can become a curve bender to impact the lives and livelihoods of others profoundly.

    By David Nour, Lin Wilson

  • Book

    CWSP Certified Wireless Security Professional Study Guide: Exam CWSP-205, Second Edition

    An ideal companion for effective, efficient CWSP-205 preparation, this comprehensive study guide is your one-stop resource for complete coverage including 100% of all objectives, giving you the edge on exam day.

    By Bryan Harkins, David A. Westcott, David D. Coleman

  • Book

    CWSP: Certified Wireless Security Professional Official Study Guide (Exam PW0-204)

    With practical hands-on exercises, real-world scenarios and challenging review questions, this comprehensive resource provides full coverage of all exam objectives in a systematic approach, so you can be confident you're getting the instruction you need for the exam.

    By Bryan E. Harkins, David A. Westcott, David D. Coleman, Shawn M. Jackman

  • Book

    Cyber Attacks: Protecting National Infrastructure

    Including controversial themes such as the deliberate use of deception to trap intruders, this book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk.

    By Edward G. Amoroso

  • Book

    Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk

    Looking at big-picture planning and strategy that makes the most business impact, this book provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its effect on your enterprise.

    By Andrew Gorecki

  • Book

    Cyber Crime and Cyber Terrorism Investigator's Handbook

    Authored by experts in cyber crime, digital investigations, and counter-terrorism, this invaluable resource describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them.

    By Andrew Staniforth, Babak Akhgar, Francesca Bosco

  • Book

    Cyber Crime Investigations

    Examining the difficulties, misconceptions, and flaws in the cyber investigative methodology, this guide provides you with all the information necessary to make educated and authoritative decisions when is comes to cyber crime investigative issues.

    By Anthony Reyes, et al.

  • Book

    Cyber Crime, Security and Digital Intelligence

    Written for the non-technical layman and the high-tech risk manager alike, this important work describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats.

    By Mark Johnson

  • Book

    Cyber Crime: Concepts, Methodologies, Tools and Applications, Volume 1

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Information Resources Management Association (IRMA)

  • Book

    Cyber Crime: Concepts, Methodologies, Tools and Applications, Volume 2

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Information Resources Management Association (IRMA)

  • Book

    Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense

    Including numerous detailed case studies, this book provides a framework to systematically implement cyber denial and deception active defenses which can immediately improve security posture.

    By Alexander W. Tsow, Ben Schmoker, Frank J. Stech, Kristin E. Heckman, Roshan K. Thomas

  • Book

    Cyber Essentials: A Guide to the Cyber Essentials and Cyber Essentials Plus Certifications

    Cyber attacks are a fact of life in the information age. For any organisation that connects to the Internet, the issue is not if an attack will come, but when.

    By Alan Calder

  • Book

    Cyber Essentials: A Pocket Guide

    Whether your goal is to reduce insurance premiums or to help improve investor and customer confidence, this concise guide explains how to achieve Cyber Essentials certification in a fast, effective, and cost-effective manner.

    By Alan Calder

  • Book

    Cyber Forensics Up and Running: A Hands-on Guide to Digital Forensics Tools and Technique NEW!

    This book empowers you to become a digital detective, capable of uncovering data secrets, investigating networks, exploring volatile and non-volatile evidence, and understanding the intricacies of modern browsers and emails.

    By Tarun Vashishth

  • Book

    Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition

    Designed as an introduction and overview to the field, this book guides you step-by-step through the basics of investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine.

    By Albert J. Marcella, Jr., Doug Menendez

  • Book

    Cyber Forensics: From Data to Digital Evidence

    Painting a broad picture of the field, this guide provides you with the specific knowledge you need to not only find key data in forensic investigations but also speak confidently about the validity of the data identified, accessed, and analyzed as part of a comprehensive cyber forensic investigation.

    By Albert J. Marcella, Jr., Frederic Guillossou

  • Book

    Cyber Fraud: Tactics, Techniques and Procedures

    Combining the best of investigative journalism and technical analysis, this copiously illustrated book will help organizations and individuals better secure their systems and develop countermeasures to disrupt underground fraud.

    By James Graham (ed)

  • Book

    Cyber Guardians: Empowering Board Members for Effective Cybersecurity

    A comprehensive overview for directors aiming to meet their cybersecurity responsibilities

    By Bart R. McDonough

  • Book

    Cyber Guerilla

    Providing valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors, this book takes readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats.

    By Jelle van Haaster, Martijn Sprengers, Rickey Gevers

  • Book

    Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, Second Edition

    Teaching you how to set up, defend, and attack computer networks, this book will show you how to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure.

    By Mike O'Leary

  • Book

    Cyber Persistence Theory: Redefining National Security in Cyberspace

    In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result.

    By Emily O. Goldman, Michael P. Fischerkeller, Richard J. Harknett

  • Book

    Cyber Physical Systems: Architectures, Protocols, and Applications

    Helping you understand the basic principles and key supporting standards of cyber physical systems (CPS), this thorough guide analyzes different CPS applications from the bottom up, extracting the common characters that form a vertical structure.

    By Chi (Harold) Liu, Yan Zhang (eds)

  • Book

    Cyber Reconnaissance, Surveillance and Defense

    At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, this book gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.

    By Robert Shimonski

  • Book

    Cyber Resilience: Defence-In-Depth Principles

    We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional.

    By Alan Calder

  • Book

    Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls

    Including an introduction to threat modelling, this book presents a data-centric approach to cyber risk management based on business impact assessments, data classification, data flow modelling and assessing return on investment.

    By Christopher Hodson

  • Book

    Cyber Safety For Everyone

    A must-read for every parent, teacher or child who wants to avoid the temptations and perils of cyberspace, this important book tells you the kind of trouble children can get into when they are online and suggests simple, yet effective ways to deal with such situations.

    By Jaago Teens

  • Book

    Cyber Safety for Everyone 2nd Edition

    Book is a step-by-step guide that handholds you through all the essential aspects of internet safety. The content is presented in a simple and easy-to-understand manner. True incidents, practical tips, survey results, conversation starters and teaching ideas given in the book, make the reading experience truly enriching.

    By Jaago Teens

  • Book

    Cyber Security

    Filled with anecdotes of real people, governments, and businesses, this book explains how cyber security plays a fundamental role in the way we live our lives, and understanding its basics is critical for everyone around the world.

    By Edward Amoroso

  • Book

    Cyber Security and Digital Forensics: Challenges and Future Trends

    Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.

    By Dac-Nhuong Le, Mangesh M. Ghonge, Ramchandra Mangrulkar, Sabyasachi Pramanik

  • Book

    Cyber Security and IT Infrastructure Protection

    Through hands-on exercises, worked examples, case studies, and questions and answers, this unique and comprehensive resource offers in-depth coverage of the theory, technology, and practice as they relate to cyber-physical security and IT infrastructure protection.

    By John R. Vacca

  • Book

    Cyber Security and Network Security

    This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security.

    By Abhijit Guha, Debabrata Samanta, M. Vinay, Sabyasachi Pramanik

  • Book

    Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training

    Focusing on countermeasures against orchestrated cyber-attacks, this research-based book provides information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place, and to arrange appropriate training interventions.

    By David Upton, Peter Trim

  • Book

    Cyber Security Essentials

    Illustrating more than 75 key security concepts with short, easy-to-understand descriptions, this book explains the concepts behind today's most prevalent threats, tactics, and procedures and provides actionable advice for the mitigation of common vulnerabilities.

    By James Graham, Richard Howard, Ryan Olson (eds)

  • Book

    Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies

    The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field.

    By DacNhuong Le, et al.

  • Book

    Cyber Security Management: A Governance, Risk and Compliance Framework

    By simplifying complex material, this book provides a multi-disciplinary perspective, and an explanation and interpretation of how managers can manage cyber threats in a proactive manner and work towards counteracting cyber threats both now and in the future.

    By Peter Trim, Yang-Im Lee

  • Book

    Cyber Security Policy Guidebook

    Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects, current organizational cyber security policy issues on a global scale-taking great care to educate readers on the history and current approaches to the security of cyberspace.

    By Jennifer L. Bayuk, et al.

  • Book

    Cyber Security, 2nd Edition

    Through the medium of this book, we have tried to introduce you to this new world-its components, features and drawbacks. Crimes related to this are referred to as Cyber Crimes.

    By Dr Krishan Kumar Goyal, Prof Amit Garg

  • Book

    Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT Security

    With contributions from leading experts from industry, politics and research, this book discusses the status quo and future prospects of corporate cyber security and provides strategic perspective on IT and cyber security for corporations and other businesses.

    By Ferri Abolhassan (ed)

  • Book

    Cyber Security: Essential Principles to Secure Your Organisation

    This pocket guide will take you through the essentials of cyber security - the principles that underpin it, vulnerabilities and threats and the attackers who use them, and how to defend against them - so you can confidently develop a cyber security programme.

    By Alan Calder

  • Book

    Cyber Threat Intelligence

    Cyber Threat Intelligence introduces the history, terminology, and techniques to be applied within cyber security, offering an overview of the current state of cyberattacks and stimulating readers to consider their own issues from a threat intelligence point of view.

    By Martin Lee

  • Book

    Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers

    This book covers the cybersecurity wild west, the merits and limitations of structured intelligence data, and how using structured intelligence data can, and should, be the standard practice for any intelligence team.

    By Aaron Roberts

  • Book

    Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks

    Written by one of the nation's most highly respected cyber risk analysts, this important book is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity.

    By N. MacDonnell Ulsch

  • Book

    Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, Second Edition

    Providing concrete examples and real-world guidance on how to identify and defend your network against malicious attacks, this timely book details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result.

    By Jason Andress, Steve Winterfeld

  • Book

    Cyber-Risk Management

    Providing a brief and general introduction to cybersecurity and cyber-risk assessment, this highly pragmatic book is based on established international standards (including ISO 31000) as well as industrial best practices, explaining how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed.

    By Atle Refsdal, Bjørnar Solhaug, Ketil Stølen

  • Book

    Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach

    The book provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.

    By Quanyan Zhu, Sandra König, Stefan Rass, Stefan Schauer

  • Book

    Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT

    Reviewing recent advances in cyber threat intelligence, trust management and risk analysis, this book gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems.

    By Wiem Tounsi

  • Book

    Cybercrime and Cyberwarfare

    In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this straightforward book describes the fundamental and conceptual aspects of cyberspace abuse.

    By Igor Bernik

  • Book

    Cybercrime Incident Response and Digital Forensics

    Describing the threat posed by cybercrime and how to create a cyberresponse program, this publication provides an analysis of the type of risks and guidelines to prevent, detect and respond appropriately.

    By ISACA

  • Book

    Cybercrime Investigators Handbook

    Providing practical guidance with clear, easy-to-understand language, this essential resource is an innovative guide that approaches cybercrime investigation from the field-practitioner's perspective.

    By Graeme Edwards

  • Book

    Cybercrime: Protecting Your Business, Your Family and Yourself

    This book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business, does fall victim to cybercrime.

    By Todd Wade

  • Book

    Cybercryptography: Applicable Cryptography for Cyberspace Security

    This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security.

    By Song Y. Yan

  • Book

    Cyberdanger: Understanding and Guarding Against Cybercrime

    Written in an accessible, often humorous way about real-world cases in industry, this book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world.

    By Eddy Willems

  • Book

    Cyberjutsu: Cybersecurity for the Modern Ninja

    Cyberjutsu is a practical cybersecurity field guide based on the techniques, tactics, and procedures of the ancient ninja.

    By Ben McCarty

  • Book

    Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns

    Bringing together different interdisciplinary areas under one roof, this important book provides an introduction to and coverage of the state-of-the-art of cyberpatterns, from a theoretical standpoint and via practical applications.

    By Clive Blackwell, Hong Zhu (eds)

  • Book

    Cybersecurity All-in-One For Dummies

    Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in.

    By Ira Winkler, Joseph Steinberg, Kevin Beaver, Ted Coombs

  • Book

    Cybersecurity and Cyberwar: What Everyone Needs To Know

    Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, this definitive book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do?

    By Allan Friedman, P.W. Singer

  • Book

    Cybersecurity and Decision Makers: Data Security and Digital Trust

    Intended for anyone concerned about the protection of their data, as well as decision makers in any organization, this book presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world.

    By Marie de Fréminville

  • Book

    Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments

    With contributions by both academic and industrial researchers, this book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application.

    By Aboul Ella Hassanien, Mohamed Elhoseny (eds)

  • Book

    Cybersecurity Blue Team Toolkit

    Designed to be an easily navigated tool for daily use, this handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise.

    By Nadean H. Tanner

  • Book

    Cybersecurity Career Guide

    Cybersecurity Career Guide shows you how to turn your existing technical skills into an awesome career in information security. In this practical guide, you'll explore popular cybersecurity jobs, from penetration testing to running a Security Operations Center.

    By Alyssa Miller

  • Book

    Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic

    Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic provides cutting-edge research on the best guidelines for preventing, detecting, and responding to cyber threats within educational, business, health, and governmental organizations during the COVID-19 pandemic.

    By Aida Ben Chehida Douss, Ryma Abassi

  • Book

    Cybersecurity Essentials

    Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.

    By Charles J. Brooks, Christopher Grow, Donald Short, Philip Craig

  • Book

    Cybersecurity First Principles: A Reboot of Strategy and Tactics

    In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.

    By Rick Howard

  • Book

    Cybersecurity for Business: OrganizationWide Strategies to Ensure Cyber Risk Is Not Just an IT Issue

    This essential guide outlines the true nature of modern cyber risk, and how it can be assessed and managed using modern analytical tools to put cybersecurity in business terms.

    By Larry Clinton

  • Book

    Cybersecurity for Dummies

    Introducing you to the basics of becoming cyber-secure, this practical book will teach you what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached.

    By Joseph Steinberg

  • Book

    Cybersecurity For Dummies, 2nd Edition

    Cybersecurity For Dummies is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.

    By Joseph Steinberg

  • Book

    Cybersecurity for Executives: A Practical Guide

    Through discussions of risk, strategy, policies, change and personnel management, and performance measures, this practical book provides relevant and timely information to help readers make better decisions regarding cybersecurity.

    By C. Joseph Touhill, Gregory J. Touhill

  • Book

    Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

    The vulnerability of the medical equipment inside the hospital to cyber-attacks far eclipses the actual building equipment. This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities.

    By Luis Ayala

  • Book

    Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

    Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.

    By Bryan Singer, Tyson Macaulay

  • Book

    Cybersecurity for Space: Protecting the Final Frontier

    Discussing the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. This book covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.

    By Jacob G. Oakley

  • Book

    Cybersecurity Guidance for Small and Medium-Sized Enterprises

    Addressing the SME scenario and its typical resources, budget and technical-skills limitations, this sample content offers SMEs a practical and manageable tool for planning, implementing and maintaining good cybersecurity at affordable cost.

    By ISACA

  • Book

    Cybersecurity in the Electricity Sector: Managing Critical Infrastructure

    This book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions.

    By Rafał Leszczyna

  • Book

    Cybersecurity Law

    Written in an accessible manner, this definitive guide to cybersecurity law provides real-world examples and case studies to help readers understand the practical applications of the presented material.

    By Jeff Kosseff

  • Book

    Cybersecurity Law, Standards and Regulations, 2nd Edition

    In a friendly, easy-to-understand style, this book offers real-world business examples supported by a wealth of court cases and covers the range of practical information you will need as you explore - and prepare to apply - cybersecurity law.

    By Kristen Noakes-Fry, Tari Schreider

  • Book

    Cybersecurity Lexicon

    Describing the threats and vulnerabilities of critical infrastructure to cybersecurity attack, this book provides definitions for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry.

    By Luis Ayala

  • Book

    Cybersecurity Measures for E-Government Frameworks

    Cybersecurity Measures for E-Government Frameworks provides security techniques and measures to e-governance applications. It further discusses emerging technologies in the cybersecurity field as well as the specific uses they have to e-government technologies.

    By Imdad Ali Shah, Noor Zaman, Samina Rajper

  • Book

    Cybersecurity of Industrial Systems

    How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems.

    By Jean-Marie Flaus

  • Book

    Cybersecurity Program Development for Business: The Essential Planning Guide

    From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive.

    By Chris Moschovitis

  • Book

    Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework

    The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack.

    By Brian Haugli, Cynthia Brumfield

  • Book

    Cybersecurity Training: A Pathway to Readiness NEW!

    Readers learn to apply this proven project-oriented training approach to improve the probability of successful cybersecurity awareness and role-based training experiences. The reader is guided to initiate, plan, design, develop, pilot, implement and evaluate training and learning, followed by continual improvement sprints and projects.

    By Chris Walker, Greg Skulmoski

  • Book

    Cybersecurity: A Self-Teaching Introduction

    Written in an easy to understand, "self-teaching" format, this book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime.

    By C. P. Gupta, K. K. Goyal

  • Book

    Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

    A comprehensive and authoritative look at the critical topic of cybersecurity from start to finish, this essential book addresses cybersecurity strategies that include identity management, risk management, and incident management.

    By Thomas J. Mowbray

  • Book

    Cybersecurity: Public Sector Threats and Responses

    Focusing on the convergence of globalization, connectivity, and the migration of public sector functions online, this practical book identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world.

    By Kim Andreasson

  • Book

    Cyberspace and Cybersecurity

    Supplying complete coverage of cyberspace and cybersecurity, this important book not only emphasizes technologies but also pays close attention to human factors and organizational perspectives.

    By George K. Kostopoulos

  • Book

    Cyberterrorism: Understanding, Assessment, and Response

    With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, this book offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism.

    By Lee Jarvis, Stuart Macdonald, Thomas M. Chen

  • Book

    Cyberwar, Cyberterror, Cybercrime and Cyberactivism: An In-depth Guide to the Role of Security Standards in the Cybersecurity Environment. 2nd Edition

    Encouraging cybersecurity professionals to take a wider view of what cybersecurity means, this book explains how to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses.

    By Julie E. Mehan

  • Book

    Cyberwarfare: An Introduction to Information-Age Conflict

    Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. This book provides an introduction to the underlying technologies, strategies, and policies that provide the venue for modern information-age conflict.

