|
The investigator’s practical guide for cybercrime evidence identification and collection Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been...
Editeur :
Wiley
Parution :
2019-09-13
PDF, ePub
|
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks....
Editeur :
Springer
Parution :
2019-09-03
PDF, ePub
|
Almost all technical systems currently either interface with or are themselves largely software systems. Software systems must not harm their environment, but are also often vulnerable to security attacks with potentially serious economic, political, and physical...
Editeur :
SAGE Publications Ltd
Parution :
2019-08-15
PDF
|
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....
Editeur :
Apress
Parution :
2019-08-13
PDF, ePub
|
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...
Editeur :
Springer
Parution :
2019-06-05
Collection :
Advances in Intelligent Systems and Computing
PDF, ePub
|
The must-have test prep for the new CompTIA PenTest+ certification CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerability assessment, and vulnerability-management skills. These cognitive...
Editeur :
Sybex
Parution :
2019-06-03
PDF, ePub
|
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio...
Editeur :
Apress
Parution :
2019-03-30
PDF, ePub
|
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's...
Editeur :
Apress
Parution :
2019-03-30
PDF, ePub
|
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than...
Editeur :
Apress
Parution :
2019-03-08
PDF, ePub
|
Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise...
Editeur :
Apress
Parution :
2019-01-31
PDF, ePub
|
Comprehensive coverage of the new CASP+ exam, with hands-on practice and interactive study tools The CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition, offers invaluable preparation for exam CAS-003. Covering 100 percent of the exam...
Editeur :
Sybex
Parution :
2019-01-23
PDF, ePub
|
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line...
Editeur :
Apress
Parution :
2018-12-13
PDF
|
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books...
Editeur :
Springer
Parution :
2018-10-17
Collection :
Advances in Information Security
PDF, ePub
|
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and...
Editeur :
Apress
Parution :
2018-09-20
PDF, ePub
|
Industry and government are increasingly reliant on an intelligent – or ‘smart’ – and interconnected computer infrastructure, but the reality is that it is extremely difficult to provide full cyber defense and/or intrusion prevention for the smart networks that connect...
Editeur :
SAGE Publications Ltd
Parution :
2018-09-15
PDF
|
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.An effective defense consists...
Editeur :
Sybex
Parution :
2018-08-31
PDF, ePub
|
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is...
Editeur :
Apress
Parution :
2018-08-24
PDF, ePub
|
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism...
Editeur :
Apress
Parution :
2018-06-30
PDF
|
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...
Editeur :
Springer
Parution :
2018-06-23
Collection :
Advances in Intelligent Systems and Computing
PDF, ePub
|
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise,...
Editeur :
Apress
Parution :
2018-06-15
PDF
|