Official (ISC)2® Guide to the ISSMP® CBK® ((ISC)2 Press)
PDF
Official (ISC)2® Guide to the ISSMP® CBK® ((ISC)2 Press)

As the recognized leader in the field of information security education and certification, the (ISC)2® promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) examination assesses individuals’ understanding of security management practices. Obtaining certification validates your ability ...

Online Safety for Coders (Kids Get Coding)
PDF
Online Safety for Coders (Kids Get Coding)

How can you stay safe while surfing the Internet? You need to be an Internet superhero! The internet is an exciting world, but there are things you should be careful of as well. Find out how information is used online and how Internet superheroes protect their identities. Then use the link in this book to try fun activities that will boost your superhero skills.

Practical Cloud Security [Early Release]
PDF
Practical Cloud Security

With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-sp...

Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying
PDF
Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying

Cyber Self-Defense educates readers about how the Internet can be used by stalkers, predators, and other criminals. By combining psychological profiles, technological information, and interesting case studies, Moore and Edwards make a complicated topic both accessible and fascinating. Quick tips, action steps, and an extensive index are included for those looking to avoid a cyber-attack or for those in need of further assistance.

Solving Cyber Risk: Protecting Your Company and Society
PDF
Solving Cyber Risk: Protecting Your Company and Society

The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action pl...

Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
PDF
Practical Binary Analysis

This book is the perfect find for anyone wanting to get into binary analysis that really just needs a methodical and well written text with accompanying exercises to mess around with. Awesome job on this one. It's pretty tough but take your time if you're just starting out and really digest what he's telling you.

Access Contested: Security, Identity, and Resistance in Asian Cyberspace
PDF
Access Contested: Security, Identity, and Resistance in Asian Cyberspace

"This team has consistently produced the most important research on how and why technology matters in contemporary politics. With unique investigative tools, policy savvy, and a normative commitment to exposing the ways that tough regimes use digital media to control civil society, Access Contested demonstrates that in many ways, information technology is politics." -- Philip N. Howard, Director, Project on Information Technology and...

Privacy and Security Policies in Big Data
PDF
Privacy and Security Policies in Big Data

In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensiv...

Cybersecurity: Current Writings on Threats and Protection
PDF
Cybersecurity: Current Writings on Threats and Protection

Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk. This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of stat...