    By Isaac R. Porche III

  • Book

    Cyberwarfare: Information Operations in a Connected World

    Including detailed case studies drawn from actual cyberwarfare operations and tactics, this book explains the history of cyberwarfare, techniques used in both offensive and defensive information warfare, and how cyberwarfare is shaping military doctrine.

    By David Seidl, Mike Chapple

  • Book

    Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence

    Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web.

    By Om Kumar C.U., P. William, Romil Rawat, Shrikant Telang, Upinder Kaur

  • Book

    Darkweb Cyber Threat Intelligence Mining

    Aimed at both cybersecurity practitioners and researchers, this timely book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them.

    By John Robertson, et al.

  • Book

    Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications

    Bringing together important lessons learned within a young, but surprisingly rapid field, this book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks.

    By Harsha Kumara Kalutarage, Iván Palomares Carrascosa, Yan Huang (eds)

  • Book

    Data Analytics for Internal Auditors

    Providing a reference guide for IT and Internal Auditors as well as Fraud Examiners, this book presents information written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting data analytics.

    By Richard E. Cascarino

  • Book

    Data Governance: How to Design, Deploy, and Sustain an Effective Data Governance Program

    Specifically aimed at managers who need to implement a data governance program at their company, this book provides a complete overview of the data governance lifecycle and includes case studies to detail 'do's' and 'don'ts' in real-world situations.

    By John Ladley

  • Book

    Data Leaks For Dummies

    Now more than ever, it's critical to keep your company data locked up tighter than Fort Knox. This guide has the scoop on what's at risk, how leaks happen, how to keep your data safe without being inflexible, and even what to do if the worst happens.

    By Gareth Fraser-King, Guy Bunker

  • Book

    Data Mining and Machine Learning in Cybersecurity

    Providing a unified reference for specific machine learning solutions to cybersecurity problems, this book supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges detailing cutting-edge machine learning and data mining techniques.

    By Sumeet Dua, Xian Du

  • Book

    Data Privacy for the Smart Grid

    Providing a clear description of the Smart Grid ecosystem, this thorough resource presents practical guidance about its privacy risks, and details the actions required to protect data generated by Smart Grid technologies.

    By Christine Hertzog, Rebecca Herold

  • Book

    Data Privacy Law: An International Perspective

    Although over 100 countries have developed data privacy laws, there is a lack of expert guidance on these laws. This text examines the fundamental aims and principles of data privacy law, along with the mechanisms for its enforcement in an international context.

    By Lee A. Bygrave

  • Book

    Data Privacy: A Runbook For Engineers

    The book's constant awareness of business requirements will help you balance trade-offs, and ensure your user's privacy can be improved without spiraling time and resource costs.

    By Nishant Bhajaria

  • Book

    Data Protection and Compliance, Second edition

    This book explores about data protection and compliance.

    By Adam Panagiotopoulos, Ben Johnson, James Drury-Smith, Jamie Taylor, Mark Hendry, Michelle Maher, Niall O'Brien, Richard Hall, Shervin Nahid, Simon Davis, Stewart Room, Tuğhan Thuraisingam

  • Book

    Data Protection Officer

    This book provides a practical guide to the DPO role, encompassing the key activities you'll need to manage to succeed in the role.

    By Filip Johnssén, Sofia Edvardsen

  • Book

    Data Security Breaches and Privacy in Europe

    Providing a fruitful discussion on data security breaches, this book looks at whether a balance can be drawn by the current and proposed Data Protection framework to protect against data security breaches and considers what more needs to be achieved.

    By Rebecca Wong

  • Book

    Data Strategy: From definition to execution

    This book is your essential guide to planning, developing and implementing such a strategy, presenting a framework which takes you from data strategy definition to successful strategy delivery and execution with support and engagement from stakeholders.

    By Ian Wallis

  • Book

    Deep Dive: Exploring the Real-world Value of Open Source Intelligence

    In Deep Dive: Exploring the Real-world Value of Open Source Intelligence, veteran open-source intelligence analyst Rae Baker explains how to use publicly available data to advance your investigative OSINT skills and how your adversaries are most likely to use publicly accessible data against you.

    By Rae L. Baker

  • Book

    Deep Learning Applications for Cyber Security

    Filling an important gap between deep learning and cyber security communities, this book addresses questions of how deep learning methods can be used to advance cyber security objectives.

    By Mamoun Alazab, MingJian Tang (eds)

  • Book

    Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

    Offering an insider's view of the secrets of hackers, this hands-on guide exposes methodologies hackers use to exploit physical access, network access, and wireless vectors, and shows you how you can outwit computer predators at their own game.

    By Jesse Varsalone, Matthew McFadden, et al.

  • Book

    Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide

    Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution.

    By Anahit Tarkhanyan, Jody Booth, Sunil Cheruvu, Werner Metz

  • Book

    Design and Analysis of Security Protocol for Communication

    This book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack.

    By Dinesh Goyal

  • Book

    Design and Evaluation of Physical Protection Systems, Second Edition

    Describing the difference between safety and security to emphasize the difference between accidents or natural disasters and malevolent human attack, this book explores the process to protect targets against appropriate threats.

    By Mary Lynn Garcia

  • Book

    Design for Hackers: Reverse Engineering Beauty

    Packed with unique reverse engineering design examples, this book provides you with the framework for understanding good design and inspires and encourages you to discover and create new beauty in a variety of formats.

    By David Kadavy

  • Book

    Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events

    Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events.

    By Eric C. Thompson

  • Book

    Designing and Building Enterprise DMZs

    Explaining what an administrator needs to plan out and integrate a DMZ into a network for small, medium, and Enterprise networks, this unique book demonstrates how to make DMZs, utilizing the IT world's best of breed software and hardware products.

    By C. Tate Baumrucker, et al.

  • Book

    Detecting and Combating Malicious Email

    Discussing how and why malicious e-mail is used, this hands-on book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments.

    By Cade Kamachi, Julie JCH Ryan

  • Book

    Digital Earth: Cyber Threats, Privacy and Ethics In an Age of Paranoia

    The book offers a rational insight into technological threats that we will all encounter, and provides navigation in an increasingly technologically advanced world.

    By Sarah Katz

  • Book

    Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Third Edition

    Featuring coverage of the abuse of computer networks, and privacy and security issues on computer networks, this book explains how computers and networks function, how they can be involved in crimes, and how they can be used as evidence.

    By Eoghan Casey

  • Book

    Digital Forensics

    Featuring real-word examples and scenarios, including court cases and technical problems, this book is a definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field.

    By André Årnes

  • Book

    Digital Forensics Basics: A Practical Guide Using Windows OS

    Directed toward users with no experience in the digital forensics field, this hands-on book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime.

    By Nihad A. Hassan

  • Book

    Digital Forensics for Handheld Devices

    Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks.

    By Eamon P. Doherty

  • Book

    Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements

    Offering a step-by-step guide to designing, building and using a digital forensics lab, this comprehensive book provides those who handle digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab.

    By Andrew Jones, David Watson

  • Book

    Digital Forensics with Open Source Tools

    Authored by world-renowned forensic practitioners, this technical procedural guide explains the use of open source tools on Linux and Windows systems as a platform for performing computer forensics.

    By Cory Altheide, Harlan Carvey

  • Book

    Digital Forensics: Threatscape and Best Practices

    Delivering an incisive analysis and best practices from a panel of expert authors, this comprehensive book surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and ever changing technology.

    By John Sammons

  • Book

    Digital Media Law, Second Edition

    Covering the latest legal updates and rulings, this guide presents a comprehensive introduction to all the critical issues surrounding media law such as information access and protection, intellectual property, defamation, privacy, indecency, and commercial speech.

    By Ashley Packard

  • Book

    Digital Privacy: Theory, Technologies, and Practices

    Featuring contributions from experts in academia, industry, and government, this book provides information on state-of-the-art privacy technologies, best practices, and research results, as well as legal, regulatory, and ethical issues.

    By Alessandro Acquisti, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (eds), Stefanos Gritzalis

  • Book

    Digital Resilience: Is Your Company Ready for the Next Cyber Threat?

    Fascinating and highly readable, this powerful guide lays bare tactics used by hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks, but thriving even while under assault.

    By Ray A. Rothrock

  • Book

    Disclosure of Security Vulnerabilities

    Providing readers with a comprehensive source of latest trends, cases, issues and research in this field, this jargon-free book considers both the ethical and legal issues involved with the disclosure of vulnerabilities and explores the ways in which law might respond to these challenges.

    By Alana Maurushat

  • Book

    Distributed Denial of Service Attack and Defense

    Presenting the latest developments in this increasingly crucial field along with background context and survey material, this useful resource provides readers with a complete and self-contained resource for information about DDoS attacks and how to defend against them.

    By Shui Yu

  • Book

    E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

    Explaining key industry trends, especially the Federal Rules of Civil Procedure which are driving the adoption of e-discovery programs, this book will help your organization develop an effective electronic discovery program.

    By Karen Schuler

  • Book

    Effective Physical Security, Fifth Edition

    Featuring terminology, references, websites, appendices to chapters, and checklists, this detailed guide is a best-practices compendium that details the essential elements and latest developments in physical security protection.

    By Lawrence J. Fennelly

  • Book

    Effective Physical Security, Fourth Edition

    Containing contributions from expert security specialists in the field, this book provides a wealth of practical information on physical security and the process of securing a facility - from electronic surveillance and wiretapping to fundamental perimeter security principles.

    By Lawrence J. Fennelly

  • Book

    Effective Security Management, Fifth Edition

    Presenting a time-tested blend of common sense, wisdom, and humor, this book offers the most accurately balanced picture of a security manager's duties while wittily illustrating the array of pitfalls a new manager must learn to avoid in order to lead effectively.

    By Charles A. Sennewald

  • Book

    Electronic Access Control

    Describing the full range of EAC devices, this comprehensive introduction presents an arcane and complex subject with a conversational and layered learning approach that results in a thorough understanding of each point.

    By Thomas Norman

  • Book

    Elementary Information Security, Second Edition

    Providing a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities.

    By Richard E. Smith

  • Book

    Eleventh Hour CISSP: Study Guide, Second Edition

    Providing a study guide keyed directly to the most current version of the CISSP exam, this complete and concise book is streamlined to include only core certification information and is presented for ease of last minute studying giving you the best possible chance of acing the exam.

    By Eric Conrad, Joshua Feldman, Seth Misenar

  • Book

    Eleventh Hour CISSP: Study Guide, Third Edition

    Concisely covering the main objectives of the exam with key concepts highlighted, this thorough book is streamlined for maximum efficiency of study, making it ideal for professionals updating their certification or for those taking the test for the first time.

    By Eric Conrad, Joshua Feldman, Seth Misenar

  • Book

    Email Security: A Pocket Guide

    Considering e-mail in terms of its significance in a business context, this guide covers the main security issues affecting organizations that use e-mail, examining why effective security policy and safeguards are crucial in ensuring the company's viability.

    By Paul Dowland, Steven Furnell

  • Book

    EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide, Third Edition

    Including hands-on exercises, practice questions, and up-to-date legal information, this official Guidance-endorsed study guide prepares candidates for both Phase 1 and Phase 2 of the exam, as well as for practical use of the certification.

    By Steve Bunting

  • Book

    Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

    Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers.

    By Robert Ciesla

  • Book

    Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

    Providing cutting-edge cybersecurity solutions to defend against the most sophisticated attacks, this step-by-step book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems.

    By O. Sami Saydjari

  • Book

    Ensuring Digital Accessibility through Process and Policy

    Providing real-world examples throughout which highlight organizations that are doing an effective job with providing equal access to digital information for people with disabilities, this book serves as a one-stop guide to understanding digital accessibility, offering an overview of current laws, regulations, technical standards, evaluation techniques, as well as best practices and suggestions for implementing solutions and monitoring for compliance.

    By Anne Taylor, Daniel Goldstein, Jonathan Lazar

  • Book

    Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

    Presenting a comprehensive framework for coordinating an entire enterprise cybersecurity system, this book will teach you how to design, manage, and operate a balanced program that is pragmatic and realistic in the face of resource constraints and other real-world limitations.

    By Abdul Aslam, Chris K. Williams, Scott E. Donaldson, Stanley G. Siegel

  • Book

    Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

    Presenting a comprehensive framework for managing all aspects of an enterprise cybersecurity program, this book empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks.

    By Abdul Aslam, Chris K. Williams, Scott E. Donaldson, Stanley G. Siegel

  • Book

    Enterprise Governance of Information Technology: Achieving Strategic Alignment and Value

    Featuring numerous case examples from companies around the world, this book integrates theoretical advances and empirical data with practical application, including in-depth discussion of such frameworks as COBIT and VALIT, which are used to measure and audit the value of IT investments.

    By Steven De Haes, Wim Van Grembergen

  • Book

    Enterprise Security Architecture: A Business-Driven Approach

    Based around the SABSA layered framework, this book shows that having a comprehensive plan requires more than the purchase of security software-it requires a framework for developing and maintaining a system that is proactive.

    By Andrew Clark, David Lynas, John Sherwood

  • Book

    Enterprise Value: Governance of IT Investments: The Val IT Framework 2.0 Extract

    An introduction and primer for executives and senior management, this extract publication is an introduction to value management, based on "Enterprise Value: Governance of IT Investments, The Val IT Framework 2.0."

    By IT Governance Institute

  • Book

    Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English

    This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features.

    By Denny Cherry

  • Book

    Essential Skills for Hackers

    Presenting a foundation for the skills required to be an elite hacker, this book delves into understanding what TCP/IP is, and discusses protocol analysis and how analyzing the protocol will enable you to determine exactly what is taking place on a network.

    By Kevin Cardwell

  • Book

    Ethical Data and Information Management: Concepts, Tools and Methods

    Written by global experts in the field, this book sets out, in a clear and structured way, the fundamentals of ethics, and provides practical and pragmatic methods for organizations to embed ethical principles and practices into their management and governance of information.

    By Daragh O Brien, Katherine O’Keefe

  • Book

    Ethical Hacker's Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks

    This book is intended for pen testers, ethical hackers, security analysts, cyber professionals, security consultants, and anybody interested in learning about penetration testing, tools, and methodologies. Knowing concepts of penetration testing is preferable but not required.

    By Samir Kumar Rakshit

  • Book

    Ethical Hacking and Penetration Testing Guide

    Supplying a simple and clean explanation of how to effectively utilize a wide range of tools, this accessible resource details a four-step methodology for conducting an effective penetration test or hack to provide you with a fundamental understanding of offensive security.

    By Rafay Baloch

  • Book

    Ethical Hacking: A Hands-on Introduction to Breaking In

    Ethical Hacking is a crash course in modern hacking techniques. It's already being used to prepare the next generation of offensive security experts.

    By Daniel G. Graham

  • Book

    Ethically Hacking an Industrial Control System: Analyzing, Exploiting, Mitigating, and Safeguarding Industrial Processes for an Ethical Hacker

    This book begins by covering the fundamentals of industrial processes, then goes on to learn how to design and break them.

    By Sharon Ferrone

  • Book

    EU Annex 11 Guide to Computer Validation Compliance for the Worldwide Health Agency GMP

    Including examples from laboratory, clinical, and manufacturing computer systems, this book examines the implementation of computer systems compliance program based on EU Annex 11, and discusses electronic record integrity associated with stored information.

    By Orlando López

  • Book

    EU GDPR & EU-US Privacy Shield: A Pocket Guide, Second Edition

    This concise guide is essential reading for US organizations wanting an easy to follow overview of the GDPR and the compliance obligations for handling data of EU citizens, including guidance on the EU-U.S. Privacy Shield.

    By Alan Calder

  • Book

    EU GDPR: A Pocket Guide, School's Edition

    A clear, concise primer on data protection in schools, this book is an essential resource for anyone in the education sector looking to get to grips with the key principles of data privacy and the EU General Data Protection Regulation.

    By Alan Calder

  • Book

    EU GDPR: A Pocket Guide, Second Edition

    This book provides an accessible overview of the changes you need to make in your organization to comply with the new law.

    By Alan Calder

  • Book

    EU GDPR: An International Guide to Compliance

    This pocket guide will help you understand the Regulation, the broader principles of data protection, and what the GDPR means for businesses in Europe and beyond. Please visit https://www.itgovernancepublishing.co.uk/topic/uk-gdpr-supplemental-material to download your free Brexit supplement.

    By Alan Calder

  • Book

    EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide

    A clear and comprehensive guide to this new data protection law, this book explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties.

    By IT Governance Privacy Team

  • Book

    EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide, Fourth Edition

    This bestselling guide is the ideal companion for anyone carrying out a GDPR (General Data Protection Regulation) compliance project. It provides comprehensive guidance and practical advice on complying with the Regulation. Visit https://www.itgovernancepublishing.co.uk/topic/uk-gdpr-supplemental-material to download your free Brexit supplement.

    By IT Governance Privacy Team

  • Book

    EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide, Second Edition

    A clear and comprehensive guide to this new data protection law, this book explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand.

    By IT Governance Privacy Team

  • Book

    EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide, Third Edition

    A clear and comprehensive guide to this new data protection law, this book explains the Regulation and sets out the obligations of data processors and controllers in simple terms and will help you understand how to achieve compliance with the GDPR.

    By IT Governance Privacy Team

  • Book

    Evolution of Cyber Technologies and Operations to 2035

    Authored by leading experts in the field, this reference explores how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure.

    By Misty Blowers (ed)

  • Book

    Executive's Guide to Cyber Risk: Securing the Future Today

    In the Executive's Guide to Cyber Risk: Securing the Future Today, distinguished information security and data privacy expert Siegfried Moyo delivers an incisive and foundational guidance for executives tasked with making sound decisions regarding cyber risk management.

    By Siegfried Moyo

  • Book

    Exploding the Myths Surrounding ISO9000 : A Practical Implementation Guide

    Drawing on more than 25 years of the author's hands-on experience, this book debunks many of the common misconceptions about ISO9001, and provides clear, practical and up-to-date advice on how to implement a Quality Management System to maximum effect.

