|
Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam—a qualification that tests the cybersecurity professional’s baseline knowledge of...
Editeur :
Apress
Parution :
2021-08-27
PDF, ePub
|
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical...
Editeur :
Wiley
Parution :
2021-08-16
PDF, ePub
|
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your...
Editeur :
Apress
Parution :
2021-08-09
PDF, ePub
|
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles...
Editeur :
Wiley
Parution :
2021-07-07
PDF, ePub
|
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security...
Editeur :
Springer
Parution :
2021-06-24
Collection :
Security Informatics and Law Enforcement
PDF, ePub
|
Cybersecurity is a pressing issue across industries, as well as increasingly important in people’s personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic...
Editeur :
Apress
Parution :
2021-06-03
PDF, ePub
|
BOW-TIE INDUSTRIAL RISK MANAGEMENT ACROSS SECTORS Explore an approachable but rigorous treatment of systematic barrier-based approaches to risk management and failure analysisIn Bow-Tie Industrial Risk Management Across Sectors: A Barrier-Based Approach, accomplished...
Editeur :
Wiley
Parution :
2021-05-18
PDF, ePub
|
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization....
Editeur :
Apress
Parution :
2021-04-09
PDF, ePub
|
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide. The real-world applications of these cutting-edge...
Editeur :
Apress
Parution :
2021-04-09
PDF, ePub
|
The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your...
Editeur :
Apress
Parution :
2021-03-04
PDF, ePub
|
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become...
Editeur :
Apress
Parution :
2021-02-24
PDF, ePub
|
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked.
This book begins with the theoretical background of cryptography...
Editeur :
Apress
Parution :
2020-12-11
PDF, ePub
|
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University...
Editeur :
Wiley
Parution :
2020-11-24
PDF, ePub
|
Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick...
Editeur :
Apress
Parution :
2020-11-09
PDF, ePub
|
Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps.
Burp Suite is a simple, yet powerful, tool used...
Editeur :
Apress
Parution :
2020-11-06
PDF, ePub
|
Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the devices used by the...
Editeur :
Springer
Parution :
2020-10-31
Collection :
Springer Theses
PDF, ePub
|
Use this book to build secure firmware.As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence,...
Editeur :
Apress
Parution :
2020-10-27
PDF, ePub
|
Um einen Hacker zu überlisten, müssen Sie sich in dessen Denkweise hineinversetzen. Deshalb lernen Sie mit diesem Buch, wie ein Bösewicht zu denken. Der Fachmann für IT-Sicherheit Kevin Beaver teilt mit Ihnen sein Wissen über Penetrationstests und typische...
Editeur :
Wiley-VCH
Parution :
2020-10-27
Collection :
Für Dummies
ePub
|
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails.This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By...
Editeur :
Springer
Parution :
2020-10-27
PDF, ePub
|
Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application,...
Editeur :
Apress
Parution :
2020-10-05
PDF, ePub
|