Shop ebooks online Security - Readzis.co.uk
Readzis program recommandation
74 ebook(s)
Download this eBook Authentication and Access Control
Add to my wish list

Authentication and Access Control


Sirapat Boonkrong


Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography...

Publication date: 2020-12-11
Format: PDF, ePub
Publisher: Apress
Add to basket
£54,99
Download this eBook 70 Tips and Tricks for Mastering the CISSP Exam
Add to my wish list

70 Tips and Tricks for Mastering the CISSP Exam


R. Sarma Danturthi


Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick...

Publication date: 2020-11-09
Format: PDF, ePub
Publisher: Apress
Add to basket
£54,99
Download this eBook A Complete Guide to Burp Suite
Add to my wish list

A Complete Guide to Burp Suite


Sagar Rahalkar


Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used...

Publication date: 2020-11-06
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Building Secure Firmware
Add to my wish list

Building Secure Firmware


Jiewen Yao , Vincent Zimmer


Use this book to build secure firmware.As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence,...

Publication date: 2020-10-27
Format: PDF, ePub
Publisher: Apress
Add to basket
£49,99
Download this eBook Serverless Security
Add to my wish list

Serverless Security


Miguel A. Calles


Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application,...

Publication date: 2020-10-05
Format: PDF, ePub
Publisher: Apress
Add to basket
£54,99
Download this eBook CompTIA Security+ Certification Study Guide
Add to my wish list

CompTIA Security+ Certification Study Guide


Ahmed F. Sheikh


Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.  Computer network vulnerabilities and threats are covered...

Publication date: 2020-09-12
Format: PDF, ePub
Publisher: Apress
Add to basket
£54,99
Download this eBook Firewalls Don't Stop Dragons
Add to my wish list

Firewalls Don't Stop Dragons


Carey Parker


Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your...

Publication date: 2020-09-11
Format: PDF, ePub
Publisher: Apress
Add to basket
£29,99
Download this eBook Rational Cybersecurity for Business
Add to my wish list

Rational Cybersecurity for Business


Dan Blum


Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and...

Publication date: 2020-08-12
Format: PDF, ePub
Publisher: Apress
Add to basket
Free
Download this eBook Privileged Attack Vectors
Add to my wish list

Privileged Attack Vectors


Morey J. Haber


See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will...

Publication date: 2020-06-13
Format: PDF, ePub
Publisher: Apress
Add to basket
£64,99
Download this eBook Designing a HIPAA-Compliant Security Operations Center
Add to my wish list

Designing a HIPAA-Compliant Security Operations Center


Eric C. Thompson


Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...

Publication date: 2020-02-25
Format: PDF, ePub
Publisher: Apress
Add to basket
£49,99
Download this eBook Solving Identity Management in Modern Applications
Add to my wish list

Solving Identity Management in Modern Applications


Abhishek Hingnikar , Yvonne Wilson


Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Publication date: 2019-12-18
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Identity Attack Vectors
Add to my wish list

Identity Attack Vectors


Morey J. Haber , Darran Rolls


Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...

Publication date: 2019-12-17
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Ransomware Revealed
Add to my wish list

Ransomware Revealed


Nihad A. Hassan


Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies,...

Publication date: 2019-11-06
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Practical Cryptography in Python
Add to my wish list

Practical Cryptography in Python


Christopher K. Monson , Seth James Nielson


Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood...

Publication date: 2019-09-27
Format: PDF, ePub
Publisher: Apress
Add to basket
£49,99
Download this eBook Waging Cyber War
Add to my wish list

Waging Cyber War


Jacob G. Oakley


Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....

Publication date: 2019-08-13
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook The IoT Hacker's Handbook
Add to my wish list

The IoT Hacker's Handbook


Aditya Gupta


Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio...

Publication date: 2019-03-30
Format: PDF, ePub
Publisher: Apress
Add to basket
£49,99
Download this eBook PowerShell and Python Together
Add to my wish list

PowerShell and Python Together


Chet Hosmer


Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's...

Publication date: 2019-03-30
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Professional Red Teaming
Add to my wish list

Professional Red Teaming


Jacob G. Oakley


Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than...

Publication date: 2019-03-08
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Building Digital Experience Platforms
Add to my wish list

Building Digital Experience Platforms


Sourabhh Sethii , Shailesh Kumar Shivakumar


Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise...

Publication date: 2019-01-31
Format: PDF, ePub
Publisher: Apress
Add to basket
£54,99
Download this eBook Financial Cybersecurity Risk Management
Add to my wish list

Financial Cybersecurity Risk Management


Jennifer L. Bayuk , Paul Rohmeyer


Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line...

Publication date: 2018-12-13
Format: PDF
Publisher: Apress
Add to basket
£49,99
<< < 1234 >

Sign up to get our latest ebook recommendations and special offers


Paiements sécurisés