56 livres(s)
Télécharger le livre :  Ransomware Revealed
Ajouter à ma liste d'envies

Ransomware Revealed


Nihad A. Hassan


Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies,...

Parution : 2019-11-06
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Practical Cryptography in Python
Ajouter à ma liste d'envies

Practical Cryptography in Python


Christopher K. Monson , Seth James Nielson


Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood...

Parution : 2019-09-27
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Waging Cyber War
Ajouter à ma liste d'envies

Waging Cyber War


Jacob G. Oakley


Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....

Parution : 2019-08-13
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  The IoT Hacker's Handbook
Ajouter à ma liste d'envies

The IoT Hacker's Handbook


Aditya Gupta


Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio...

Parution : 2019-03-30
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  PowerShell and Python Together
Ajouter à ma liste d'envies

PowerShell and Python Together


Chet Hosmer


Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's...

Parution : 2019-03-30
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Professional Red Teaming
Ajouter à ma liste d'envies

Professional Red Teaming


Jacob G. Oakley


Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than...

Parution : 2019-03-08
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Building Digital Experience Platforms
Ajouter à ma liste d'envies

Building Digital Experience Platforms


Sourabhh Sethii , Shailesh Kumar Shivakumar


Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise...

Parution : 2019-01-31
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Financial Cybersecurity Risk Management
Ajouter à ma liste d'envies

Financial Cybersecurity Risk Management


Jennifer L. Bayuk , Paul Rohmeyer


Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line...

Parution : 2018-12-13
Format(s) : PDF
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Cybersecurity Incident Response
Ajouter à ma liste d'envies

Cybersecurity Incident Response


Eric C. Thompson


Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and...

Parution : 2018-09-20
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Open Source Intelligence Methods and Tools
Ajouter à ma liste d'envies

Open Source Intelligence Methods and Tools


Nihad A. Hassan , Rami Hijazi


Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism...

Parution : 2018-06-30
Format(s) : PDF
Éditeur : Apress
J'achète
56,19
Télécharger le livre :  Asset Attack Vectors
Ajouter à ma liste d'envies

Asset Attack Vectors


Morey J. Haber , Brad Hibbert


Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise,...

Parution : 2018-06-15
Format(s) : PDF
Éditeur : Apress
J'achète
46,34
Télécharger le livre :  Building a HIPAA-Compliant Cybersecurity Program
Ajouter à ma liste d'envies

Building a HIPAA-Compliant Cybersecurity Program


Eric C. Thompson


Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The...

Parution : 2017-11-11
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
62,11
Télécharger le livre :  Digital Privacy and Security Using Windows
Ajouter à ma liste d'envies

Digital Privacy and Security Using Windows


Nihad Hassan , Rami Hijazi


Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.This book...

Parution : 2017-07-02
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
66,05
Télécharger le livre :  Personal Cybersecurity
Ajouter à ma liste d'envies

Personal Cybersecurity


Marvin Waschke


Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs...

Parution : 2017-01-12
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
52,24
Télécharger le livre :  Practical Information Security Management
Ajouter à ma liste d'envies

Practical Information Security Management


Tony Campbell


Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works...

Parution : 2016-11-29
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
78,87
Télécharger le livre :  Cybersecurity for Hospitals and Healthcare Facilities
Ajouter à ma liste d'envies

Cybersecurity for Hospitals and Healthcare Facilities


Luis Ayala


Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a...

Parution : 2016-09-06
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
78,87
<< < 123

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés