66 livres(s)
Télécharger le livre :  Privileged Attack Vectors
Ajouter à ma liste d'envies

Privileged Attack Vectors


Morey J. Haber


See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will...

Parution : 2020-06-13
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
78,87
Télécharger le livre :  Designing a HIPAA-Compliant Security Operations Center
Ajouter à ma liste d'envies

Designing a HIPAA-Compliant Security Operations Center


Eric C. Thompson


Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...

Parution : 2020-02-25
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Solving Identity Management in Modern Applications
Ajouter à ma liste d'envies

Solving Identity Management in Modern Applications


Abhishek Hingnikar , Yvonne Wilson


Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Parution : 2019-12-18
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Identity Attack Vectors
Ajouter à ma liste d'envies

Identity Attack Vectors


Morey J. Haber , Darran Rolls


Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...

Parution : 2019-12-17
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Ransomware Revealed
Ajouter à ma liste d'envies

Ransomware Revealed


Nihad A. Hassan


Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies,...

Parution : 2019-11-06
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Practical Cryptography in Python
Ajouter à ma liste d'envies

Practical Cryptography in Python


Christopher K. Monson , Seth James Nielson


Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood...

Parution : 2019-09-27
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Waging Cyber War
Ajouter à ma liste d'envies

Waging Cyber War


Jacob G. Oakley


Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....

Parution : 2019-08-13
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  The IoT Hacker's Handbook
Ajouter à ma liste d'envies

The IoT Hacker's Handbook


Aditya Gupta


Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio...

Parution : 2019-03-30
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  PowerShell and Python Together
Ajouter à ma liste d'envies

PowerShell and Python Together


Chet Hosmer


Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's...

Parution : 2019-03-30
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Professional Red Teaming
Ajouter à ma liste d'envies

Professional Red Teaming


Jacob G. Oakley


Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than...

Parution : 2019-03-08
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Building Digital Experience Platforms
Ajouter à ma liste d'envies

Building Digital Experience Platforms


Sourabhh Sethii , Shailesh Kumar Shivakumar


Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise...

Parution : 2019-01-31
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Financial Cybersecurity Risk Management
Ajouter à ma liste d'envies

Financial Cybersecurity Risk Management


Jennifer L. Bayuk , Paul Rohmeyer


Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line...

Parution : 2018-12-13
Format(s) : PDF
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Cybersecurity Incident Response
Ajouter à ma liste d'envies

Cybersecurity Incident Response


Eric C. Thompson


Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and...

Parution : 2018-09-20
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Firewalls Don't Stop Dragons
Ajouter à ma liste d'envies

Firewalls Don't Stop Dragons


Carey Parker


Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is...

Parution : 2018-08-24
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
39,43
Télécharger le livre :  Open Source Intelligence Methods and Tools
Ajouter à ma liste d'envies

Open Source Intelligence Methods and Tools


Nihad A. Hassan , Rami Hijazi


Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism...

Parution : 2018-06-30
Format(s) : PDF
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Asset Attack Vectors
Ajouter à ma liste d'envies

Asset Attack Vectors


Morey J. Haber , Brad Hibbert


Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise,...

Parution : 2018-06-15
Format(s) : PDF
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Privileged Attack Vectors
Ajouter à ma liste d'envies

Privileged Attack Vectors


Morey J. Haber , Brad Hibbert


See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached....

Parution : 2017-12-08
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
28,47
Télécharger le livre :  Achieving and Sustaining Secured Business Operations
Ajouter à ma liste d'envies

Achieving and Sustaining Secured Business Operations


Neelesh Ajmani , Dinesh Kumar


Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company...

Parution : 2017-12-07
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
34,50
Télécharger le livre :  Building a HIPAA-Compliant Cybersecurity Program
Ajouter à ma liste d'envies

Building a HIPAA-Compliant Cybersecurity Program


Eric C. Thompson


Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The...

Parution : 2017-11-11
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Digital Privacy and Security Using Windows
Ajouter à ma liste d'envies

Digital Privacy and Security Using Windows


Nihad Hassan , Rami Hijazi


Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.This book...

Parution : 2017-07-02
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
66,05
<< < 1234 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés