Catalog Search Results
Author
Language
English
Formats
Description
Claypoole and Payton describe the implications of people's online personas and reputations. They offer a guide to the many pitfalls and risks of certain online activities, and provide a roadmap to taking charge of online reputation for personal and professional success.
Author
Series
Language
English
Description
Protecting Our Future, Volume 2, completes the comprehensive examination of the cybersecurity threats to our nation's sixteen Critical Infrastructure Sectors begun in Protecting Our Future, Volume 1. Subject matter experts offer an in-depth analysis of operational needs and suggest best practices within the remaining sectors: IT, the chemical industry, commercial facilities, manufacturing, water systems and dams, emergency services, food and agriculture,...
Author
Language
English
Formats
Description
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things...
Author
Language
English
Formats
Description
In The United States of Anonymous, Jeff Kosseff explores how the right to anonymity has shaped American values, politics, business, security, and discourse, particularly as technology has enabled people to separate their identities from their communications.
Legal and political debates surrounding online privacy often focus on the Fourth Amendment's protection against unreasonable searches and seizures, overlooking the history and future of an equally...
Author
Series
Language
English
Description
Identity and Access Management is the 5th domain of the CISSP common body of knowledge. Some of the main topics we will cover in this course include: theory and concepts of identity in access management, discretionary and mandatory access control, types of controls and related risk and access control attacks.
Author
Series
Language
English
Description
Security Assessment and Testing is the 6th domain of the CISSP's common body of knowledge. In this course we will cover the following: assessment and testing strategies, security control effectiveness testing. security process data collection, test result analysis, third-party assessment and Information Security Continuous Monitoring (ISCM),
Author
Series
Language
English
Description
Security Operations is the 8th domain of the CISSP's common body of knowledge. This course will cover the following' application security, systems development life cycle (SDLC), security impact of acquired software, software threats, programming language concepts and concerns, secure coding and security control concepts.
Author
Series
Language
English
Description
Did you know your car can be hacked? Your medical device? Your employer's HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headline-making hacks and breaches, but lack a complete understanding of how and why they happen, or if they have been professionally or personally compromised. In Cybersecurity in Our Digital Lives, twelve experts provide much-needed...
Author
Language
English
Description
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization's resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develop. Security controls and responses can then be applied...
Author
Language
English
Description
Recent regulations about cybersecurity put pressure on every Board Director and C-Suite executive to understand the risks and impact of a breach. When your company's CIO or CISO speaks, how much do you understand? If you don't speak the language of cybersecurity, you are not only at a disadvantage, but you could also be legally liable.
This book was written to be a translator, handbook, and dictionary for anyone who isn't an expert in the world...
Author
Series
Language
Español
Description
Los GuíaBurros son manuales básicos para aprender a utilizar una herramienta, realizar una actividad o adquirir un conocimiento determinado de manera sencilla y fácil. GuíaBurros Ciberseguridad es una guía con consejos para tener vidas digitales más seguras, desde la definición de ciberseguridad, pasando por las ciberamenazas más comunes y cómo detectarlas, hasta lo que esta por venir en esta materia.
Toda la información en una guía sencilla...
Author
Language
English
Description
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But, with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.
In Fire Doesn't Innovate, cybersecurity expert Kip Boyle provides...
Author
Language
English
Description
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard.
You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. Included is a detailed illustration of cyber warfare against the backdrop of national...
Author
Language
English
Description
There is no denying that the Covid-19 pandemic has been the cause of many changes. Many people have been working from home over the past two years, and many have been using their computers more than ever, for both business and person reasons. It is the perfect time for #Hacked – 10 Practical Cyber Security Tips to Help Protect Personal or Business Information, a new book by cyber security expert Albert Whale.
This book is a guide to the risks...
Author
Language
Español
Description
Te interesa conocer los verdaderos riesgos de ciberseguridad para tu organización?
Deja de lado toda discusión técnica y adquiere una perspectiva estratégica, propia de los líderes que buscan comprender los conflictos y las oportunidades de la era digital.
Un futuro cada vez más conectado y complejo requiere una estrategia sólida en ciberseguridad. No se trata solo de protegerse de las amenazas, sino de maximizar las potencialidades transformadoras...
Author
Language
English
Description
Cyber security and Infrastructure Protection will be of particular interest to those with a vested interest in the protection of critical infrastructures in the U.S. – its dams, chemical plants, emergency care facilities, energy plants, and nuclear facilities. Terrorists and rogue nation states have been relentless in attempts to gain access to those systems for nefarious purposes. This book provides an overview of the numerous cyber dangers our...
Author
Language
English
Description
Every business, large and small, is vulnerable to cyber attack. If your company isn't well protected, its systems may be compromised by sophisticated hackers with malicious intentions.
Business owners, boards, CEOs, and cyber security managers must work together to combat this threat by putting effective security measures and organization in place. With Smiling Security, you can build one from the ground up in just ninety days.
These powerful strategies...
Author
Language
English
Description
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response...
Author
Language
English
Description
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber-attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.
In decades past, an entire enterprise...
Author
Language
English
Description
Use this book to build secure firmware.
As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today's antivirus scanning technology, it represents an interesting target for attackers.
As platforms are universally network-connected and can contain...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request