Home Security Page 3

Security

Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations Book Description: Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides...
The Privacy Engineer’s Manifesto

The Privacy Engineer’s Manifesto

The Privacy Engineer’s Manifesto Book Description: “It’s our thesis that privacy will be an integral part of the next wave in the technology revolution and...
Securing DevOps

Securing DevOps

Securing DevOps Book Description: Security teams need to adopt the techniques of DevOps and switch their focus from defending only the infrastructure to protecting the entire organization...
SysSec Red Book

SysSec Red Book [PDF]

Preface After the completion of its second year of operation, the SysSec Network of Excellence produced this “Red Book of Cybersecurity” to serve as a Roadmap in...
enterprise cybersecurity

Enterprise Cybersecurity Study Guide [PDF]

Book Description: Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in...
Wireshark 2

Wireshark 2 Quick Start Guide [PDF]

Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization...
installing Wireshark

Wireshark Revealed: Essential Skills for IT Professionals [PDF]

Master Wireshark and discover how to analyze network packets and protocols effectively, along with engaging recipes to troubleshoot network problems Key Features Gain valuable insights...
Kali Linux Revealed

Kali Linux Revealed [PDF]

Why This Book? Kali Linux is not merely a collection of various information security tools that are installed on a standard Debian base and preconfigured...
cyber security professionals

Applied Network Security [PDF]

Who this book is for This book is for network security professionals, cyber security professionals, and Pentesters who are well versed with fundamentals of network...
Cyber Security

Cyber Security Policy Guidebook [PDF]

What Is Cyber Security? Cyber security refers generally to the ability to control access to networked systems and the information they contain. Where cyber security...

Follow Us!

11,688FansLike
1FollowersFollow
1FollowersFollow
97FollowersFollow
1,346FollowersFollow

Latest Books

iPod & iTunes For Dummies, 5th Edition

iPod & iTunes For Dummies, 5th Edition

Book Description: Whether it’s the iPod Nano, iPod Shuffle, video iPod, or some other variation, iTunes and iPods go together like treble and bass. It’s...
Samsung Galaxy S5 For Dummies

Samsung Galaxy S5 For Dummies

Book Description: Explore Samsung’s next generation Galaxy smartphone Do you want an easy-to-follow guide to everything your new Galaxy S5 smartphone can do? From the basics...
BlackBerry For Dummies, 2nd Edition

BlackBerry For Dummies, 2nd Edition

Book Description: What’s part PDA, part smartphone, and part media player? Your BlackBerry, naturally! Whether it’s the popular Pearl, the sleek Curve, or the hardworking...
Windows Virus and Malware Troubleshooting

Windows Virus and Malware Troubleshooting

Book Description: Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and...
Unity in Action

Unity in Action, 2nd Edition

Book Description: Manning’s bestselling and highly recommended Unity book has been fully revised! Unity in Action, Second Edition teaches you to write and deploy games with...