Shop ebooks online Security - Readzis.co.uk
Readzis program recommandation
66 ebook(s)
Download this eBook Privileged Attack Vectors
Add to my wish list

Privileged Attack Vectors


Morey J. Haber


See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will...

Publication date: 2020-06-13
Format: PDF, ePub
Publisher: Apress
Add to basket
£64,99
Download this eBook Designing a HIPAA-Compliant Security Operations Center
Add to my wish list

Designing a HIPAA-Compliant Security Operations Center


Eric C. Thompson


Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of...

Publication date: 2020-02-25
Format: PDF, ePub
Publisher: Apress
Add to basket
£49,99
Download this eBook Solving Identity Management in Modern Applications
Add to my wish list

Solving Identity Management in Modern Applications


Abhishek Hingnikar , Yvonne Wilson


Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the...

Publication date: 2019-12-18
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Identity Attack Vectors
Add to my wish list

Identity Attack Vectors


Morey J. Haber , Darran Rolls


Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging...

Publication date: 2019-12-17
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Ransomware Revealed
Add to my wish list

Ransomware Revealed


Nihad A. Hassan


Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies,...

Publication date: 2019-11-06
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Practical Cryptography in Python
Add to my wish list

Practical Cryptography in Python


Christopher K. Monson , Seth James Nielson


Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood...

Publication date: 2019-09-27
Format: PDF, ePub
Publisher: Apress
Add to basket
£49,99
Download this eBook Waging Cyber War
Add to my wish list

Waging Cyber War


Jacob G. Oakley


Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....

Publication date: 2019-08-13
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook The IoT Hacker's Handbook
Add to my wish list

The IoT Hacker's Handbook


Aditya Gupta


Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio...

Publication date: 2019-03-30
Format: PDF, ePub
Publisher: Apress
Add to basket
£49,99
Download this eBook PowerShell and Python Together
Add to my wish list

PowerShell and Python Together


Chet Hosmer


Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's...

Publication date: 2019-03-30
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Professional Red Teaming
Add to my wish list

Professional Red Teaming


Jacob G. Oakley


Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than...

Publication date: 2019-03-08
Format: PDF, ePub
Publisher: Apress
Add to basket
£39,99
Download this eBook Building Digital Experience Platforms
Add to my wish list

Building Digital Experience Platforms


Sourabhh Sethii , Shailesh Kumar Shivakumar


Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise...

Publication date: 2019-01-31
Format: PDF, ePub
Publisher: Apress
Add to basket
£54,99
Download this eBook Financial Cybersecurity Risk Management
Add to my wish list

Financial Cybersecurity Risk Management


Jennifer L. Bayuk , Paul Rohmeyer


Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line...

Publication date: 2018-12-13
Format: PDF
Publisher: Apress
Add to basket
£49,99
Download this eBook Cybersecurity Incident Response
Add to my wish list

Cybersecurity Incident Response


Eric C. Thompson


Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and...

Publication date: 2018-09-20
Format: PDF, ePub
Publisher: Apress
Add to basket
£54,99
Download this eBook Firewalls Don't Stop Dragons
Add to my wish list

Firewalls Don't Stop Dragons


Carey Parker


Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is...

Publication date: 2018-08-24
Format: PDF, ePub
Publisher: Apress
Add to basket
£32,99
Download this eBook Open Source Intelligence Methods and Tools
Add to my wish list

Open Source Intelligence Methods and Tools


Nihad A. Hassan , Rami Hijazi


Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism...

Publication date: 2018-06-30
Format: PDF
Publisher: Apress
Add to basket
£49,99
Download this eBook Asset Attack Vectors
Add to my wish list

Asset Attack Vectors


Morey J. Haber , Brad Hibbert


Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise,...

Publication date: 2018-06-15
Format: PDF
Publisher: Apress
Add to basket
£39,99
Download this eBook Privileged Attack Vectors
Add to my wish list

Privileged Attack Vectors


Morey J. Haber , Brad Hibbert


See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached....

Publication date: 2017-12-08
Format: PDF, ePub
Publisher: Apress
Add to basket
£19,99
Download this eBook Achieving and Sustaining Secured Business Operations
Add to my wish list

Achieving and Sustaining Secured Business Operations


Neelesh Ajmani , Dinesh Kumar


Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company...

Publication date: 2017-12-07
Format: PDF, ePub
Publisher: Apress
Add to basket
£27,99
Download this eBook Building a HIPAA-Compliant Cybersecurity Program
Add to my wish list

Building a HIPAA-Compliant Cybersecurity Program


Eric C. Thompson


Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The...

Publication date: 2017-11-11
Format: PDF, ePub
Publisher: Apress
Add to basket
£54,99
Download this eBook Digital Privacy and Security Using Windows
Add to my wish list

Digital Privacy and Security Using Windows


Nihad Hassan , Rami Hijazi


Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.This book...

Publication date: 2017-07-02
Format: PDF, ePub
Publisher: Apress
Add to basket
£54,99
<< < 1234 >

Sign up to get our latest ebook recommendations and special offers


Paiements sécurisés