    By Andrew W. Nichols

  • Book

    Federated Identity Primer

    Explaining the concepts of digital identity, this book describes the technology behind and implementation of federated identity systems and helps you decide if federated identity is good for your system or web service.

    By Derrick Rountree

  • Book

    Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions

    Exploring a range of cybersecurity topics impacting financial enterprises, this book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals.

    By Jennifer L. Bayuk, Paul Rohmeyer

  • Book

    Firewall Design and Analysis

    Detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject, this unique book presents scientifically sound and practically useful methods for designing and analyzing firewall policies.

    By Alex X. Liu

  • Book

    Firewall Policies and VPN Configurations

    With in-depth coverage of the top market-leading firewall products, this book focuses on creating policies that apply to multiple products and offers numerous tips for troubleshooting remote connections.

    By Anne Henmi (ed)

  • Book

    Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies, 5th Edition

    The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world.

    By Carey Parker

  • Book

    Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies, Fourth Edition

    Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible.

    By Carey Parker

  • Book

    Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

    Complete with checklists, step-by-step instructions, and pictures, this practical, end-to-end guide on cyber safety and online security gives you just what you need to protect yourself without judgment, and with as little jargon as possible.

    By Carey Parker

  • Book

    Firewalls For Dummies, 2nd Edition

    With the handy tips and hints this book provides, you'll understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one for your home or business network.

    By Brian Komar, Joern Wettern, Ronald Beekelaar

  • Book

    FISMA Compliance Handbook, Second Edition

    Including coverage for both corporate and government IT managers, this authoritative book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish.

    By Laura P. Taylor

  • Book

    Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations, 2nd Edition

    Forensic Analytics reviews the methods and techniques that forensic accountants can use to detect intentional and unintentional errors, fraud, and biases.

    By Mark J. Nigrini

  • Book

    Forensic Radio Survey Techniques for Cell Site Analysis

    Intended to be used both as a textbook and as an aide memoire handbook for forensic radio survey engineers, particularly those working for official police agencies, this book focuses on radio surveys, the various types of survey, the techniques employed for each survey type and the considerations and potential problems that can be encountered when surveying different types of network.

    By Joseph Hoy

  • Book

    Foundations of Coding: Compression, Encryption, Error Correction

    Offering a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations, this book is an invaluable resource for understanding the various ways information is structured for its secure and reliable transmission.

    By Jean-Guillaume Dumas, Jean-Louis Roch, Sébastien Varrette, Éric Tannier

  • Book

    From Hacking to Report Writing: An Introduction to Security and Penetration Testing

    Teaching you everything you need to know to become a professional security and penetration tester, this thorough book provides on-the-job stories that will give you a good understanding of how you can apply what you have learned to real-world situations.

    By Robert Svensson

  • Book

    Fundamental of Cyber Security

    Using simple language, a crystal clear approach, and a straightforward presentation with examples and answered questions, this user-friendly book features the most current research findings in all aspects of information security.

    By Aatif Jamshed, Mayank Bhushan, Rajkumar Singh Rathore

  • Book

    Fundamentals of Information Risk Management Auditing: An Introduction for Managers and Auditors

    Providing insight into information risk management auditing for those considering a career in information risk management, and an introduction for non-specialists, such as those managing technical specialists, this book discusses the risks and controls that you may encounter when performing an audit of information risk, together with suggested mitigation approaches based on those risks and controls.

    By Christopher Wright

  • Book

    Fundamentals of Information Security: A Complete Go-to Guide for Beginners to Understand All the Aspects of Information Security

    For anyone who wants to make a career in Information Security, this book provides a roadmap for the technical and non-technical student and includes the skills and competencies required for each role in the field.

    By Sanil Nadkarni

  • Book

    Fundamentals of Information Systems Security, Second Edition

    Featuring a practical, conversational writing style and step-by-step examples, this book discusses the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today.

    By David Kim, Michael G. Solomon

  • Book

    GCIH GIAC Certified Incident Handler All-in-One Exam Guide

    Written by a recognized cybersecurity expert and seasoned author, this detailed study guide will help you prepare for the challenging GIAC Certified Incident Handler exam while also serving as an ideal on-the-job reference.

    By Nick Mitropoulos

  • Book

    GDPR Readiness: Creating a Data Privacy Plan, Self-Study Guide (Workplace Essentials Series)

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Velsoft Training Materials, Inc.

  • Book

    GDPR Readiness: Getting the Message Out, Self-Study Guide (Workplace Essentials Series)

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Velsoft Training Materials, Inc.

  • Book

    Getting Started with HIPAA

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Uday O. Ali Pabrai

  • Book

    GIAC Security Leadership Certification (GSLC) Exam Preparation: The How To Pass on Your First Try Certification Study Guide

    Offering numerous sample questions and critical time-saving tips, this self-study guide features highly realistic sample questions and exercises designed to strengthen understanding of GSLC concepts to ensure exam success on your first attempt.

    By William Manning

  • Book

    Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

    Go H*ck Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach.

    By Bryson Payne

  • Book

    Google Hacking for Penetration Testers, Volume 2

    Written by the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums, this book provides all the information you need to protect yourself from Google hackers.

    By Johnny Long

  • Book

    Governance and Internal Controls for Cutting Edge IT

    Based on practical experience and real-life models, this book explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs, and will enable them to apply security and control methods that are suitable for their business.

    By Karen F. Worstell

  • Book

    Governance of IT: An Executive Guide to ISO/IEC 38500

    A practical approach to best practices in IT governance, this valuable book shows how to govern, protect and manage information and technology assets, and will help you reduce the risk involved in delivering business information systems.

    By A. L. Holt

  • Book

    GPEN GIAC Certified Penetration Tester All-in-One Exam Guide

    Featuring exam-focused coverage of penetration testing methodologies, legal issues, and best practices, this effective self-study guide contains useful tips and tricks, real-world examples, and case studies drawn from authors' extensive experience.

    By Bill MacCormack, Ray Nutting

  • Book

    Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

    Offering field-tested remedies, case studies, and ready-to-deploy testing labs, this cutting-edge book presents techniques for finding and fixing critical security flaws and explains how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers.

    By Daniel Regalado, et al.

  • Book

    Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition

    Providing cutting-edge techniques for finding and fixing critical security flaws, this state-of-the-art resource explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-try testing labs.

    By Allen Harper, et al.

  • Book

    Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

    This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.

    By Daniel Fernandez, Dr. Allen Harper, Huáscar Tejeda, Michael Baucom, Moses Frost, Ryan Linn, Stephen Sims

  • Book

    Group Policy: Fundamentals, Security, and the Managed Desktop

    Teaching you the major categories of Group Policy, essential troubleshooting techniques, and how to manage your Windows desktops, this guide will get you up to speed on the latest Group Policy settings and more.

    By Jeremy Moskowitz

  • Book

    GSEC GIAC Security Essentials Certification All-in-One Exam Guide

    Providing learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations, this comprehensive resource will help you prepare for - and pass - the Global Information Assurance Certification's Security Essentials (GSEC) exam.

    By Ric Messier

  • Book

    GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition

    Get complete coverage of all the objectives on Global Information Assurance Certification's Security Essentials (GSEC) exam inside this comprehensive resource.

    By Ric Messier

  • Book

    Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services

    In the face of relentless pressure to get things done faster, this book facilitates rapid forecasting of capacity requirements, based on opportunistic use of available performance data and tools so that management insight is expanded but production schedules are not.

    By Neil J. Gunther

  • Book

    Guide to Computer Network Security, Second Edition

    Including both quickly-workable questions and more thought-provoking advanced exercises, this book exposes the various security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security.

    By Joseph Migga Kizza

  • Book

    Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices

    In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach responses - is central to defending organizations' interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.

    By Dietmar P.F. Möller

  • Book

    Hacker Techniques, Tools, and Incident Handling, Second Edition

    Providing readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them, this book examines the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

    By Sean-Philip Oriyano

  • Book

    Hacking and Penetration Testing with Low Power Devices

    Designed to keep you at the top of your game performing cutting-edge pen tests from anywhere in the world, this book shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered.

    By Philip Polstra

  • Book

    Hacking APIs: Breaking Web Application Programming Interfaces

    Hacking APIs will teach you how to test web APIs for security vulnerabilities.

    By Corey Ball

  • Book

    Hacking Exposed

    Revealing the techniques and tools that are used by both criminal and ethical hackers, this book provides an in-depth discussion of what hacking is all about and dives deep into the basic security procedures one should follow to avoid being exploited.

    By Soumya Ranjan Behera

  • Book

    Hacking Exposed 7: Network Security Secrets & Solutions

    Filled with case studies to expose hackers' latest devious methods and illustrate field-tested remedies, this guide will show you how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks.

    By George Kurtz, Joel Scambray, Stuart McClure

  • Book

    Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions

    Defend against the sneakiest attacks by looking at your Cisco network through the eyes of the intruder. With the help of this step-by-step guide, you'll prevent catastrophes by learning how new flaws in Cisco-centered networks are discovered and abused.

    By Andrei A. Mikhailovsky, Andrew A. Vladimirov, Janis N. Vizulis, Konstantin V. Gavrilenko

  • Book

    Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions

    Exposing the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries, this hands-on guide shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective.

    By Aaron Shbeeb, Bryan L. Singer, Clint E. Bodungen, Kyle Wilhoit, Stephen Hilt

  • Book

    Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition

    Providing up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology, this thorough resource fully explains the hacker's latest methods alongside ready-to-deploy countermeasures.

    By Aaron LeMasters, Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer

  • Book

    Hacking Exposed Mobile Security Secrets & Solutions

    Helping you identify and evade key threats across the expanding mobile risk landscape, this book covers the wide range of attacks to your mobile deployment, and provides ready-to-use countermeasures.

    By Jason Rouse, Joel Scambray, Mike Stanfield, Neil Bergman

  • Book

    Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

    Packed with relevant case studies and examples, this comprehensive guide offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures so you can establish a holistic security stance by viewing your infrastructure through the eyes of the nefarious cyber-criminal.

    By David Endler, Mark Collier

  • Book

    Hacking Exposed Web Applications: Web Application Security Secrets and Solutions, Third Edition

    Based on the author's many years as a security professional hired to break into the world's largest IT infrastructures, this definitive guide shows you how to meet the challenges of online security with a two-pronged "attack-countermeasure" approach.

    By Caleb Sima, Joel Scambray, Vincent Liu

  • Book

    Hacking Exposed Wireless: Wireless Security Secrets & Solutions, Third Edition

    Featuring expert coverage of ever-expanding threats that affect leading-edge technologies, this thorough guide will show innovative techniques that will enable you to exploit weaknesses in wireless network environments.

    By Johnny Cache, Joshua Wright

  • Book

    Hacking for Dummies, 4th Edition

    Fully updated for Windows 8 and the latest version of Linux, this authoritative guide explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.

    By Kevin Beaver

  • Book

    Hacking For Dummies, 5th Edition

    Is hacking something left up to the bad guys? Certainly not! This up-to-date resource will guide you in hacking your system to better protect your network against malicious attacks and recognize any vulnerabilities that are lurking in your system so you can fix them before someone else finds them.

    By Kevin Beaver

  • Book

    Hacking for Dummies, 6th Edition

    Whether you're worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently-with confidence and ease.

    By Kevin Beaver

  • Book

    Hacking for Dummies, 7th Edition

    Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.

    By Kevin Beaver

  • Book

    Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

    A must-read guide for professionals responsible for securing credit and debit card transactions, this unique resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.

    By Slava Gomzin

  • Book

    Hacking the Hacker: Learn from the Experts Who Take Down Hackers

    Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

    By Roger A. Grimes

  • Book

    Hacking Vim: A Cookbook to get the Most out of the Latest Vim Editor

    Providing recipes for easy-to-use hacks to customize and simplify your experience, this book explains basic changes that you can make to the appearance of the Vim editor and covers everything about using Vim scripts and scripting to extend functionality.

    By Kim Schulz

  • Book

    Hacking VoIP: Protocols, Attacks, and Countermeasures

    Raising awareness of the importance of VoIP security, this book describes potential attacks, explains VoIP's biggest weaknesses, and offers solutions for protecting against potential exposure and attacks.

    By Himanshu Dwivedi

  • Book

    Hacking Web Apps: Detecting and Preventing Web Application Security Problems

    Ensuring that you are covering the most vicious attacks out there, this guide not only lets you in on the anatomy of these attacks, but also tells you how to get rid of worms, trojans, and botnets - and how to defend against them in the future.

    By Mike Shema

  • Book

    Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

    Showing you how to dig into the Web and uncover the information many don't even know exists, this book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence.

    By Nutan Kumar Panda, Sudhanshu Chauhan

  • Book

    Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking

    Providing a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems, this book presents concrete examples and real-world guidance on how to protect against wireless access point attacks.

    By Jennifer Ann Kurtz

  • Book

    Hacking with Kali: Practical Penetration Testing Techniques

    With hands-on exercises and detailed examples and explanations, this complete book will walk the reader through the penetration testing lifecycle using the most advanced live disk available today, Kali Linux.

    By Andrew Bindner, James Broad

  • Book

    Hacking: The Art of Exploitation, Second Edition

    Sharing the art and science of hacking in a way that is accessible to everyone, this guide will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques.

    By Jon Erickson

  • Book

    Handbook of Biometric Anti-Spoofing: Trusted Biometrics Under Spoofing Attacks

    Presenting the latest work from a global selection of experts in the field, this thorough book reviews the state of the art in covert attacks against biometric systems and in deriving countermeasures to these attacks.

    By Mark S. Nixon, Stan Z. Li (eds), Sébastien Marcel

  • Book

    Handbook of Computer Networks and Cyber Security: Principles and Paradigms

    This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook.

    By Brij B. Gupta, Deepak Gupta, Dharma P. Agrawal, Gregorio Martínez Pérez

  • Book

    Handbook of Digital Forensics and Investigation

    Providing methodologies proven in practice for conducting digital investigations of all kinds , this unique guide offers case examples that give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations.

    By Eoghan Casey, et al.

  • Book

    Handbook of Digital Forensics of Multimedia Data and Devices

    Focusing on the interface between digital forensics and multimedia forensics, this book brings two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation.

    By Anthony T.S. Ho, Shujun Li (eds)

  • Book

    Handbook of FPGA Design Security

    Combining theoretical underpinnings with a practical design approach and worked examples, this book on managing security in FPGA designs is for researchers and practitioners in the electronic design automation (EDA) and FPGA communities.

    By Ted Huffmire, et al.

  • Book

    Handbook of Loss Prevention and Crime Prevention, Fifth Edition

    A comprehensive overview of current approaches to security and crime prevention, this book provides the tools and technologies to put these approaches into action, and information on a wide range of specific areas within the field of physical security.

    By Lawrence J. Fennelly

  • Book

    Handbook of Research on Network Forensics and Analysis Techniques

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Gulshan Shrivastava, et al.

  • Book

    Handbook of Surveillance Technologies, Third Edition

    Using a narrative style and more than 950 illustrations, this handbook is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies-offering the latest in surveillance and privacy issues.

    By J.K. Petersen

  • Book

    Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems

    Presenting an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives, this book ensures that the systems of these connected products operate safely, without creating hazards to us and those around us.

    By Edward Griffor (ed)

  • Book

    Hands-On Ethical Hacking and Network Defense

    This title will be removed from the Skillsoft library on May 24, 2024.

    By James E. Corley, Kent Backman, Michael T. Simpson

  • Book

    Hands-on Incident Response and Digital Forensics

    Exploring the relationship between incident response and digital forensics, this practical guide will show you how to undertake each and balance them to meet the needs of an organization in the event of an information security incident.

    By Mike Sheward

  • Book

    Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark (English Edition)

    This book offers readers with knowledge and skillset to identify, exploit and control the security vulnerabilities present in commercial web applications including online banking, mobile payments and e-commerce applications.

    By Richa Gupta

  • Book

    Hardware Security: A Hands-on Learning Approach

    Illustrated through theory, case studies and well-designed, hands-on laboratory exercises, this handy reference provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure.

    By Mark Tehranipoor, Swarup Bhunia

  • Book

    HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide

    Designed to help you pass the rigorous exam with ease while also serving as an on-the-job reference, this book provides complete coverage of all seven security and privacy exam domains along with examples and practice questions that closely match those on the actual test.

    By Sean P. Murphy

  • Book

    HCISPP Study Guide

    Containing only what you need to pass the HCISPP exam, this complete and effective study guide will help you prepare for the exam and put you on the forefront of health care information privacy and security.

    By Justin Rainey, Timothy Virtue

  • Book

    Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

    Intended for practitioners and investigators, this detailed resource exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them.

    By Brett Shavers, John Bair

  • Book

    Homeland Security Techniques and Technologies

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Jesus Mena

  • Book

    Honeypots and Routers: Collecting Internet Attacks

    Explaining the role of honeypots and routers in capturing Internet attacks, this detailed book provides readers with an understanding of honeypot concepts and architecture, and outlines the skills necessary to deploy the best honeypot solutions for any environment.

    By Habib-ur Rehman, Mohssen Mohammed

  • Book

    Hospital and Healthcare Security, Sixth Edition

    Conveying a wide spectrum of topics in an easy to comprehend format, this new edition reflects the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence, and emergency preparedness and management.

    By Don MacAlister, Tony W. York

  • Book

    How Cyber Security Can Protect Your Business: A Guide for All Stakeholders

    Including a checklist to help you focus on higher-priority cyber areas, this book explains how a strategic approach to cyber security can benefit your organization and provides an effective and efficient framework for managing cyber governance, risk and compliance.

    By Christopher Wright

  • Book

    How Cybersecurity Really Works: A Hands-On Guide for Total Beginners

    How Cybersecurity Really Works is the perfect introduction to cybersecurity. Whether you're a computer science student or a business professional, it will teach you the basics without all the jargon.

    By Sam Grubb

  • Book

    How the Internet Really Works: An Illustrated Guide to Protocols, Privacy, Censorship, and Governance

    How the Internet Really Works answers these questions and more. Using clear language and whimsical illustrations, the authors translate highly technical topics into accessible, engaging prose that demystifies the world's most intricately linked computer network.

