Communications category: 4698 books

Cover of Security and Loss Prevention
by Philip Purpura, CPP, Florence Darlington Technical College
Language: English
Release Date: January 18, 2013

The sixth edition of Security and Loss Prevention continues the tradition of providing introductory and advanced coverage of the body of knowledge of the security profession. To bridge theory to practice is the book’s backbone, and Philip Purpura continues this strong effort with new sidebars and...
Cover of Tomorrow's Lawyers

Tomorrow's Lawyers

An Introduction to Your Future

by Richard Susskind
Language: English
Release Date: June 2, 2017

Tomorrow's Lawyers predicts that we are at the beginning of a period of fundamental transformation in law: a time in which we will see greater change than we have seen in the past two centuries. Where the future of the legal service will be a world of internet-based global businesses, online document...
Cover of Identity Theft and Fraud

Identity Theft and Fraud

Evaluating and Managing Risk

by Norm Archer, Susan Sproule, Yufei Yuan
Language: English
Release Date: June 30, 2012

Personal data is increasingly being exchanged and stored by electronic means, making businesses, organizations and individuals more vulnerable than ever to identity theft and fraud. This book provides a practical and accessible guide to identity theft and fraud using a risk management approach. It...
Cover of CISSP Study Guide
by Eric Conrad, Seth Misenar, Joshua Feldman
Language: English
Release Date: September 16, 2010

CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtain CISSP certification. The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The...
Cover of Managing Information Security
by
Language: English
Release Date: March 3, 2010

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability...
Cover of Cisco Router and Switch Forensics

Cisco Router and Switch Forensics

Investigating and Analyzing Malicious Network Activity

by Dale Liu
Language: English
Release Date: June 3, 2009

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack...
Cover of Network Security Bible
by Eric Cole
Language: English
Release Date: March 31, 2011

The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your...
Cover of Security+ Boot Camp Study Guide
by Chad Russell
Language: English
Release Date: December 21, 2016

There is a shortfall of over one million information security positions in the global marketplace today. Professionals are in demand and in short supply.The Security+ exam is your ticket to ride in the red hot cyber security industry. Learn about penetration testing, vulnerability scanning...
Cover of Hacking Exposed Linux

Hacking Exposed Linux

Linux Security Secrets and Solutions

by ISECOM
Language: English
Release Date: August 22, 2007

The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides...
Cover of UNIX and Linux Forensic Analysis DVD Toolkit
by Chris Pogue, Cory Altheide, Todd Haverkos
Language: English
Release Date: July 24, 2008

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the...
Cover of Computer Security Fundamentals

Computer Security Fundamentals

Computer Security Fundame_2

by William (Chuck) Easttom II
Language: English
Release Date: December 9, 2011

Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as...
Cover of Network Forensics

Network Forensics

Tracking Hackers through Cyberspace

by Sherri Davidoff, Jonathan Ham
Language: English
Release Date: June 18, 2012

“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal...
Cover of Scene of the Cybercrime
by Debra Littlejohn Shinder, Michael Cross
Language: English
Release Date: July 21, 2008

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the...
Cover of Virtualization for Security

Virtualization for Security

Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

by John Hoopes
Language: English
Release Date: February 24, 2009

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources,...
First 43 44 45 46 47 48 4950 51 52 53 54 55 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy