Six appendixes taken from the author's website
The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to …
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide …
The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC ServicesThis completely new, vendor-neutral guide brings together all the …
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security …
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with …
Beginning
Do you wish to protect your company or your family from cybersecurity threats?Have you been seeking for a book that …
Security Smarts for the Self-Guided IT Professional “Get to know the hackers—or plan on getting hacked. Sullivan and Liu have …
The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets …
For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security …
Penetration testing is about more than just getting through a perimeter firewall. The biggest security threats are inside the network, …
Congratulations! By purchasing this eBook, you have taken your first step in the exciting process of becoming a Master Hacker. …
A revolutionary approach to digital security as a tool for protecting information assets and building customer loyalty, operational efficiency, and …
The conversion to the Kindle addition was done poorly. Some words are concatenated together and others are split mid-word. I …
This book is a compilation of selected papers from the 3rd International Symposium on Software Reliability, Industrial Safety, Cyber Security …