    By ARTICLE 19

  • Book

    How to Achieve 27001 Certification: An Example of Applied Compliance Management

    Using security standards ISO 17799 and ISO 27001 as a basis, this thorough guide helps an organization align its security and organizational goals so it can generate effective security, compliance, and management programs.

    By Keith D. Willett, Sigurjon Thor Arnason

  • Book

    How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

    Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.

    By Nicholas Oles

  • Book

    How to Complete a Risk Assessment in 5 Days or Less

    With user-friendly checklists, forms, questionnaires, and sample assessments, this step-by-step guide demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization.

    By Thomas R. Peltier

  • Book

    How to Define and Build an Effective Cyber Threat Intelligence Capability

    Discussing how to create a proactive strategy for digital security, this book offers a clarifying definition of what Cyber Threat Intelligence is, describes how to communicate its value to business, and lays out concrete steps toward implementing Intelligence-Led Security.

    By Henry Dalziel

  • Book

    How to Hack Like a Ghost: Breaching the Cloud

    Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment.

    By Sparc Flow

  • Book

    How to Measure Anything in Cybersecurity Risk

    A ground shaking exposé on the failure of popular cyber risk management methods, this insightful book exposes the shortcomings of current "risk management" practices and offers a series of improvement techniques that help you fill the holes and ramp up security.

    By Douglas W. Hubbard, Richard Seiersen

  • Book

    How to Measure Anything in Cybersecurity Risk, Second Edition

    In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity.

    By Douglas W. Hubbard, Richard Seiersen

  • Book

    HP NonStop Server Security

    This handbook provides readable advice on the key decisions in safeguarding the numerous components of the HP NonStop environment.

    By XYPRO Technology Corporation

  • Book

    Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques

    Through the eyes of the author who has several years of experience in the subject, this book immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques.

    By Vinny Troia

  • Book

    IAPP CIPM Certified Information Privacy Manager Study Guide

    An essential resource for anyone preparing for the CIPM certification exam and a career in information privacy

    By Joe Shelley, Mike Chapple

  • Book

    IAPP CIPP / US Certified Information Privacy Professional Study Guide

    This book is perfect for anyone considering a career in privacy or preparing to tackle the challenging IAPP CIPP exam as the next step to advance an existing privacy role, the IAPP CIPP/US Certified Information Privacy Professional Study Guide offers you an invaluable head start for success on the exam and in your career as an in-demand privacy professional.

    By Joe Shelley, Mike Chapple

  • Book

    Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

    Detailing the risks associated with poor identity management practices, this book outlines the techniques that threat actors and insiders leverage, and the operational best practices that organizations should adopt to protect against identity theft and account compromises.

    By Darran Rolls, Morey J. Haber

  • Book

    Identity Management: Concepts, Technologies, and Systems

    Providing a comprehensive overview of current trends and future directions in identity management, this practical resource offers an in-depth understanding of how to design, deploy and assess identity management solutions.

    By Elisa Bertino, Kenji Takahashi

  • Book

    Implementing 802.1X Security Solutions for Wired and Wireless Networks

    With step-by-step instructions, recommendations, and troubleshooting tips, this guide will steer you safely around the pitfalls, smooth out the rough patches, and guide you to a successful implementation of 802.1x in both wired and wireless networks.

    By Jim Geier

  • Book

    Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

    A step-by-step guide on implementing secure ISMS for your organization, this book offers best practices, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls.

    By Abhishek Chopra, Mukund Chaudhary

  • Book

    Implementing an Integrated Management System (IMS): The Strategic Approach

    Ideal for the C-suite, directors, compliance managers, auditors and trainers, this guide will help you understand the benefits of an IMS (integrated management system) and how you can successfully implement one in your organization.

    By Alan Field

  • Book

    Implementing Analytics: A Blueprint for Design, Development, and Adoption

    Demystifying the concept, technology and application of analytics, this book breaks its implementation down to repeatable and manageable steps, making it possible for widespread adoption across all functions of an organization.

    By Nauman Sheikh

  • Book

    Implementing Cryptography Using Python

    Walking you through creating secure communications in public channels using public-key cryptography, this easy-to-read guide provides real-world examples to aid in your understanding of the pros and cons of various authentication methods.

    By Shannon W. Bray

  • Book

    Implementing Digital Forensic Readiness: From Reactive to Proactive Process

    Including chapter introductions, objectives, summaries, and definitions, this book shows information security and digital forensic professionals how to increase operational efficiencies by implementing a proactive approach to digital forensics throughout their organization.

    By Jason Sachowski

  • Book

    Implementing Service Quality based on ISO/IEC 20000: A Management Guide, Third Edition

    Written for companies of any size, anywhere, this up-to-date, step-by-step management guide will lead you through implementation and certification, enabling you to streamline your management processes and offer first-class customer service at competitive prices.

    By Michael Kunas

  • Book

    Implementing SSH: Strategies for Optimizing the Secure Shell

    Prevent unwanted hacker attacks with this detailed guide that will show you how to strengthen your company's system defenses, keep critical data secure, and add to the functionality of your network by deploying SSH.

    By Himanshu Dwivedi

  • Book

    Implementing SSL/TLS Using Cryptography and PKI

    Whether you have a working knowledge of cryptography or not, this practical guide will help you understand the internals of the SSL and TSL libraries so that when it comes time to use one, you will have a firm understanding of what takes place at each stage.

    By Joshua Davies

  • Book

    Implementing the NIST Cybersecurity Framework

    Through the guidance and templates provided in this text, this book brings a unique and valuable understanding of how to implement the Cybersecurity Framework (CSF).

    By ISACA

  • Book

    Incident Response & Computer Forensics, Third Edition

    Featuring real-world case studies that reveal the methods behind--and remediation strategies for--today's most insidious attacks, this practical resource arms you with the information you need to get your organization out of trouble when data breaches occur.

    By Jason T. Luttgens, Matthew Pepe

  • Book

    Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and other Industrial Control Systems

    Discussing common pitfalls and mistakes and how to avoid them, this book examines the unique protocols and applications that are the foundation of industrial control systems and provides you with comprehensive guidelines for their protection.

    By Eric Knapp

  • Book

    Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and other Industrial Control Systems, Second Edition

    Providing a thorough understanding of the unique challenges facing critical infrastructures, this book presents guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.

    By Eric D. Knapp, Joel Thomas Langill

  • Book

    Infonomics: How to Monetize, Manage, and Measure Information as an Asset for Competitive Advantage

    Providing a set of new ideas, frameworks, evidence, and approaches, this book is for the burgeoning force of chief data officers (CDOs) and other information and analytics leaders in their valiant struggle to help their organizations become more infosavvy.

    By Douglas B. Laney

  • Book

    Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud

    This book will show you how to implement information assurance risk management strategies within your organization.

    By Bradley Fowler

  • Book

    Information Assurance Architecture

    Providing a framework for organizations to align information assurance with the enterprise and their overall mission, this practical book demonstrates a disciplined approach in thinking about, planning, implementing and managing security.

    By Keith D. Willett

  • Book

    Information Assurance: Managing Organizational IT Security Risks

    The authors of this text lay out a detailed strategy for defining information security, establishing IA goals, providing training for security awareness, and conducting airtight incident response to system compromise.

    By Dan W. Jennings, Joseph G. Boyce

  • Book

    Information Governance and Security: Protecting and Managing Your Company's Proprietary Information

    Including real-world examples and cases to help illustrate key concepts and issues, this step-by-step book explains how to create and implement the policies, procedures and training necessary to keep an organization's proprietary information safe from cyber and physical compromise.

    By John G. Iannarelli, Michael O'Shaughnessy

  • Book

    Information Governance: Concepts, Strategies and Best Practices, Second Edition

    Backed by expert insight and crucial advice from a leading authority in the field, this step-by-step book is a highly practical and deeply informative guide for the implementation of effective Information Governance (IG) procedures and strategies.

    By Robert F. Smallwood

  • Book

    Information Governance: Concepts, Strategies, and Best Practices

    Written by one of the most recognized and published experts on information governance, this thorough book provides step-by-step guidance for developing information governance strategies and practices to manage risk in the use of electronic business documents and records.

    By Robert F. Smallwood

  • Book

    Information Risk Management: A practitioner's guide, 2nd Edition

    This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme.

    By David Sutton

  • Book

    Information Security and IT Risk Management

    Designed for an introductory course on IS Security, this introductory book provides a hands-on immersion in essential system administration, service and application installation and configuration, security tool use, TIG implementation and reporting.

    By Alex Campoe, Eric Pierce, Manish Agrawal

  • Book

    Information Security Auditor: Careers in information security

    Confronting the typical stereotype associated with the role of information security (or assurance) auditor, this practical book offers an excellent introduction to the role, covering areas such as purpose, required skills, responsibilities, interface and career progression, as well as tools, standards and frameworks related to the role.

    By Wendy Goucher

  • Book

    Information Security Breaches: Avoidance and Treatment based on ISO27001, 2nd Edition

    Offering clear guidance on how to treat an information security breach, this book explains all the plans and procedures you have to put in place to minimise damage and return to business as usual if you do discover a breach.

    By Michael Krausz

  • Book

    Information Security for Managers

    Utilizing an incremental development method called knowledge scaffolding, this text provides an overview of conceptual and applied knowledge of information and systems security.

    By Daniel C. Phelps, John N. Gathegi, Michael Workman

  • Book

    Information Security Governance: Framework and Toolset for CISOs and Decision Makers

    Presenting tools and examples allowing the various managers to take on their roles, this book presents a framework to model the main activities of information security management and governance.

    By Andrej Volchkov

  • Book

    Information Security Governance: Guidance for Information Security Managers

    Discussing how to develop an information security strategy within an organization's governance framework, this book provides guidance on determining information security objectives and how to measure progress toward achieving them.

    By W. Krag Brotby

  • Book

    Information Security Law: The Emerging Standard for Corporate Compliance

    Taking a high level view of the multitude of security laws and regulations, this guide explains the common approach of most security laws, and seeks to help businesses understand the issues that they need to address to become generally legally compliant.

    By Thomas J. Smedinghoff

  • Book

    Information Security Management Audit/Assurance Program

    Designed as a review tool and starting point for the completion of a specific assurance process, this guide evaluates the scope of the information security management organization and determines whether essential functions are being addressed effectively.

    By ISACA

  • Book

    Information Security Management Handbook, Sixth Edition, Volume 1

    Promoting the view that the management, ethics, and values of an organization leads directly to its information security program, this guide addresses up-to-date issues in this increasingly important area.

    By Harold F. Tipton, Micki Krause

  • Book

    Information Security Management Handbook, Sixth Edition, Volume 3

    In step with the lightning-quick, increasingly fast pace of change in the technology field, this book fully explores access control, telecommunications and network security, information security and risk management, application security, and cryptography.

    By Harold F. Tipton, Micki Krause (eds)

  • Book

    Information Security Management Handbook, Sixth Edition, Volume 6

    Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, this comprehensive reference facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

    By Harold F. Tipton, Micki Krause Nozaki (eds)

  • Book

    Information Security Management Handbook, Sixth Edition, Volume 7

    Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, this guide facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

    By James S. Tiller (eds), Richard O'Hanley

  • Book

    Information Security Management Principles, Third Edition

    Including coverage of the security of cloud-based resources, this book provides significant first steps along the path of dealing with information assurance in a realistic and comprehensive manner.

    By Amanda Finch, Andy Taylor, David Alexander, David Sutton

  • Book

    Information Security Management: Concepts and Practice

    Filled with review questions, workshops, and real-world examples, this authoritative and practical classroom resource provides a general overview of security auditing before examining the various elements of the information security life cycle.

    By Bel G. Raggad

  • Book

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference

    Highlighting key terminology, policy development concepts and methods, and suggested document structures, this practical guide includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards.

    By Douglas J. Landoll

  • Book

    Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0

    Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, this book will help readers elicit management opinions on information security and document the formal and informal procedures currently in place.

    By Barry L. Williams

  • Book

    Information Security Risk Analysis, Third Edition

    Presenting case studies and examples of all risk management components, this authoritative reference provides you with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment in a matter of days.

    By Thomas R. Peltier

  • Book

    Information Security Risk Assessment Toolkit: Practical Assessments Through Data Collection and Data Analysis

    Based on the authors' experiences of real-world assessments, reports, and presentations, this thorough book gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

    By Jason L. Martin, Mark Ryan M. Talabis

  • Book

    Information Security Risk Management for ISO 27001 / ISO 27002, Third Edition

    Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits.

    By Alan Calder

  • Book

    Information Security Risk Management for ISO27001 /ISO27002

    Explaining in practical detail how to carry out an information security risk assessment, this book offers expert guidance on planning and implementing a risk assessment and protecting your business information.

    By Alan Calder, Steve G. Watkins

  • Book

    Information Security Risk Management for ISO27001/ISO17799

    Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, this book explains in practical detail how to carry out an information security risk assessment.

    By Alan Calder, Steve G. Watkins

  • Book

    Information Security: A Practical Guide

    Covering everything from your first day at work as an information security professional to developing and implementing enterprise-wide information security processes, this book provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.

    By Tom Mooney

  • Book

    Information Security: Principles and Practice, Second Edition

    Featuring a wide array of new information on the most current security issues, this practical book provides the skills and knowledge readers need to tackle any information security challenge.

    By Mark Stamp

  • Book

    Information Technology Control and Audit, Third Edition

    Including guidelines for preparing for the CISA Exam, as well as numerous illustrations, graphs and charts to help readers visualize the concepts, this book serves as an introductory reference to IT governance, controls, and auditing.

    By Frederick Gallegos, Sandra Senft

  • Book

    Information Technology Risk Management and Compliance in Modern Organizations

    This title will be removed from the Skillsoft library on May 24, 2024.

    By John Walp, Manish Gupta, Pavankumar Mulgund (eds), Raj Sharman

  • Book

    Information Technology Security Fundamentals

    Assisting managers in understanding the role of IT Security in their enterprise, this book defines security from an organizational perspective, then builds upon that by discussing issues related to low-level technologies and higher level management issues like security policy.

    By Bryan Hosack, Glen Sagers

  • Book

    Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within

    Detailing the measures that organizations can implement to ensure high-impact quick wins, this in-depth book looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security.

    By Julie E. Mehan

  • Book

    Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

    Written to teach IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructures, this pertinent book reveals ways to mitigate these risks.

    By Eric Cole, Sandra Ring

  • Book

    Intelligence-Based Security in Private Industry

    Using case studies to describe initiatives needed to implement an intelligence-based security program, this book describes key aspects of intelligence-based security, including risk and vulnerability assessments, analyzing external and internal threats, and "blended" physical and cyber security.

    By Thomas A. Trier

  • Book

    Intelligent Edge Computing for Cyber Physical Applications

    Intelligent Edge Computing for Cyber Physical Applications introduces state-of-the-art research methodologies, tools and techniques, challenges, and solutions with further research opportunities in the area of edge-based cyber-physical systems.

    By B. B. Gupta, D. Jude Hemanth, Mohamed Elhoseny, Swati Vijay Shinde

  • Book

    Intelligent Network Video: Understanding Modern Video Surveillance Systems

    An essential resource for security system designers, consultants, and installers, as well as business and security managers, this book provides detailed coverage of advanced digital networking and intelligent video capabilities and optimization.

    By Fredrik Nilsson

  • Book

    Internet Searches for Vetting, Investigations, and Open-Source Intelligence

    Offering some of the challenges, risks, and caveats to overcome in exploiting the potential of Internet searching and analysis, this valuable resource covers the legal, policy, privacy and management issues posed by Internet misbehavior and the availability of evidence.

    By Edward J. Appel

  • Book

    Introduction to Cyber-Warfare: A Multidisciplinary Approach

    Presenting detailed case studies of cyber-attacks, this in-depth and cutting edge book analyzes the information technology, military, policy, social, and scientific issues that are in play within cyber-warfare.

    By Andrew Ruef, Jana Shakarian, Paulo Shakarian

  • Book

    Introduction to Genetic Algorithms

    Including numerous hands-on problems and solutions, this comprehensive book is a helpful guide and a valuable source of information about Genetic Algorithm concepts for their several practical applications.

    By S.N. Deepa, S.N. Sivanandam

  • Book

    Introduction to Network Security

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Neal Krawetz

  • Book

    Introduction to Network Security: Theory and Practice

    Providing students with a solid base on which to build critical thinking skills, this book offers an overview of network security before progressing to security threats, key protocols and network perimeter defenses, then concludes with cloud security and anti-malicious software - hot topics in both industry and academia.

    By Jie Wang, Zachary A. Kissel

  • Book

    Introduction to Public Key Infrastructures

    Including detailed pointers to relevant standards and implementation guidelines, as well as exercises and solutions, this detailed resource explains the most important concepts underlying public key infrastructures (PKIs) and discusses relevant standards, implementations, and applications.

    By Alexander Wiesmaier, Evangelos Karatsiolis, Johannes A. Buchmann

  • Book

    Introduction to Security, 10th Edition

    With a heavy focus on current and future security issues, this primer provides an overview of the security industry with an emphasis on the theories of security and loss prevention that have shaped the profession.

    By David C. Walters, Edward P. Halibozek, Robert J. Fischer

  • Book

    Introduction to Social Media Investigation: A Hands-on Approach

    Featuring hands-on tutorials and case studies, and offering additional data-gathering techniques, this book presents an overview of social media and discusses special skills and techniques to use when conducting investigations.

    By Jennifer Golbeck

  • Book

    Introduction to Surveillance Studies

    Enhanced with numerous photos, and featuring an examination of pros and cons, this book explores technological trends, past- and present-day rationales for surveillance and surveillance devices, and current social issues surrounding them.

    By J. K. Petersen

  • Book

    iOS Penetration Testing: A Definitive Guide to iOS Security

    Unearthing some of the most significant attacks threatening iOS applications in recent times, this book will teach you the methods of patching them to make payment transactions and personal data sharing more secure.

    By Kunal Relan

  • Book

    iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad, and iOS Devices

    Detailing the techniques to forensically acquire the iPhone, iPad and other iOS devices, this book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner.

