Identity and Access Management is the 5th domain of the CISSP common body of knowledge. Some of the main topics we will cover in this course include: theory and concepts of identity in access manage……続きを見る
When an attacker breaks into your network, you have a home-field advantage. But how do you use it?
Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring hone……続きを見る
How to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data.
Trusted Data describes a data architecture that ……続きを見る
著者:Sam Grubb
出版社: No Starch Press
発売日: 2021年06月15日
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.……続きを見る
This comprehensive exam guide offers 100% coverage of every topic on the CompTIA PenTest+ exam
Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-001……続きを見る
Keeping this high-demand information from yourself will be detrimental to your technologically-clueless future self...
Do computers and technology, in general, feel alien-like to you, as if it's som……続きを見る
Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks.
Bugs: they're everywhere. Software, firmware, hardware -- they all h……続きを見る
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!
Adam Shostack is responsible for security development lifecyc……続きを見る
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It ……続きを見る
著者:Thejendra BS
出版社: IT Governance Publishing
発売日: 2014年10月12日
IT has brought many benefits to business. However, IT failures can seriously damage your ability to deliver products and services, harm your company’s reputation, and jeopardise your relationship wi……続きを見る
著者:Gaurav Raje
出版社: O'Reilly Media
発売日: 2021年09月09日
Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their responses are often more reac……続きを見る
This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam
Take the latest version of the CompTIA Security+ exam with complete confidence using the detail……続きを見る
著者:Ted Jordan
出版社: Packt Publishing
発売日: 2021年09月13日
Pass the Certified Information Systems Security Professional Exam with our all-new set of practice exams designed to simulate the latest exam version Key Features • Get ready to take the CISSP exam ……続きを見る
The multidisciplinary field of quantum computing strives to exploit some of the uncanny aspects of quantum mechanics to expand our computational horizons. Quantum Computing for Computer Scientists t……続きを見る
BUILDING SECURE CARS
Explores how the automotive industry can address the increased risks of cyberattacks and incorporate security into the software development lifecycle
While increased connectivit……続きを見る
Defend your networks and data from attack with this unique two-book security set
The Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Appl……続きを見る
Pass the First Time!
CompTIA Security+ Get Certified Get Ahead: SY0-401 Study Guide is an update to the top-selling SY0-301 guide, which helped thousands of readers pass the exam the first time they……続きを見る
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills
Key Features
Practical recipes to conduct effective penetration testing using the latest version of Kali Lin……続きを見る
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishin……続きを見る
Gordon Yu, Esq., MBA passed the CIPP/E on his first try. What about you?
How to Pass the CIPP/E
Santa Clara Law administered an old version of the CIPP exam in January 2015 to over 20 of its law stu……続きを見る
著者:William Easttom
出版社: Springer International Publishing
発売日: 2020年12月22日
This textbook is a practical yet in depth guide to cryptography and its principles and practices. The book places cryptography in real-world security situations using the hands-on information contai……続きを見る
Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive i……続きを見る
著者:Glen D. Singh
出版社: Packt Publishing
発売日: 2019年11月14日
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch
Key Features
Get up and running with Kali Linux 2019.2
Gain comprehensive insi……続きを見る
How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the future
We live in an interconnected world, where secu……続きを見る
Are you fascinated by the idea of hacking?
Do you want to learn the secrets of ethical hackers?
This practical, step by step guide book will teach you all you need to know!
Hacking is a term that ev……続きを見る
As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the p……続きを見る
著者:Matt Walker
出版社: McGraw Hill LLC
発売日: 2019年03月22日
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Up-to-dat……続きを見る
Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practit……続きを見る
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book b……続きを見る
著者:Matt Burrough
出版社: No Starch Press
発売日: 2018年07月31日
A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple.
Pentesting A……続きを見る