Home Security Page 3

Security

Pro iOS Security and Forensics

Pro iOS Security and Forensics

Pro iOS Security and Forensics Book Description: Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending...
Securing the Perimeter

Securing the Perimeter

  Book Description: Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long...
CompTIA Security+ Review Guide 4th Edition

CompTIA Security+ Review Guide, 4th Edition

CompTIA Security+ Review Guide Book Description: Consolidate your knowledge base with critical Security+ review CompTIA Security+ Review Guide, Fourth Edition, is the smart candidate’s secret weapon for passing...
Intelligence-Driven Incident Response

Intelligence-Driven Incident Response

Intelligence-Driven Incident Response Book Description: Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers...
Asset Attack Vectors

Asset Attack Vectors

Asset Attack Vectors Book Description: Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic, requiring multiple...
Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations Book Description: Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides...
The Privacy Engineer’s Manifesto

The Privacy Engineer’s Manifesto

The Privacy Engineer’s Manifesto Book Description: “It’s our thesis that privacy will be an integral part of the next wave in the technology revolution and...
Securing DevOps

Securing DevOps

Securing DevOps Book Description: Security teams need to adopt the techniques of DevOps and switch their focus from defending only the infrastructure to protecting the entire organization...
SysSec Red Book

SysSec Red Book [PDF]

Preface After the completion of its second year of operation, the SysSec Network of Excellence produced this “Red Book of Cybersecurity” to serve as a Roadmap in...
enterprise cybersecurity

Enterprise Cybersecurity Study Guide [PDF]

Book Description: Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in...

Follow Us!

11,771FansLike
2FollowersFollow
347FollowersFollow
1,909FollowersFollow

Latest Books

Introducing Materialize

Book Description: This concise step-by-step guide includes the best practices and patterns that help readers of all levels to unearth the potential of Materialize. A...

Mobile Application Penetration Testing

Book Description: Mobile security has come a long way over the last few years. It has transitioned from “should it be done?” to “it must...

Implementing Microsoft Dynamics NAV, Third Edition

Book Description: Microsoft Dynamics NAV 2016 is an Enterprise Resource Planning (ERP) application used in all kinds of organizations around the world. It provides a...

OpenStack Trove Essentials

Book Description: OpenStack has become an extremely popular solution to build public and private clouds with. Database as a Service (DBaaS) enables the delivery of...

Prezi For Dummies

Book Description: A one-stop resource for an exciting new Web-based, slide-free presentation tool! People who have been seeking a flashier version of PowerPoint have found it—and...