    By Andrew Hoog, Katie Strzempka

  • Book

    ISO 27001 Controls: A Guide to Implementing and Auditing

    Ideal for information security managers, auditors, consultants and organizations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001.

    By Bridget Kenyon

  • Book

    ISO 9000 Quality Systems Handbook: Using the Standards as a Framework for Business Improvement, Sixth Edition

    Packed with insights into how the standard has been used, misused and misunderstood, this guide will show you effective quality management using the ISO 9000 family of standards as a framework for business process management (BPM) and improvement.

    By David Hoyle

  • Book

    ISO 9001:2015: A Pocket Guide

    Designed to help ensure the quality of your products and services, increase customer satisfaction, and enhance your business' efficiency, this concise, handy guide includes a brief history of quality management and ISO 9001; useful definitions of terminology; requirements for a QMS; some of the myths surrounding ISO 9001 certification; and more.

    By Nick Orchiston, Steve Watkins

  • Book

    ISO/IEC 20000: An Introduction To The Global Standard For Service Management

    Helping you ensure that your IT service management processes align with your business needs, this guide contains invaluable advice on how to define the appropriate scope for assessment against ISO20000 and how service management activities are audited.

    By David Clifford

  • Book

    ISO/IEC 27001:2022: An Introduction to Information Security and the ISMS Standard

    Get up to speed with the ISO 27001:2022 updates and keep your information secure. Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022.

    By Steve G Watkins

  • Book

    ISO/IEC 27701: 2019: An Introduction to Privacy Information Management

    An introduction to the Standard, this concise resource seeks to aid those organizations looking to improve their privacy information management regime, particularly where ISO/IEC 27701:2019 is involved.

    By Alan Shipman, Steve Watkins

  • Book

    ISO/IEC 38500: A Pocket Guide, Second Edition

    This useful pocket guide is an ideal introduction for those wanting to understand more about ISO 38500. It describes the scope, application and objectives of the Standard and outlines its six core principles.

    By Alan Calder

  • Book

    ISO/IEC 38500: The IT Governance Standard

    Helping you to understand both this new standard and the complex area of IT governance, this guide includes an overview of the ISO/IEC 38500 standard, a framework for good IT governance, project governance, and the Calder-Moir Framework.

    By Alan Calder

  • Book

    ISO14001 Step by Step: A Practical Guide

    Intended to help you implement an environmental management system (EMS), this guide will show you how to achieve compliance with ISO14001, manage environmental risks, prepare to deal with an emergency, and improve the image of your brand.

    By Asif Hayat Khan, Naeem Sadiq

  • Book

    ISO19770-1:2012 SAM Process Guidance: A Kick-Start to Your SAM Programme

    Aimed at anyone looking to gain a better understanding of the concepts of software asset management and the resulting benefits it can bring to their business, this book offers a concise summary of the principles conveyed by ISO 19770-1: 2012.

    By Rory Canavan

  • Book

    ISO22301: A Pocket Guide

    How would your organization keep going in the event of a crisis? To minimize the impact of disaster, you need to implement a Business Continuity Management System (BCMS) - and the expert advice in this guide will help you ensure your organization develops one that is fit for purpose.

    By Tony Drewitt

  • Book

    ISO27000 and Information Security: A Combined Glossary

    A combined glossary, enabling you to find explanations of geek slang, procedural language and acronyms all in one place, this book provides you with authoritative explanations of those information security terms that are used across the ISO framework.

    By Alan Calder, Steve G. Watkins

  • Book

    ISO27001 / ISO27002: A Pocket Guide, Second Edition

    Offering a wider view of what it means to implement an ISO27001 Information Security Management System (ISMS), this handy guide is an essential overview of two key information security standards that cover the formal ISMS, and the best-practice recommendations.

    By Alan Calder

  • Book

    ISO27001 in a Windows(r) Environment: The Best Practice Handbook for a Microsoft(r) Windows Environment, 3rd Edition

    Detailing the various controls required under ISO27001, together with the relevant Microsoft products that can be used to implement them, this book explains how to make the most of Windows security features, and bridges the knowledge gap between ISO27001 and Windows security.

    By Brian Honan

  • Book

    ISO27001-13 Assessments Without Tears: A Pocket Guide, Second Edition

    Written in a clear, plain style, this concise guide explains what an ISO 27001 assessment is, why organizations bother with them, and what individual staff should do and, perhaps as importantly, not do if an auditor chooses to question them.

    By Steve G. Watkins

  • Book

    ISO27001/ISO27002: A Pocket Guide

    Giving a useful overview of these two important information security standards, this guide provides background to the standards, the certification process, management responsibility, risk assessment, implementation, and much more.

    By Alan Calder

  • Book

    IT Audit, Control, and Security

    Describing the types of internal controls, security, and integrity procedures that management must build into its automated systems, this book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

    By Robert R. Moeller

  • Book

    IT Auditing and Application Controls for Small and Mid-Sized Enterprises: Revenue, Expenditure, Inventory, Payroll, and More

    Uniquely focused on the IT needs of auditors serving the small- to medium-sized business, this straightforward guide includes conceptual overviews of key IT auditing issues, as well as concrete hands-on tips and techniques.

    By Harry Howe, Jason Wood, William Brown

  • Book

    IT Auditing: Using Controls to Protect Information Assets, Second Edition

    Featuring real-world examples, ready-to-use checklists, and valuable templates, this guide explains, step by step, how to implement a successful, enterprise-wide IT audit program.

    By Chris Davis, Kevin Wheeler, Mike Schiller

  • Book

    IT Auditing: Using Controls to Protect Information Assets, Third Edition

    Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program.

    By Brian Wrozek, Chris Davis, Mike Kegerreis, Mike Schiller

  • Book

    IT Compliance and Controls: Best Practices for Implementation

    Offering a structured architectural approach, this book provides an understanding of the world of compliance from the perspective of what the problems are, where they come from, and how to position your company to deal with them today and into the future.

    By James J. DeLuccia IV

  • Book

    IT Governance: A Manager's Guide to Data Security and ISO27001/ISO 27002, 4th Edition

    Written for companies looking to protect and enhance their information security management systems, this book allows them to ensure that their IT security strategies are coordinated, coherent, comprehensive and cost effective.

    By Alan Calder, Steve Watkins

  • Book

    IT Governance: A Pocket Guide

    Providing an introduction on how to approach this complex subject, this guide offers a basic understanding of how an organization's Information Technology supports and enables the achievement of its strategies and objectives.

    By Alan Calder

  • Book

    IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002, Seventh Edition

    With information on risk assessments, compliance, equipment and operations security, controls against malware and asset management, this book is the definitive guide to implementing an effective information security management and governance system.

    By Alan Calder, Steve Watkins

  • BOOK SUMMARY

    IT Governance: An International Guide to Data Security and ISO27001/ISO27002, 6th Edition

    IT Governance is a guide for every manager who seeks to safeguard and improve his or her company's information security management system. In this Summary, we discuss the salient points of the book based on our interpretation of its contents.

    By Alan Calder, Steve Watkins

  • Book

    IT Governance: Implementing Frameworks and Standards for the Corporate Governance of IT

    Outlining the steps to meet today's corporate and IT governance requirements, this book offers guidance on how board executives and IT professionals can navigate and deploy the numerous IT management and IT governance frameworks and standards.

    By Alan Calder, Steve Moir

  • Book

    IT Induction and Information Security Awareness: A Pocket Guide

    Information security breaches tend to occur as a result of human, as well as technological, failings; however, the human factor usually receives far less attention. This concise guide will show you how you can improve information security for your organization through effective employee training.

    By Valerie Maddock

  • Book

    IT Security Controls: A Guide to Corporate Standards and Frameworks, 1st Edition

    The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.).

    By Oben Kuyucu, Virgilio Viegas

  • Book

    IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

    Providing a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization, this book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies.

    By Lance Hayden

  • Book

    IT Security Project Management Handbook

    Rather than losing sleep at night wondering who's wandering around your network in the dark, this practical book will help you create a comprehensive solution that meets your security needs today and will allow you to address future security requirements.

    By Susan Snedaker

  • Book

    IT Security Risk Control Management: An Audit Preparation Plan

    Explaining how to construct an information security program, from inception to audit, this book includes enduring, practical, hands-on advice and actionable behavior on how to craft a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constant changing threats.

    By Raymond Pompon

  • Book

    ITAF: A Professional Practices Framework for IS Audit/Assurance, 3rd Edition

    Defining terms and concepts specific to IS assurance, this resource provides a source through which IS audit and assurance professionals can seek guidance, research policies and procedures, obtain audit and assurance programs and develop effective reports.

    By ISACA

  • Book

    Jump-Start Your SOC Analyst Career: A Roadmap to Cybersecurity Success

    Sharing real-world insights and practical tips, this book highlights personal stories from five SOC professionals at various career levels with keen advice that is immediately applicable to your own journey.

    By Jarrett Rodrick, Tyler Wall

  • Book

    Learn Penetration Testing with Python 3.x

    This book starts with an understanding of penetration testing and red teaming methodologies and teaches Python 3.x from scratch for those who are not familiar with programming. The book gives the skills of how to create scripts for cracking, and brute force attacks.

    By Yehia Elghaly

  • Book

    Lessons Learned: Critical Information Infrastructure Protection: How to Protect Critical Information Infrastructure

    Helping you understand how to protect your critical information infrastructure (CII), this book aims to teach the IT framework from within, allowing you to reduce dependence on IT systems and put in place the necessary processes and procedures to help protect your CII.

    By Toomas Viira

  • Book

    Linguistic Identity Matching

    A must-read for anyone involved in the purchase, design or use of identity matching systems, this book describes how linguistic knowledge can be used to create a more reliable and precise identity search, and looks at the practical benefits that can be achieved by implementing third-generation linguistic search technology.

    By Bertrand Lisbach, Victoria Meyer

  • Book

    Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali

    If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, this practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them.

    By OccupyTheWeb

  • Book

    Low Tech Hacking: Street Smarts for Security Professionals

    Containing detailed descriptions of potential threats and vulnerabilities, this informative guide focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses.

    By Jack Wiles, et al.

  • Book

    LPI Security Essentials Study Guide: Exam 020-100

    In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-premise and in the cloud.

    By David Clinton

  • Book

    LTE Security

    Providing first hand information from 3GPP insiders who explain the rationale for design decisions, this comprehensive resource shows how LTE security substantially extends GSM and 3G security.

    By Dan Forsberg, Günther Horn, Valtteri Niemi, Wolf-Dietrich Moeller

  • Book

    LTE Security, Second Edition

    A concise guide to the 3GPP LTE Security Standardization specifications, this essential book provides first-hand information from insiders who participated in decisively shaping SAE/LTE security in 3GPP, and can therefore explain the rationale for design decisions in this area.

    By Dan Forsberg, Günther Horn, Valtteri Niemi, Wolf-Dietrich Moeller

  • Book

    Machine Learning and Cognitive Science Applications in Cyber Security

    Highlighting such topics as anomaly detection, intelligent platforms, and triangle scheme, this publication examines different applications of cognition that can be used to detect threats and analyze data to capture malware.

    By Muhammad Salman Khan

  • Book

    Making Sense of Cybersecurity

    Making Sense of Cybersecurity is a crystal-clear overview of common cyber threats written for business and technical readers with no background in security.

    By Thomas Kranz

  • Book

    Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware

    Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware.

    By Abhijit Mohanta, Anoop Saldanha

  • Book

    Malware Analyst's Cookbook: Tools and Techniques for Fighting Malicious Code

    Security professionals face a constant battle against malicious software. This practical manual will improve your analytical capabilities and provide dozens of valuable, innovative and step-by-step solutions to dozens of common threats.

    By Blake Hartstein, Matthew Richard, Michael Hale Ligh, Steven Adair

  • Book

    Malware Data Science: Attack Detection and Attribution

    Whether you're a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, this thorough introduction will help you stay ahead of the curve.

    By Hillary Sanders, Joshua Saxe

  • Book

    Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides

    Authored by information security experts with real-world investigative experience, this field guide contains checklists, case studies, and expert analyst tips to help you dissect the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs.

    By Cameron H. Malin, Eoghan Casey, James M. Aquilina

  • Book

    Managing an Information Security and Privacy Awareness and Training Program, Second Edition

    Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies.

    By Rebecca Herold

  • Book

    Managing Online Risk: Apps, Mobile, and Social Media Security

    Including case studies, checklists, and policy samples, this book presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses.

    By Deborah Gonzalez

  • Book

    Managing Risk in Information Systems, Second Edition

    Written by industry experts, and using a wealth of examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk.

    By Darril Gibson

  • Book

    Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services

    Preparing the reader to build a directory using OpenLDAP, this book then employs this directory in the context of the network, taking a practical approach that emphasizes how to get things done.

    By Matt Butcher

  • Book

    Mathematical Foundations of Public Key Cryptography

    Helping students bridge the gap between math theory and crypto practice, this accessible book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography.

    By Guangwu Xu, Mingqiang Wang, Xianmeng Meng, Xiaoyun Wang

  • Book

    MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100

    In the MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100, a team of dedicated software architects delivers an authoritative and easy-to-follow guide to preparing for the SC-100 Cybersecurity Architect certification exam offered by Microsoft.

    By Kathiravan Udayakumar, Puthiyavan Udayakumar

  • Book

    Measuring and Managing Information Risk: A Fair Approach

    Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, this book provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity.

    By Jack Freund, Jack Jones

  • Book

    Metasploit: The Penetration Tester's Guide

    Whether your goal is to secure your own networks or to put someone else's to the test, this book teaches you how to harness the Metasploit framework and interact with the vibrant community of contributors.

    By David Kennedy, Devon Kearns, Jim O’Gorman, Mati Aharoni

  • Book

    MIT Sloan Management Review Article on Adding Cybersecurity Expertise to Your Board

    Most corporate boards lack directors with adequate skills to oversee cyber risk. New SEC regulations make correcting that deficiency more urgent.

    By Chon Abraham, Iria Giuffrida, Ronald R. Sims, Sasha Cohen O’Connell

  • Book

    Mobile Application Security with Open-Source Tools

    Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article examines insecure applications deployed in production systems as one of the most overlooked aspects in mobile security.

    By Sakthivel Rajendran

  • Book

    Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition

    Teaching you how to conduct mobile forensic investigations that are legal, ethical, and highly effective, this practical guide provides detailed information and fully explains the latest tools and methods along with features, examples, and real-world case studies.

    By Lee Reiber

  • Book

    Mobile Payment

    Comprising essential aspects of a successful mobile payment as well as successful case studies and practical examples, this comprehensive book is for all who are developing, offering and using mobile payment.

    By Thomas Lerner

  • Book

    Modern Cryptography: Applied Mathematics for Encryption and Information Security

    Authored by an InfoSec expert, this practical guide lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape.

    By Chuck Easttom

  • Book

    Modern Cybersecurity Practices: Exploring and Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization

    Showing you how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out, this book will teach you how to choose, design and implement a cybersecurity program that best fits your needs.

    By Pascal Ackerman

  • Book

    Moving Target Defense for Distributed Systems

    Designed for researchers and practitioners, this book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems.

    By Min Song, Sachin Shetty, Xuebiao Yuchi

  • Book

    Multimedia Security 2: Biometrics, Video Surveillance and Multimedia Encryption

    Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.

    By William Puech

  • Book

    My Data My Privacy My Choice: A Step-by-Step Guide to Secure Your Personal Data and Reclaim Your Online Privacy!

    Learn to secure your personal data & reclaim your online privacy! This book will teach you what you need to ensure that the information being leaked by your phone, your desktop, your browser, and your internet connection is minimal-to-none.

    By Rohit Srivastwa

  • Book

    Navigating the Cybersecurity Career Path

    In Navigating the Cybersecurity Career Path, decorated Chief Information Security Officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.

    By Helen E. Patton

  • Book

    Nessus, Snort & Ethereal Power Tools: Customizing Open Source Security Applications

    If you have Nessus, Snort, and Ethereal up and running and are ready to customize, code, and torque these tools to their fullest potential, use this go-to guide to detect malicious traffic, scan for vulnerabilities and capture only packets you care about.

    By Gilbert Ramirez, Neil Archibald, Noam Rathaus

  • Book

    Network and Data Security for Non-Engineers

    Presenting the tools, establishing persistent presence, and examining the use of sites as testbeds to determine successful variations of software that elude detection, this book explains network and data security by analyzing the Anthem breach step-by-step, and how hackers gain entry, place hidden software, download information, and hide the evidence of their entry.

    By Frank M. Groom, Kevin Groom, Stephan S. Jones

  • Book

    Network and Information Systems (NIS) Regulations: A Pocket Guide for Digital Service Providers

    This guide outlines the key requirements, details exactly which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance.

    By Alan Calder

  • Book

    Network and Information Systems (NIS) Regulations: A Pocket Guide for Operators of Essential Services

    This guide outlines the requirements for operators of essential services based on the Cyber Assessment Framework established by the National Cyber Security Centre (NCSC), including an explanation of the objectives, principles and indicators of good practice, and offers implementation guidance.

    By Alan Calder

  • Book

    Network and System Security, Second Edition

    Exploring practical solutions to a wide range of network and systems security issues, this comprehensive book is authored by leading experts in the field and addresses the immediate and long-term challenges in the authors' respective areas of expertise.

    By John R. Vacca (ed)

  • Book

    Network Forensics

    Offering intensive hands-on training with direct translation to real-world application, this book provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity.

    By Ric Messier

  • Book

    Network Hardening: An Automated Approach to Improving Network Security

    Examining the tools based on attack graphs that help reveal network hardening threats, this book provides an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs.

    By Lingyu Wang, Massimiliano Albanese, Sushil Jajodia

  • Book

    Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

    Providing mid-level IT engineers with the practical tips and tricks they need to harden their IT infrastructure, this book shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and includes tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.

    By Chris Chapman

  • Book

    Network Science and Cybersecurity

    Covering anomaly detection and algorithms for network security, this book introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.

