133 livres(s)
Télécharger le livre :  Gamified Tabletop Exercises for Effective Disaster Recovery Testing
Ajouter à ma liste d'envies

Gamified Tabletop Exercises for Effective Disaster Recovery Testing


John Svazic


Tabletop exercises are a common way to test disaster recovery and business continuity plans, but they can also be some of the most dry and boring meetings any professional can attend. Following a set script with no variation can cause folks to lose interest and question...

Parution : 2025-05-07
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
38,15
Télécharger le livre :  Enterprise Cyber Risk Management as a Value Creator
Ajouter à ma liste d'envies

Enterprise Cyber Risk Management as a Value Creator


Bob Chaput


This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and...

Parution : 2024-01-23
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
38,15
Télécharger le livre :  The Metrics Manifesto
Ajouter à ma liste d'envies

The Metrics Manifesto


Richard Seiersen


Security professionals are trained skeptics. They poke and prod at other people’s digital creations, expecting them to fail in unexpected ways. Shouldn’t that same skeptical power be turned inward? Shouldn’t practitioners ask: “How do I know that my enterprise security...

Parution : 2022-05-03
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
34,92
Télécharger le livre :  Human-Centered AI
Ajouter à ma liste d'envies

Human-Centered AI


Ben Shneiderman


The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...

Parution : 2022-01-13
Format(s) : ePub
Éditeur : OUP Oxford
J'achète
16,48
Télécharger le livre :  Human-Centered AI
Ajouter à ma liste d'envies

Human-Centered AI


Ben Shneiderman


The remarkable progress in algorithms for machine and deep learning have opened the doors to new opportunities, and some dark possibilities. However, a bright future awaits those who build on their working methods by including HCAI strategies of design and testing. As...

Parution : 2022-01-13
Format(s) : PDF
Éditeur : OUP Oxford
J'achète
16,48
Télécharger le livre :  Cyber Breach Response That Actually Works
Ajouter à ma liste d'envies

Cyber Breach Response That Actually Works


Andrew Gorecki


You will be breached—the only question is whether you'll be ready     A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective...

Parution : 2020-06-09
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
39,31
Télécharger le livre :  Cybersecurity Essentials
Ajouter à ma liste d'envies

Cybersecurity Essentials


Charles J. Brooks , Philip A. Craig , Christopher Grow , Donald Short


An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.An effective defense consists...

Parution : 2018-08-31
Format(s) : PDF, ePub
Éditeur : Sybex
J'achète
36,76
Télécharger le livre :  Firewalls Don't Stop Dragons
Ajouter à ma liste d'envies

Firewalls Don't Stop Dragons


Carey Parker


Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is...

Parution : 2018-08-24
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
38,15
Télécharger le livre :  Advanced Persistent Security
Ajouter à ma liste d'envies

Advanced Persistent Security


Araceli Treu Gomes , Ira Winkler


Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book...

Parution : 2016-11-30
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
36,70
Télécharger le livre :  The Second Economy
Ajouter à ma liste d'envies

The Second Economy


Allison Cerra , Steve Grobman


Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and...

Parution : 2016-10-20
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
38,15
Télécharger le livre :  Coding for Penetration Testers
Ajouter à ma liste d'envies

Coding for Penetration Testers


Jason Andress , Ryan Linn


Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool...

Parution : 2016-09-03
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
36,70
Télécharger le livre :  Quantifying the User Experience
Ajouter à ma liste d'envies

Quantifying the User Experience


James R Lewis , Jeff Sauro


Quantifying the User Experience: Practical Statistics for User Research, Second Edition, provides practitioners and researchers with the information they need to confidently quantify, qualify, and justify their data. The book presents a practical guide on how to use...

Parution : 2016-07-12
Format(s) : PDF, epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
40,79
Télécharger le livre :  DNS Security
Ajouter à ma liste d'envies

DNS Security


Allan Liska , Geoffrey Stowe


DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring commonDNS vulnerabilities, studying different attack vectors, and providing necessary information for securingDNS infrastructure. The book...

Parution : 2016-06-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
36,70
Télécharger le livre :  Digital Forensics
Ajouter à ma liste d'envies

Digital Forensics


John Sammons


Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of...

Parution : 2015-12-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
36,70
Télécharger le livre :  Augmented Reality Law, Privacy, and Ethics
Ajouter à ma liste d'envies

Augmented Reality Law, Privacy, and Ethics


Brian Wassom


Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position...

Parution : 2014-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
39,77
Télécharger le livre :  Securing VoIP
Ajouter à ma liste d'envies

Securing VoIP


Regis J. Jr (Bud) Bates


Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud...

Parution : 2014-11-14
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
39,77
Télécharger le livre :  Designing and Building Security Operations Center
Ajouter à ma liste d'envies

Designing and Building Security Operations Center


David Nathans


Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and...

Parution : 2014-11-06
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
39,77
Télécharger le livre :  Measuring and Managing Information Risk
Ajouter à ma liste d'envies

Measuring and Managing Information Risk


Jack Freund , Jack Jones


Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk...

Parution : 2014-08-23
Format(s) : PDF, epub sans DRM
J'achète
39,77
Télécharger le livre :  Windows Performance Analysis Field Guide
Ajouter à ma liste d'envies

Windows Performance Analysis Field Guide


Clint Huffman


Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a...

Parution : 2014-08-14
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
39,77
Télécharger le livre :  Cyber Crime and Cyber Terrorism Investigator's Handbook
Ajouter à ma liste d'envies

Cyber Crime and Cyber Terrorism Investigator's Handbook


Babak Akhgar , Francesca Bosco , Andrew Staniforth


Cyber Crime andCyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some...

Parution : 2014-07-16
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
39,77
123 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés