Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced featuresKey FeaturesFind out how to activate, deploy, and configure Prisma AccessConfigure mobile ……続きを見る
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The gr……続きを見る
An eBook Guide for Non-Techie People
Clean up your old, unused online accounts
with our step-by-step process
One of the biggest threats to your online privacy is leaving old, unused accounts hanging……続きを見る
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers
In The Art of Attack: Attacker Mindset for Security Professionals, expe……続きを見る
A curated collection of HBR's latest thinking on the business implications of the collection, storage, and use of customer data and privacy.
Features for readers: Curates the latest and most importa……続きを見る
A long-time chief data scientist at Amazon shows how open data can make everyone, not just corporations, richer
Every time we Google something, Facebook someone, Uber somewhere, or even just turn on……続きを見る
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" vi……続きを見る
Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks.
Bugs: they're everywhere. Software, firmware, hardware -- they all h……続きを見る
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in ……続きを見る
Central Asia, 2033 ー The Eurasian Federation (EAF), a newly established super-state, is proclaimed in Moscow, vowing to restore the glory that was once Russia’s Tsarist and Soviet legacy. Under the……続きを見る
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of ……続きを見る
著者:Jeffrey Hunker
出版社: McClelland & Stewart
発売日: 2010年08月24日
The Internet is often called a superhighway, but it may be more analogous to a city: an immense tangle of streets, highways, and interchanges, lined with homes and businesses, playgrounds and theatr……続きを見る
If you are reading this, it's a pretty good bet that the "Gotcha" grabbed your attention. If it did, great! If you arrived here by some other means, you made a wise decision. Find out why as you rea……続きを見る
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new t……続きを見る
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing……続きを見る
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integr……続きを見る
Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniques Key Features •……続きを見る
著者: Everest Media
出版社: Everest Media LLC
発売日: 2022年03月23日
Please note: This is a companion version & not the original book. Sample Book Insights: #1 iSight Partners, a private intelligence firm, had a team that specialized in software vulnerability researc……続きを見る
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significant……続きを見る
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.
Key Featu……続きを見る
A short guide for less tech-savvy users and older users on how to protect your information and identity online. Written in easy-to-understand language, this book covers topics including: social engi……続きを見る
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender Ke……続きを見る
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time.
“What Michael Lewis did for baseball in Moneyball, Renee Dudley and Dani……続きを見る
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques Key Features • Understand what happens in an attack and build the prope……続きを見る
Move beyond the checklist and fully protect yourself from third-party cybersecurity risk
Over the last decade, there have been hundreds of big-name organizations in every sector that have experience……続きを見る
This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that……続きを見る
Get complete coverage of all objectives included on the latest release of the CompTIA Security+ exam from this comprehensive resource. Cowritten by leading information security experts, this authori……続きを見る
In their second book on the topic, authors Abbie H. Brown and Tim D. Green outline a new process education leaders can follow to develop a secure environment for learning with technology. This book ……続きを見る
Amministrare il sistema Linux e creare un server di servizi Intranet/Internet
Occuparsi degli aspetti e degli strumenti dedicati alla sicurezza del sistema server, dei servizi intranet/internet, del……続きを見る