    By Robinson E. Pino (ed)

  • Book

    Network Security and Cryptography: A Self-Teaching Introduction

    Featuring the latest material on emerging technologies and end of chapter review questions, this practical resource is a definitive guide to the principles and techniques of cryptography and network security.

    By Sarhan M. Musa

  • Book

    Network Security and its Impact on Business Strategy

    Providing innovative insights into the impact of m-commerce, m-learning, and m-knowledge management technologies, this book looks at the risks their usage has on different organizations, such as online stores, higher education institutions, health providers, and more.

    By Ionica Oncioiu

  • Book

    Network Security Assessment: From Vulnerability to Patch

    Using business case studies and examples of real world vulnerabilities, this detailed book takes readers from the creation of corresponding exploits, through a complete security assessment, to deploying patches to protect your network.

    By André Gold, Chris Gatford, Steve Manzuik

  • Book

    Network Security Attacks and Countermeasures

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Dileep Kumar G., M.K. Jayanthi (eds), Manoj Kumar Singh

  • Book

    Network Security Bible, 2nd Edition

    Addressing new techniques, technology, and methods for securing an enterprise worldwide, this comprehensive guide examines new trends and best practices and includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape.

    By Eric Cole

  • Book

    Network Security JumpStart: Computer and Network Security Basics

    Build your network security career on a solid foundation with these easy-to-understand explanations and realistic examples.

    By Matthew Strebe

  • Book

    Network Security Technologies and Solutions (CCIE Professional Development Series)

    With an easy-to-follow approach, this definitive reference helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure.

    By Yusuf Bhaiji

  • Book

    Network Security, Firewalls and VPNs, Second Edition

    Authored by an industry expert, this book provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization's network is connected to the public Internet.

    By J. Michael Stewart

  • Book

    Network Security: A Decision and Game-Theoretic Approach

    Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems.

    By Tamer Basar, Tansu Alpcan

  • Book

    Nine Steps to Success: An ISO27001:2013 Implementation Overview, Second Edition

    Outlining the nine essential steps to an effective Information Security Management System (ISMS) implementation, this no-nonsense guide presents key information that can mean the difference between project success and abject failure.

    By Alan Calder

  • Book

    Nine Steps to Success: An ISO27001:2013 Implementation Overview, Third Edition

    Providing a comprehensive overview of how to lead a successful ISO27001-compliant ISMS implementation in just nine steps, this no-nonsense guide is ideal for anyone tackling ISO27001 for the first time, and covers each element of the ISO27001 project in simple, non-technical language.

    By Alan Calder

  • Book

    Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

    By using disguise, espionage, stealth, and concealment, this book throws traditional pen testing methods out the window to demonstrate how thinking and acting like a ninja can actually grant you quicker, more complete access to a company's assets - before a hacker does.

    By Jason Andress, Thomas Wilhelm

  • Book

    NIST Cybersecurity Framework: A Pocket Guide

    Helping you take a structured, sensible, risk-based approach to cybersecurity, this guide serves as an introduction to the National Institute of Standards and Technology (NIST) and to its Cybersecurity Framework (CSF).

    By Alan Calder

  • Book

    No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

    Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.

    By Johnny Long

  • Book

    Noiseless Steganography: The Key to Covert Communications

    Discussing the implementation and steganalysis validation of ten Nostega-based methodologies, this text provides you with the tools to prevent your adversaries from suspecting the existence of covert communications altogether.

    By Abdelrahman Desoky

  • Book

    NTP Security: A Quick-Start Guide

    Providing an understanding of how NTP is critical to modern networks and how it can be exploited, this book will show you how an attacker can wreak havoc on an insecure network and offers guidance to help you manage your system and make it more secure.

    By Allan Liska

  • Book

    Official (ISC)2 Guide to the CISSP CBK, Fourth Edition

    Offering a compendium of information security topics, this officially sanctioned resource will serve as authoritative reference for those executives or organizational managers seeking to maintain or improve security measures.

    By Adam Gordon (ed)

  • Book

    Official (ISC)2 Guide to the CISSP-ISSMP CBK, Second Edition

    Supplying an authoritative review of key concepts and requirements in the exam, this book provides numerous illustrated examples and practical exercises, and offers insight into creating and implementing effective information security management programs that meet the security needs of today's businesses.

    By Joseph Steinberg (ed)

  • Book

    Online Security for the Business Traveler

    An essential reference guide for any travelling business person or security professional, this book explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity.

    By Deborah Gonzalez

  • Book

    Open Source Intelligence and Cyber Crime: Social Media Analytics

    This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected.

    By David B. Skillicorn, Mohammad A. Tayebi, Uwe Glässer

  • Book

    OpenVPN: Building and Integrating Virtual Private Networks: Learn How to Build Secure VPNs Using this Powerful Open Source Application

    A comprehensive guide to using OpenVPN for building secure VPNs, this friendly book is covers basic VPN concepts, then moves to introduce basic OpenVPN configurations, before discussing advanced uses of OpenVPN.

    By Markus Feilner

  • Book

    Operating System Forensics

    Covering digital forensic investigations of the three major operating systems, including Windows, Linux, and Mac OS, this book presents the technical details of each operating system, allowing users to find artifacts that might be missed using automated tools.

    By Kevin Mackay, Ric Messier

  • Book

    PCI Compliance: The Definitive Guide

    Delving into payment card industry (PCI) standards from an implementation standpoint, this step-by-step guidebook begins with a basic introduction to PCI compliance, including its history and evolution before thoroughly and methodically examining the specific requirements of PCI compliance.

    By Abhay Bhargav

  • Book

    PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, Fourth Edition

    Providing the information you need in order to understand the current PCI Data Security standards, this book explains how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and helps you protect sensitive and personally-identifiable information.

    By Anton A. Chuvakin, Branden R. Williams

  • Book

    PCI DSS: A Pocket Guide, Sixth Edition

    This guide is perfect as a quick reference for PCI professionals, or as a handy introduction for new staff. It explains the fundamental concepts of the latest iteration of the PCI DSS, v3.2.1, making it an ideal training resource.

    By Alan Calder, Geraint Williams

  • Book

    PCI DSS: An Integrated Data Security Standard Guide

    Apply machine learning using the Internet of Things (IoT) in the agriculture, telecom, and energy domains with case studies.

    By Jim Seaman

  • Book

    Penetration Tester's Open Source Toolkit, Fourth Edition

    Covering the latest technologies and attack vectors, and including industry specific case studies and complete laboratory setup, this guide provides the critical information you need to understand and use the open source tools available today through real-world examples.

    By Jeremy Faircloth, T. Michael Rogers

  • Book

    Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems

    Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed.

    By Ric Messier

  • Book

    Penetration Testing Essentials

    IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set.

    By Sean-Philip Oriyano

  • Book

    Penetration Testing For Dummies

    It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities.

    By Robert Shimonski

  • Book

    Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit

    This book offers a practical approach by discussing several computer and network fundamentals before delving into various penetration testing approaches, tools, and techniques.

    By Debasish Mandal

  • Book

    Penetration Testing Services Procurement Guide

    Presenting a useful overview of the key concepts you will need to understand to conduct a well-managed penetration test, this guide explains what a penetration test is (and is not), outlines its strengths and limitations, and describes why an organisation would typically choose to employ an external provider of penetration testing services.

    By Jason Creasey

  • Book

    Penetration Testing: A Guide For Business and IT Managers

    Explaining the process of penetration testing and the benefits it brings, this book provides essential insight and tips for setting up a penetration testing program, maintaining it, and responding to the results.

    By BCS-CREST Penetration Testing Working Group

  • Book

    Penetration Testing: A Hands-On Introduction to Hacking

    Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, this hands-on guide allows you to experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.

    By Georgia Weidman

  • Book

    Penetration Testing: Protecting Networks and Systems

    Presenting a preparatory guide for the Certified Penetration Testing Engineer (CPTE) exam, this book describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report.

    By Kevin M. Henry

  • Book

    Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

    Packed with real-world examples, sample scripts, and "Defenders Tips" that explain how companies can reduce risk, this comprehensive book provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible.

    By Matt Burrough

  • Book

    Personal Cybersecurity: How to Avoid and Recover from Cybercrime

    Revealing the most prevalent cyber threats against individual users on all kinds of computing devices, this book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

    By Marvin Waschke

  • Book

    Personally Identifiable Information PII Audit/Assurance Program

    Designed as a review tool and starting point, this document provides management with an assessment of PII policies and procedures and their operating effectiveness, and identifies internal control, information security, and regulatory concerns and deficiencies that could affect the organization.

    By ISACA

  • Book

    PGP & GPG: Email for the Practical Paranoid

    For computer users who aren't familiar with public key cryptography but want to guard their email privacy, this book is an informal tutorial to implementing electronic privacy using the standard tools of the email privacy field.

    By Michael W. Lucas

  • Book

    Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks, 1st Edition

    This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.

    By Gunikhan Sonowal

  • Book

    Phishing and Counter Measures: Understanding the Increasing Problem of Electronic Identity Theft

    Introducing the current tools and techniques of phishing, as well as emerging and future threats, this book presents security technology and countermeasures used to thwart them that are simple for users to implement.

    By Markus Jakobsson, Steven Myers

  • Book

    Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

    Addressing the growing and continuing scourge of phishing emails, this book provides actionable defensive techniques and tools to help you steer clear of malicious emails, and offers insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, while teaching you how to spot a spoofed e-mail or cloned website.

    By Christopher Hadnagy, Michele Fincher

  • Book

    Phishing Exposed

    Providing an in-depth, high-tech view from both sides of the phishing playing field, this invaluable book exposes technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year.

    By Lance James

  • Book

    Physical Security for IT

    Providing practical, easy-to-understand and readily usable advice, this practical book shows organizations how to design and implement physical security plans for IT, network, and telecommunications assets.

    By Michael Erbschloe

  • Book

    PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks

    Covering the entire PKI project lifecycle, this complete guide presents a layered and modular approach to help readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment.

    By Andre Karamanian, Francois Dessart, Srinivas Tenneti

  • Book

    Practical Anonymity: Hiding in Plain Sight Online

    Providing simple, step-by-step instructions for configuring and using anonymous networking software, this book shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online.

    By Peter Loshin

  • Book

    Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations

    Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done.

    By Niranjan Reddy

  • Book

    Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices

    The book is designed for aspiring Cyber Threat Analysts, Security Analysts, Cybersecurity specialists, Security Consultants, and Network Security Professionals who wish to acquire and hone their analytical abilities to identify and counter threats quickly.

    By Dr. Erdal Ozkaya

  • Book

    Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments

    Sharing their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments, the authors of this book shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system.

    By Andy Richter, Jeremy Wood

  • Book

    Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory

    Forensics offers every IT and computer professional a wide opportunity of exciting and lucrative career. This book is a treasure trove of practical knowledge for anyone interested in forensics, including where to seek evidence and how to extract it from buried digital spaces.

    By Dr. Akashdeep Bhardwaj, Keshav Kaushik

  • Book

    Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices

    This book is your pathway to developing the critical thinking, analytical reasoning, and technical writing skills necessary to effectively work in a junior-level digital forensic or cybersecurity analyst role.

    By Mohammed Moreb

  • Book

    Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT

    The book outlines the tools and techniques used by practitioners in the industry today, as well as the foundations of the professional cybersecurity skillset required to succeed on the SANS Global Industrial Cyber Security Professional (GICSP) exam.

    By Charles J. Brooks, Philip A. Craig Jr.

  • Book

    Practical Information Security Management: A Complete Guide to Planning and Implementation

    Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information security practice, hire the right people, and strike the best balance between security controls, costs, and risks.

    By Tony Campbell

  • Book

    Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

    Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, this practical guide will allow you to safely analyze, debug, and disassemble any malicious software that comes your way.

    By Andrew Honig, Michael Sikorski

  • Book

    Practical Social Engineering: A Primer for the Ethical Hacker

    Practical Social Engineering will help you better understand the techniques behind these social engineering attacks and how to thwart cyber criminals and malicious actors who use them to take advantage of human nature.

    By Joe Gray

  • Book

    Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

    Practical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose.

    By Andrew Magnusson

  • Book

    PRAGMATIC Security Metrics: Applying Metametrics to Information Security

    Packed with time-saving tips, this step-by-step book offers easy-to-follow guidance for those struggling with security metrics, and clearly explains how to specify, develop, use, and maintain an information security measurement system.

    By Gary Hinson, W. Krag Brotby

  • Book

    Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security

    A groundbreaking exploration of how to identify and fight security threats at every level, this revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more.

    By Gary M. Jackson

  • Book

    Preventing Good People From Doing Bad Things: Implementing Least Privilege

    Promoting the concept of least privilege, this straightforward guide will give readers information on protecting virtual environments, policy, compliance and more to keep inevitable human behaviors from taking over.

    By Brian Anderson, John Mutch

  • Book

    Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards

    This title will be removed from the Skillsoft library on May 24, 2024.

    By George O.M. Yee (ed)

  • Book

    Privacy, Regulations, and Cybersecurity: The Essential Business Guide

    This book walks you through our evolving definitions of privacy, from the ancient world all the way to the General Law on Data Protection (GDPR). He then explains-in friendly, accessible language-how to orient your preexisting cybersecurity program toward privacy, and how to make sure your systems are compliant with current regulations.

    By Chris Moschovitis

  • Book

    Private Security and the Investigative Process, Third Edition

    Complete with numerous forms, checklists, and exercises, this authoritative yet accessible book covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal.

    By Charles P. Nemeth

  • Book

    Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

    Describing the attack chain and how privileged access management protects against and detects privileged attacks, this book outlines use cases and methodology for deploying a success privileged access management program within an organization.

    By Brad Hibbert, Morey J. Haber

  • Book

    Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations, Second Edition

    Describing the attack chain and how privileged access management protects against and detects privileged attacks, this book outlines use cases and methodology for deploying a success privileged access management program within an organization.

    By Morey J. Haber

  • Book

    Pro Cryptography and Cryptanalysis: Creating Advanced Algorithms with C# and .NET

    Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance.

    By Marius Iulian Mihailescu, Stefania Loredana Nita

  • Book

    Professional Pen Testing for Web Applications

    Written for programmers, developers, and IS professionals who want to learn about web application security and how to audit it, this book will help you become an effective penetrator in order to circumvent security features of Web applications.

    By Andres Andreu

  • Book

    Professional Penetration Testing: Creating and Learning in a Hacking Lab, Second Edition

    Including real-world examples of vulnerable and exploitable servers, this book shows you how to turn hacking and penetration testing skills into a professional career, and walks you through the entire process of setting up and running a penetration test lab.

    By Thomas Wilhelm

  • Book

    Professional Red Teaming: Conducting Successful Cybersecurity Engagements

    Using a practical, real-world, and tempered approach to cyber operations, this unique book will show you how to leverage technology when conducting offensive security engagements.

    By Jacob G. Oakley

  • Book

    Protective Security: Creating Military-Grade Defenses for Your Digital Business

    Showing you how military counter-intelligence principles and objectives are applied, this book provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization.

    By Jim Seaman

  • Book

    Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit

    Focusing on the three most powerful pentesting tools, this book will get you started with NMAP, OpenVAS, and Metasploit and will help you understand how they can be integrated with each other for greater flexibility and efficiency.

    By Sagar Rahalkar

  • Book

    Ransomware Protection Playbook

    You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.

    By Roger A. Grimes

  • Book

    Ransomware Revealed: A Beginner's Guide to Protecting and Recovering from Ransomware Attacks

    Featuring techniques and advice applicable to any operating system/device type, this book teaches you how to mitigate and respond to ransomware infection with easy-to-follow technical tips and countermeasures.

    By Nihad A. Hassan

  • Book

    Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment

    Providing valuable lessons learned from interviews with over 70 security and business leaders, this comprehensive field guide presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program.

    By Dan Blum

  • Book

    Real-World Bug Hunting: A Field Guide to Web Hacking

    Whether you're a cyber-security beginner who wants to make the internet safer or a seasoned developer who wants to write secure code, this soup-to-nuts guide will show you how it's done.

    By Peter Yawarski

  • Book

    Real-World Cryptography

    This book teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There's no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases.

    By David Wong

  • Book

    Research Methods for Cyber Security

    Presenting research methods from a cyber security science perspective, this book catalyzes the rigorous research necessary to propel the cyber security field forward, and provides a guided method selection for the type of research being conducted.

    By David O. Manz, Thomas W. Edgar

  • Book

    Resilient Thinking: Protecting Organisations in the 21st Century, Second Edition

    Since the release of the first edition in 2012, a lot has changed in the world of risk and organisational resilience. Global conflict, political realignments, environmental disruptions, pandemics and disease outbreaks and cyber attacks are a plethora of threats that have and will continue to endanger the stability of the world.

    By Phillip Wood

  • Book

    RIoT Control: Understanding and Managing Risks and the Internet of Things

    Explaining the sources of risk across IoT architectures and performance metrics at the enterprise level, this resource offers insight from industry insiders about emerging tools and techniques for real-world IoT systems.

    By Tyson Macaulay

  • Book

    Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis

    Describing how to apply application threat modeling as an advanced preventive form of security, this book provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.

    By Marco M. Morana, Tony UcedaVélez

  • Book

    Risk Management and ISO 31000: A Pocket Guide

    This pocket guide introduces the premise of RBT (risk-based thinking), exploring the principles outlined in the risk management standard, ISO 31000

    By Alan Field

  • Book

    Risk Management for IT Projects: How to Deal with Over 150 Issues and Risks

    Showing you how to identify and track the recurring issues leading to failure in IT projects, this book offers recommendations readers can follow to significantly reduce the risk of IT failures and increase the rate of success.

    By Bennet P. Lientz, Lee Larssen

  • Book

    Risk Management Framework: A Lab-Based Approach to Securing Information Systems

    Including hands-on exercises to reinforce topics, this complete resource provides examples that follow a fictitious organization through the risk management framework (RMF), allowing the reader to follow the development of proper compliance measures.

    By James Broad

  • Book

    Risk Management in Software Development Projects

    Very few software projects are completed on time, on budget, and to their original specification. This practical book will help practicing IT Project Managers and IT Managers learn about risk in the pursuit of delivering software projects.

    By John McManus

  • Book

    Role Mining in Business: Taming Role-Based Access Control Administration

    Besides a comprehensive survey of role mining techniques deeply rooted in academic research, this practical book also provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.

    By Alberto Ocello, Alessandro Colantonio, Roberto Di Pietro

  • Book

    Role-Based Access Control, Second Edition

    Providing coverage of the RBAC standard proposed by the National Institute of Standards and Technology, this book offers an in-depth understanding of role hierarchies and role engineering that are crucial to ensuring total access control with RBAC.

    By D. Richard Kuhn, David F. Ferraiolo, Ramaswamy Chandramouli

  • Book

    Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

    This book will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware.

    By Alex Matrosov, Eugene Rodionov, Sergey Bratus

  • Book

    Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information Assets

    Providing a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications, this book shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organization's reputation and leading to costly investigations.

    By Robert F. Smallwood

  • Book

    Schneier on Security

    Presenting invaluable advice from a computer security expert, this book features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay when security fails.

    By Bruce Schneier

  • Book

    Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition

    Celebrating a decade and a half of smart, straight-forward advice on achieving security throughout computer networks from the leading authority on security, this 15th Anniversary volume exposes the digital world and the realities of our networked society, as well as security technologies and product capabilities, and their limitations.

    By Bruce Schneier

  • Book

    Secure Cyber-Physical Systems for Smart Cities

    Covering a wide range of topics including wireless networks, security, and cyber-physical systems, this book examines information security and privacy in smart city settings.

    By Riaz Ahmed Shaikh

  • Book

    Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and Mrtg

    Explaining security principles and demonstrating how to achieve them using only freely available software, this book clearly explains how to get big dollar network security--without paying for it.

    By Eric Seagren

  • Book

    Securing an IT Organization through Governance, Risk Management, and Audit

    Introducing COBIT 5 methods from a cybersecurity perspective, this authoritative book provides details of the cybersecurity framework (CSF) with emphasis on the processes directly related to governance, risk management, and audit.

    By James L. Rainey, Ken Sigler

  • Book

    Securing Cyber-Physical Systems

    Bringing together engineering and IT experts who have been dealing separately with these issues, this book explores the cybersecurity needed for cyber-physical systems (CPS), with a focus on results of research and real-world deployment experiences.

    By Al-Sakib Khan Pathan (ed)

  • Book

    Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets

    Helping security managers to understand and address the dangers that face them, this book outlines threats to trade secrets that are commonly overlooked, and shows specific, concrete steps to minimize these threats.

    By Information Security

  • Book

    Securing Mobile Devices

    Explaining that applying COBIT 5 to mobile device security establishes a uniform management framework, this book offers guidance on planning, implementing and maintaining comprehensive security for mobile devices in the context of enterprises.

    By ISACA

  • Book

    Securing SCADA Systems

    Examining SCADA system threats and vulnerabilities, this book discusses the emergence of protocol standards, and how security controls can be applied to ensure the safety and security of our national infrastructure assets.

    By Ronald L. Krutz

  • Book

    Securing Social Identity in Mobile Platforms: Technologies for Security, Privacy and Identity Management

    The book presents novel research in the areas of social identity and security when using mobile platforms.

    By Panagiotis Karampelas, Thirimachos Bourlai, Vishal M. Patel

  • Book

    Securing Systems: Applied Security Architecture and Threat Models

    Describing the process and the practice of assessing a computer system's existing information security posture, this book details the time-tested practices of experienced security architects, and explains how to deliver the right security at the right time in the implementation lifecycle.

    By Brook S.E. Schoenfield

  • Book

    Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

    Presenting technical information in an easy-to-understand manner, this book shows you how to leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term.

    By Maciej Machulak, Michael Schwartz

  • Book

    Securing VoIP: Keeping Your VoIP Network Safe

    Drawing upon years of practical experience and using numerous examples and case studies, this essential guide discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks.

    By Regis J. (Bud) Bates

  • Book

    Security 2020: Reduce Security Risks This Decade

    Offering real-world experience that provides a perspective on security past, present, and future, this book provides a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade.

    By Doug Howard, Kevin Prince

  • Book

    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, Third Edition

    A step-by-step guide to the tasks involved in security administration, as well as the many roadblocks you can expect, this comprehensive book offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience.

    By David R. Miller, Michael Gregg

  • Book

    Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

    An essential resource for IT and Audit professionals on how to manage, secure and audit smart devices, this book provides an understanding of the technologies related to smart devices and presents a number of different methods available to address the security of them.

    By Philip Chukwuma, Richard Cozart, Sajay Rai

  • Book

    Security and Loss Prevention: An Introduction, 5th Edition

    Encompassing the breadth and depth of considerations involved in implementing loss prevention concepts and security programs within an organization, this book can help prevent and reduce loss due to legal issues, theft and other crimes, fire, accidental or intentional harm from employees, and more.

    By Philip P. Purpura

  • Book

    Security and Privacy for Next-Generation Wireless

    This timely book provides broad coverage of security and privacy issues in the macro and micro perspective.

    By Zhong

  • Book

    Security Architect: Careers in IT Service Management

    Providing practical, effective guidance for anyone looking to become a security architect or wanting to know more about what the role entails, this book covers areas such as required skills, responsibilities, dependencies and career progression as well as relevant tools, standards and frameworks.

    By Jon Collins

  • Book

    Security Controls Evaluation, Testing, and Assessment Handbook

    Showing you what your security controls are doing and how they are standing up to various inside and outside threats, this detailed, hands-on guide provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

    By Leighton Johnson

  • Book

    Security for Business Professionals: How to Plan, Implement, and Manage Your Company's Security Program

    With case studies and real-world examples from a wide variety of industries, this accessible guide offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff.

    By Bradley A. Wayland

  • Book

    Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

    Whether you are new to this profession or have been in the field a while, this book covers the basics of securing your system environment as well as security concepts and how these concepts can be implemented practically using common tools and applications.

    By Derrick Rountree

  • Book

    Security for Wireless Implantable Medical Devices

    Helping readers learn more about the security and safety issues in the area of implantable medical devices (IMDs), this book provides an overview of new security attacks, challenges, defense strategies, design issues, modeling, and performance evaluation in wireless IMDs.

    By Xiali Hei, Xiaojiang Du

  • Book

    Security Fundamentals

    An approachable discussion of core security concepts and topics, this book is your guide to developing a strong foundational understanding of Windows security, so you can take your IT career to the next level and feel confident going into the certification exam.

    By Crystal Panek

  • Book

    Security in the Digital World: For the Home User, Parent, Consumer and Home Office

    From the top ten tips and the breakdown of consumer risks, to social networking and parental security, this book is an essential guide for anyone and everyone trying to stay safe and secure in the evolving digital world.

    By Graham Day

  • Book

    Security Information and Event Management (SIEM) Implementation

    Showing you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts, this authoritative guide will help you manage the security information and events produced by your network.

    By Allen A. Harper, Chris Blask, David R. Miller, Shon Harris, Stephen Vandyke

  • Book

    Security Issues and Privacy Concerns in Industry 4.0 Applications

    This book is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in the Industry 4.0 applications for research development.

    By M. Niranjanamurthy, R. S. Anand, Shibin David

  • Book

    Security Log Management: Identifying Patterns in the Chaos

    This unique book shows system administrators and security professionals how to use open source software such as Tcpdstats and Snort perfmonitor to create reports that give you the big picture of your network's health and well being.

    By Jacob Babbin, et al.

  • Book

    Security of Mobile Communications

    Providing technicians and designers with a critical, comprehensive resource, this guide goes beyond analysis, standards, and guidelines to define the roles and responsibilities that network operators, service providers, and even customers need to fulfill to assure our mobile communications are secure.

    By Noureddine Boudriga

  • Book

    Security Operations in Practice

    This book walks you through how to establish and grow a strong security operations team, including hiring the right people, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.

    By Mike Sheward

  • Book

    Security Patch Management, Second Edition

    Helping you establish a patch management process that protects your organization against zero-day attacks, this detailed, easy-to-understand guide helps you become more proactive when it comes to this critical facet of information security.

    By Felicia M. Nicastro

  • Book

    Security Risk Assessment: Managing Physical and Operational Security

    Offering step-by-step guidance for conducting a complete risk assessment, this accessible guide provides a template to draw from, giving security professionals the tools needed to conduct an assessment using the most current approaches, theories, and best practices.

    By John M. White

  • Book

    Security Risk Management Body of Knowledge

    Integrating knowledge, competencies, methodologies, and applications, this comprehensive guide details the security risk management process in a format that can easily be applied by executive managers and security risk management practitioners.

    By Julian Talbot, Miles Jakeman

  • Book

    Security Risk Management: Building an Information Security Risk Management Program from the Ground up

    Presenting a roadmap for designing and implementing a security risk management program, this comprehensive guide includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment.

    By Evan Wheeler

  • Book

    Security Strategy: From Requirements to Reality

    Focusing on security strategy planning and execution, this book seeks to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes.

    By Bill Stackpole, Eric Oksendahl

  • Book

    Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity

    Sharing the author's knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards, this book provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication.

    By J. J. Stapleton

  • Book

    Security without Obscurity: A Guide to PKI Operations

    Providing a no-nonsense approach and realistic guide to operating a PKI system, this book discusses PKI best practices, as well as bad practices, and includes anonymous case studies scattered throughout that identify each.

    By J. J. Stapleton, W. Clay Epstein

  • Book

    Security, Privacy, and Digital Forensics in the Cloud

    Written by some of the top experts in the field, this unique book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services.

    By Hassan Takabi, Lei Chen, Nhien-An Le-Khac (eds)

  • Book

    Semantic Web For Dummies

    Whether you're a consumer doing research online, a business owner who wants to offer your customers the most useful Web site, or an IT manager eager to understand Semantic Web solutions, this book will help you define, develop, implement, and use Web 3.0.

    By Jeffrey T. Pollock

  • Book

    Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL, Second Edition

    Focused on developing useful and reusable models, this book is an essential, comprehensive resource on semantic modeling for practitioners in health care, artificial intelligence, finance, engineering, military intelligence, enterprise architecture, and more.

    By Dean Allemang, Jim Hendler

  • Book

    Serious Cryptography: A Practical Introduction to Modern Encryption

    Providing a complete survey of modern encryption and its applications, this practical guide breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work.

    By Jean-Philippe Aumasson

  • Book

    Simple Steps to Data Encryption: A Practical Guide to Secure Computing

    Including simple descriptions of actual threat scenarios, step-by-step instructions for securing data, and easy-to-follow tips for safer computing, this concise guide aims to present just enough for an average reader to begin protecting his or her data immediately.

    By Peter Loshin

  • Book

    Smart Grid Security: Innovative Solutions for a Modernized Grid

    Providing the first truly holistic view of leading edge Smart Grid security research, this book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.

    By Florian Skopik, Paul Smith

  • Book

    Smartcuts: How Hackers, Innovators, and Icons Accelerate Success

    Delving into the reasons why some people and some organizations are able to achieve incredible things in implausibly short time frames, this thoughtful book shows how each of us can use "smartcuts" to rethink convention and accelerate success.

    By Shane Snow

  • Book

    Snort For Dummies

    Whether you're watching for attacks on a home network, a small company network, or an enterprise network, this reference guide covers everything you need for installing, configuring, deploying and managing Snort IDS sensors on your network.

    By Bert Hayes, Charlie Scott, Paul Wolfe

  • Book

    Social Engineering in IT Security: Tools, Tactics, and Techniques

    Written by a global expert on the topic, this book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results.

    By Sharon Conheady

  • Book

    Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

    Providing easy-to-understand models and examples, this hands-on resource gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment.

    By Andrew Mason, Gavin Watson, Richard Ackroyd

  • Book

    Social Engineering: The Science of Human Hacking, Second Edition

    Featuring how-to guidance, stories, examples, and case studies ripped from the headlines, this book details the human hacker's skill set and gives you the inside information you need to mount an unshakeable defense.

    By Christopher Hadnagy

  • Book

    Software Transparency: Supply Chain Security in an Era of a Software-Driven Society

    In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you'll explore real-world examples and guidance on how to defend your own organization against internal and external attacks.

    By Chris Hughes, Tony Turner

  • Book

    Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

    Providing an introduction to identity management, this practical book gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence.

    By Abhishek Hingnikar, Yvonne Wilson

  • Book

    SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition

    Including exam tips, practice exam questions, and in-depth explanations. this authoritative guide enables you to take the exam with complete confidence or use the book as an ideal on-the-job reference.

    By Darril Gibson

  • Book

    SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System-Study Guide

    Featuring clear and concise information regarding crucial next-generation network security topics, this comprehensive guide includes practical examples and insights drawn from real-world experience, exam highlights, and end of chapter reviews.

    By Alex Tatistcheff, John Gay, Todd Lammle

  • Book

    SSL and TLS Essentials: Securing the Web

    This book is a great resource for administrators who need to learn more about how their systems operate behind the scenes and what utilities are available to make it run better.

    By Stephen Thomas

  • Book

    SSL and TLS: Theory and Practice

    Featuring discussions on the advantages and disadvantages of using SSL/TLS protocols compared to other Internet security protocols, this authoritative resource shows how to properly employ SSL and TLS and configure security solutions that are based on the use of the SSL/TLS protocols.

    By Rolf Oppliger

  • Book

    SSL VPN : Understanding, Evaluating, and Planning Secure, Web-Based Remote Access

    Providing a detailed technical and business introduction to SSL VPN, this guide explains how SSL VPN devices work along with their benefits and pitfalls, as well as how to authenticate and educate users.

    By Joseph Steinberg, Timothy Speed

  • Book

    SSL/TLS Security and Troubleshooting

    Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article presents a birds-eye view of the intricacies involved in SSL/TLS (Secure Socket Layer/Transport Layer Security) and important points from a practical IT perspective.

    By Aditya Lad, Prasoon Dwivedi

  • Book

    Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies

    Providing background, analysis, and insight on specific topics and case studies, this volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe to explore technological and social aspects of managing information for national security imperatives.

    By Babak Akhgar, Simeon Yates (eds)

  • Book

    Swanson on Internal Auditing: Raising the Bar

    A wealth of knowledge on internal auditing all in one place, this book provides concise commentary on strategic issues regarding the way internal audit is established, planned and performed.

    By Dan Swanson

  • Book

    System Administration Ethics: Ten Commandments for Security and Compliance in a Modern Cyber World

    Using the appropriate rules of engagement, best policies and practices, and proactive "building/strengthening" behaviors, this book provides the necessary tools to securely run an ethically correct environment.

    By Igor Ljubuncic, Tom Litterer

  • Book

    Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware

    Written by cyber-security researchers and experts, this well-structured book examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.

    By Aditya K. Sood, Richard Enbody

  • Book

    The Art of Attack: Attacker Mindset for Security Professionals

    The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking.

    By Maxie Reynolds

  • Book

    The Art of Cyber Security: A Practical Guide To Winning The War On Cyber Crime

    This book is about cyber security, but it's also about so much more; it's about giving you the skills to think creatively about your role in the cyber security industry.

    By Gary Hibberd

  • Book

    The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime

    This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks.

    By Jon DiMaggio

  • Book

    The Art of Deception: Controlling the Human Element of Security

    This guide presents the world's most famous hacker-guru's advice for developing protocols, training programs, and manuals to protect companies from security vulnerability.

    By Kevin D. Mitnick, William L. Simon

  • Book

    The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers

    Offering hair-raising stories of real-life computer break-ins, celebrated hacker-gone-straight Kevin Mitnick uncovers stories from the hacker community, and shows how the victims could have prevented them.

    By Kevin D. Mitnick, William L. Simon

  • Book

    The Art of Mac Malware: The Guide to Analyzing Malicious Software

    The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what's inside.

    By Patrick Wardle

  • Book

    The Art of Network Penetration Testing: How to Take Over Any Company in the World

    Teaching you how to take over an enterprise network from the inside, this book lays out every stage of an internal security assessment step-by-step, showing you how to identify weaknesses before a malicious invader can do real damage.

    By Royce Davis

  • Book

    The Art of War for Computer Security

    In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.

    By Tom Madsen

  • Book

    The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

    Providing a sound understanding of the tools and tactics used in cyber warfare, this book describes both offensive and defensive tactics from an insider's point of view and presents the hands-on techniques you need to understand as cyber warfare evolves with technology.

    By Jason Andress, Steve Winterfeld

  • Book

    The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics, Second Edition

    Providing readers with completely up-to-date real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery, this book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations.

    By John Sammons

  • Book

    The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online

    With real-world examples showing you how cyber criminals commit crimes, this book gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy.

    By Denny Cherry

  • Book

    The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Second Edition

    Introducing a four-step methodology for conducting a penetration test or hack, this guide walks through each of the steps and tools in a structured, orderly manner, allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test.

    By Patrick Engebretson

  • Book

    The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

    Covering the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, this guide dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

    By Jason Andress

  • Book

    The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, Second Edition

    Giving you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, this clear, non-technical book dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

    By Jason Andress

  • Book

    The Basics of IT Audit: Purposes, Processes, and Practical Information

    IT auditing occurs in some form in virtually every organization, private or public, large or small. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.

    By Stephen D. Gantz

  • Book

    The Basics of Web Hacking: Tools and Techniques to Attack the Web

    Authored by an industry expert who is a penetration tester and Web Security professor at Dakota State University, this book introduces readers to a tool-driven process to identify the most widespread vulnerabilities in Web applications.

    By Josh Pauli

  • Book

    The Best Damn IT Security Management Book Period

    Providing specific guidelines and checklists, this guide has comprehensive coverage of all major IT and security management issues and is an indispensable addition to the serious security professional's toolkit.

    By Susan Snedaker, et al.

  • Book

    The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall, 3rd Edition

    An essential guide to building a secure network with PF, this book covers the latest developments in PF, including new content on IPv6, dual stack configurations, the "queues and priorities" traffic-shaping system, NAT and redirection, wireless networking, spam fighting, and more.

    By Peter N.M. Hansteen

  • Book

    The Browser Hacker's Handbook

    Written by a team of highly experienced computer security experts, this thorough guide gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.

    By Christian Frichot, Michele Orrù, Wade Alcorn

  • Book

    The Car Hacker's Handbook: A Guide for the Penetration Tester

    If you're curious about automotive security and have the urge to hack a two-ton computer, this detailed resource will give you a deeper understanding of the computer systems and embedded software in modern vehicles.

    By Craig Smith

  • Book

    The Case for ISO27001

    Introducing the ISO27001, this book will help your organization build a reliable and effective framework for deploying an information security management system that will preserve its assets, protect its directors and improve its competitiveness.

    By Alan Calder

  • Book

    The Case for ISO27001-2013, Second Edition

    Presenting the compelling business case for implementing ISO27001 in order to protect your information assets, this friendly guide is essential reading for anyone unfamiliar with the many benefits of the standard, and as a supporting document for an ISO27001 project proposal.

    By Alan Calder

  • Book

    The Chief Information Security Officer: Insights, Tools, and Survival Skills

    Describing both the hard and soft skills that a successful Chief Information Security Officer (CISO) requires, this guide explains how to design and implement an Information Security Management System (ISMS) that is appropriate for your organization.

    By Barry L. Kouns, Jake Kouns

  • Book

    The CISO Perspective: Understand The Importance of The CISO in The Cyber Threat Landscape

    The CISO (chief information security officer) has overall responsibility for corporate security strategy, but today's CISO also needs to be in the business of managing information, not just securing it.

    By Barry Kouns, Jake Kouns

  • Book

    The Complete Cisco VPN Configuration Guide

    With copious configuration examples and troubleshooting scenarios, this book contains detailed explanations of all Cisco VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device.

    By Richard Deal

  • Book

    The Complete Guide to Cybersecurity Risks and Controls

    Presenting the fundamental concepts of information and communication technology (ICT) governance and control, this book, shows you how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data.

    By Anne Kohnke, Dan Shoemaker, Ken Sigler

  • Book

    The Complete Reference: Information Security, Second Edition

    Explaining how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs, this comprehensive book offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape.

    By Mark Rhodes-Ousley

  • Book

    The CS Detective: An Algorithmic Tale of Crime, Conspiracy, and Computation

    Offering an entertaining twist to learning algorithms, this book uses a detective story to introduce and illustrate computational concepts at a high level, exploring the motivation behind them and their application in a non-computer domain.

    By Jeremy Kubica

  • Book

    The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities

    Offering step-by-step instruction for building, measuring, and optimizing cybersecurity capabilities, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement.

    By Domenic Antonucci

  • Book

    The Cyber Security Handbook: Prepare for, Respond to and Recover from Cyber Attacks with the IT Governance Cyber Resilience Framework (CRF)

    A comprehensive cyber security implementation manual, this book gives practical guidance on the individual activities identified in the IT Governance CRF that can help organizations become cyber resilient and combat cyber threats.

    By Alan Calder

  • Book

    The Cybersecurity Maturity Model Certification (CMMC): A Pocket Guide

    A clear, concise primer on the Cybersecurity Maturity Model Certification (CMMC), this guide summarizes the CMMC and proposes useful tips for implementation, covers who it applies to, and highlights the requirements for achieving and maintaining compliance.

    By William Gamble

  • Book

    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security

    The real-world guide to defeating hackers and keeping your business secure, this invaluable book is your step-by-step resource to protecting your organization from unknown threats and integrating good security habits into everyday business situations.

    By Allison Cerra

  • Book

    The Dark Web: Breakthroughs in Research and Practice

    This title will be removed from the Skillsoft library on May 24, 2024.

    By Information Resources Management Association (IRMA)

  • Book

    The Data Governance Imperative: A Business Strategy for Corporate Data

    Providing a business person's view of data governance, this practical book covers both strategies and tactics around managing a data governance initiative.

    By Steve Sarsfield

  • Book

    The Data Protection Officer: Profession, Rules, and Role

    Explaining what the General Data Protection Regulation is, this book defines the roles and responsibilities of the Data Protection Officer (DPO) position and highlights the potential cost of getting data protection wrong.

    By Paul Lambert

  • Book

    The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

    Providing sample documents and directions on using the policies and procedures to establish proof of compliance, this guide is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA.

    By John J. Trinckes, Jr.

  • Book

    The Definitive Guide to Samba 3

    If you're familiar with Unix administration, TCP/IP networking, and other common Unix servers, and want to learn how to deploy Samba, this book is ideal for you. With this guide, you can quickly configure a basic Samba server, and more.

    By Roderick W. Smith

  • Book

    The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity

    Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges in this innovative text.

    By Phil Quade

  • Book

    The Effective CIO: How to Achieve Outstanding Success through Strategic Alignment, Financial Management, and IT Governance

    Providing a survey of existing strategies and detailed problem-solving ideas, this book offers the perspective of a CIO who must cope with the day-to-day pressure for results, and an IT audit consultant with a focus on governance and internal control.

    By Eric J. Brown, William A. Yarberry, Jr.

  • BOOK SUMMARY

    The Executive MBA in Information Security

    The Executive MBA in Information Security is a foundational manual to help business executives develop an effective management program for information security. In this Summary, we discuss the salient points of the book based on our interpretation of its contents.

    By John J. Trinckes, Jr.

  • Book

    The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture

    Illustrating real-world perspectives that reflect the day-to-day issues that you face in running an enterprise's security operations, this book outlines a strategy for managing the information security function in a manner that optimizes cost efficiency and results.

    By Kerry Ann Anderson

  • Book

    The GSEC Prep Guide: Mastering SANS GIAC Security Essentials

    As your in-depth study guide for the SANS GIAC Security Essentials exam, this self-paced, practical text provides you with a thorough understanding of security concepts and policies, ways to assess and manage risk, appropriate incident response, and more.

    By Mike Chapple

  • Book

    The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

    The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.

    By Colin O'Flynn, Jasper van Woudenberg

  • Book

    The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition

    Providing users with information on how to combat the ever-changing myriad of threats security professionals face, this accessible guide presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency.

    By Gerald L. Kovacich

  • Book

    The InfoSec Handbook: An Introduction to Information Security

    Allowing beginners to enter the field and understand the key concepts and ideas of Information Security, this guide offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security.

    By Umesh Hodeghatta Rao, Umesha Nayak

  • Book

    The Insider Threat: Assessment and Mitigation of Risks

    Using a pragmatic and readable approach for the corporate environment, this book presents and discusses workable applications of risk management techniques along with useable practical policy change options.

    By Eleanor E. Thompson

  • Book

    The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments

    Providing detailed information on testing all your IT security, policy and governance requirements, this roadmap guide presents a way of interpreting complex, confusing compliance requirements within the larger scope of an organization's overall needs.

    By Craig S. Wright

  • Book

    The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption

    With a plethora of historical anecdotes and real-world examples, this book takes readers on a fascinating tour of the mathematics behind cryptography?the science of sending secret messages.

    By Joshua Holden

  • Book

    The Network Security Test Lab: A Step-by-Step Guide

    Setting you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies, this convenient resource will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats - and trains you on the software used by top experts in the field.

    By Michael Gregg

  • Book

    The Official (ISC)2 Guide to the SSCP CBK, Fourth Edition

    Offering step-by-step guidance through each of SSCP's domains, including best practices and techniques, this book brings together a global, thorough perspective to not only prepare for the SSCP exam, but it also provides a reference that will serve you well into your career.

    By Adam Gordon, Steven Hernandez

  • Book

    The Penetration Tester's Guide to Web Applications

    Focusing on offensive security and how to attack web applications, this innovative new resource provides both professionals and aspiring professionals with clear guidance on how to identify and exploit common web application vulnerabilities.

    By Serge Borso

  • Book

    The Pentester BluePrint: Starting a Career as an Ethical Hacker

    This book guides you through the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester.

    By Kim Crawley, Phillip L. Wylie

  • Book

    The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    To help you avoid costly and inflexible solutions, this book teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. Attacks are inevitable, but losing sensitive data shouldn't be.

    By Richard Bejtlich

  • Book

    The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

    In addition to providing practical methods to applying privacy engineering methodologies, this book details how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information.

    By Jonathan Fox, Michelle Finneran Dennedy, Thomas R. Finneran

  • Book

    The Psychology of Information Security: Resolving Conflicts Between Security Compliance and Human Behaviour

    Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives.

    By Leron Zinatullin

  • Book

    The Ransomware Threat Landscape: Prepare for, Recognise and Survive Ransomware attacks

    Prepare for, recognize and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, helping business leaders better understand the strategic risks, and explore measures that can be put in place to protect the organization.

    By Alan Calder

  • Book

    The Risk IT Framework

    Offering a comprehensive process model for governing and managing IT risk, this manual provides a set of guiding principles and supporting practices for enterprise management.

    By ISACA

  • Book

    The Risk IT Practitioner Guide

    Serving as a support document for the Risk IT framework, this publication provides examples of possible techniques to address IT-related risk issues, and more detailed guidance on how to approach the concepts covered in the process model.

    By ISACA

  • Book

    The Security Consultant's Handbook

    Designed to be a practical and enabling guide for security officers and contractors, this book aims to plug information gaps or provoke new ideas, and provide a real-world support tool for those who want to offer their clients safe, proportionate, and value-driven security services.

    By Richard Bingley

  • Book

    The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

    Walking you through the process of conducting an effective security assessment, this authoritative guide provides the tools and up-to-date understanding you need to select the security measures best suited to your organization.

    By Douglas J. Landoll

  • Book

    The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online

    Helping you cut through the confusion and start protecting your online life, this book offers practical, user-friendly advice and shows you how women are targeted online and how to keep yourself safe.

    By Violet Blue

  • Book

    The State of the Art in Intrusion Prevention and Detection

    Presenting cutting-edge research, this book analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks.

    By Al-Sakib Khan Pathan (ed)

  • Book

    The Tao of Open Source Intelligence

    Explaining how to scrutinise criminal activity without compromising your anonymity - and your investigation, this book offers comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use and functionality, giving tips on counterintelligence, safe practices and debunking myths about online privacy.

    By Stewart K. Bertram

  • Book

    The Today and Future of WSN, AI and IOT: A Compass and Torchbearer for the Technocrats

    Including review questions and cases for research, this book is an easy-to-understand guide that will help you get familiar with the upcoming developments in WSN, AI, and IoT.

    By Chandrakant Naikodi, Suresh L

  • Book

    The True Cost of Information Security Breaches and Cyber Crime

    Using case studies to illustrate the possible breach scenarios that an organisation can face, this book sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.

    By John Walker, Michael Krausz

  • Book

    The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Second Edition

    Containing the most current attack techniques and countermeasures, this practical book discusses the latest step-by-step methods for attacking and defending the range of ever-evolving web applications.

    By Dafydd Stuttard, Marcus Pinto

  • Book

    Theoretical and Experimental Methods for Defending Against DDoS Attacks

    Featuring a comprehensive study on the basics of network security, this book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts.

    By Iraj Sadegh Amiri, Mohammad Reza Khalifeh Soltanian

  • Book

    Theoretical Cybersecurity: Principles and Advanced Concepts

    This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science.

    By J. Louis Sewell, Jacob G. Oakley, Matthew Puckett, Michael Butler Murray, Wayne York

  • Book

    Threat Modeling: Designing for Security

    With pages of specific actionable advice, this unique book details how to build better security into the design of systems, software, or services from the outset.

    By Adam Shostack

  • Book

    Touchless Fingerprint Biometrics

    Giving an overview of the state of the art touchless fingerprint-recognition technologies, this book describes relevant industrial applications, and also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.

    By Fabio Scotti, Ruggero Donida Labati, Vincenzo Piuri

  • Book

    Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors

    Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change.

    By Perry Carpenter

  • Book

    Transforming Cybersecurity

    Providing practical guidance on transforming cybersecurity in a systemic way, this publication shows the rise in cost and frequency of security incidents and addresses security governance, security management and security assurance.

    By ISACA

  • Book

    Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

    Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, this unique book has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.

    By Jennifer Jin, Marcus J. Carey

  • Book

    Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership

    A collection of invaluable real-world insights from cybersecurity experts, this must-read book offers the advice and practical guidance you need to advance your cybersecurity leadership career.

    By Jennifer Jin, Marcus J. Carey

  • Book

    Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

    Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, this unique book offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market.

    By Jennifer Jin, Marcus J. Carey

  • Book

    Two-Factor Authentication

    An introduction to the topic of two-factor authentication, this book provides a comprehensive evaluation of popular secondary authentication methods, and presents international examples of standards and regulations that make two-factor authentication a component of security guidance.

    By Mark Stanislav

  • Book

    Under Control: Governance Across the Enterprise

    Setting out to explain the essential challenges of effective business governance, this book helps you build solutions for your organization based on lessons learned at CA from its customers and in its own corporate structure.

    By Jacob Lamm, et al.

  • Book

    Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program, 1st Edition

    The book provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and helps practitioners pull cyber from a "technical" problem to a "business risk management" problem, equipping you with a simple approach to understand, manage, and measure cyber risk for your enterprise.

    By Ryan Leirvik

  • Book

    Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program, 2nd Edition

    When it comes to managing cybersecurity in an organization, most tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid.

    By Ryan Leirvik

  • Book

    Understanding and Conducting Information Systems Auditing

    Featuring examples that are globally applicable, this accessible, non-technical guide covers all major standards and presents information systems as a management tool with practical applications.

    By Arif Ahmed, Veena Hingarh

  • Book

    Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends NEW!

    This book discusses understand cybersecurity management in decentralized finance (DeFi).

    By Arash Habibi Lashkari, Gurdip Kaur, Iman Sharafaldin, Ziba Habibi Lashkari

  • Book

    UTM Security with Fortinet: Mastering FortiOS

    Explaining the advantages of using Unified Threat Management (UTM) and how it works, this thorough resource presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.

    By Kenneth Tam, et al.

  • Book

    Validating Your Business Continuity Plan: Ensuring Your BCP Really Works

    Examining the three essential components of validating a business continuity plan, this book outlines a controlled and systematic approach to BCP validation while considering each component, covering methods and techniques such as table-top reviews, workshops and live rehearsals.

    By Robert A. Clark

  • Book

    Virtualization Security: Protecting Virtualized Environments

    Offering effective practices for securing virtual machines, this must-read resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.

    By Dave Shackleford

  • Book

    Vulnerability Management

    Providing a fundamental understanding of technology risks from an interloper's perspective, this book provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those in a larger organization.

    By Park Foreman

  • Book

    Waging Cyber War: Technical Challenges and Operational Constraints

    Describing the hands-on technical challenges to those conducting cyber warfare, this book provides a unique analogy to drive home how cyber warfare should be understood and why it is a challenge to leverage in a war-fighting domain.

    By Jacob G. Oakley

  • Book

    Web Application Defender's Cookbook: Battling Hackers and Protecting Users

    Authored by a highly credentialed defensive security expert, this book provides practical tactics, tools, and techniques for detecting web attacks and malicious behavior, and defending against them. Topics include identifying vulnerabilities, setting hacker traps, enforcing application flows, and more.

    By Ryan Barnett

  • Book

    Web Application Security: A Beginner's Guide

    Including templates, checklists, and examples--as well as true stories from industry, this introductory guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks.

    By Bryan Sullivan, Vincent Liu

  • Book

    Web Security: A WhiteHat Perspective

    With in-depth analysis of the reasons behind the choices companies make to require different security methodologies, this practical book presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system.

    By Hanqing Wu, Liz Zhao

  • Book

    Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

    Providing the most in-depth guide to deploying and maintaining a secure Windows network, this book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks.

    By Derrick Rountree

  • Book

    Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

    Packed with real-world examples using freely available open source tools, this book provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files.

    By Harlan Carvey

  • Book

    Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition

    Packed with real-world examples using freely available open source tools, this one-of-a-kind resource features updated, current tools and techniques and provides the most in-depth guide to forensic investigations involving Windows Registry.

    By Harlan Carvey

  • Book

    Wireless and Mobile Device Security

    Using case studies and real-world events, this straightforward book discusses risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches.

    By Jim Doherty

  • Book

    Wireless Communication Security

    Presenting the concepts and advances of wireless communication security, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals.

    By M. Niranjanamurthy, Manisha Bharti, Manju Khari

  • Book

    Wireless Mobile Internet Security, Second Edition

    Presenting readers with an intimate sense of how mobile internet systems operate and how to address complex security issues, this book covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems.

    By Man Young Rhee

  • Book

    Wireless Network Security: A Beginner's Guide

    Revealing how intruders exploit vulnerabilities and gain access to wireless networks, this hands-on book presents templates, checklists and examples to help you learn how hackers operate so you can protect your wireless networks against all real-world hacks.

    By Tyler Wrightson

  • Book

    Wireless Reconnaissance in Penetration Testing

    An ideal resource for penetration testing and radio profiling, this book describes what equipment to use and how to find frequency information, offers tips for reducing radio information leakage, and presents case studies describing how this information can be used to attack computer systems.

    By Alex Hamerstone, Chris Sanyk, Matthew Neely

  • Book

    Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise

    This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.

    By Jennifer Minella

  • Book

    Wireshark & Ethereal Network Protocol Analyzer Toolkit, Jay Beale's Open Source Security Series

    Helping you to unleash the powers of Wireshark, this comprehensive guide provides complete information and step-by-step instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks.

    By Angela Orebaugh

  • Book

    You: For Sale: Protecting Your Personal Data and Privacy Online

    For anyone who is concerned about what corporate and government invasion of privacy means now and down the road, this book sets the scene by spelling out exactly what most users of the Internet and smart phones are exposing themselves to via commonly used sites and apps such as Facebook and Google, and then tells you what you can do to protect yourself.

    By Stuart Sumner

  • Book

    Zero Trust and Third-Party Risk: Reduce the Blast Radius

    In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk.

    By Gregory C. Rasner

  • Book

    Zero Trust Security: A Complete Guide

    This book helps the readers to earn about IPS, IDS, and IDPS, along with their varieties and comparing them.

    By Nike Andravous

  • SHOW MORE