As the recognized leader in the field of information security education and certification, the (ISC)2® promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) examination assesses individuals’ understanding of security management practices. Obtaining certification validates your ability ...
How can you stay safe while surfing the Internet? You need to be an Internet superhero! The internet is an exciting world, but there are things you should be careful of as well. Find out how information is used online and how Internet superheroes protect their identities. Then use the link in this book to try fun activities that will boost your superhero skills.
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-sp...
Cyber Self-Defense educates readers about how the Internet can be used by stalkers, predators, and other criminals. By combining psychological profiles, technological information, and interesting case studies, Moore and Edwards make a complicated topic both accessible and fascinating. Quick tips, action steps, and an extensive index are included for those looking to avoid a cyber-attack or for those in need of further assistance.
The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action pl...
This book is the perfect find for anyone wanting to get into binary analysis that really just needs a methodical and well written text with accompanying exercises to mess around with. Awesome job on this one. It's pretty tough but take your time if you're just starting out and really digest what he's telling you.
"This team has consistently produced the most important research on how and why technology matters in contemporary politics. With unique investigative tools, policy savvy, and a normative commitment to exposing the ways that tough regimes use digital media to control civil society, Access Contested demonstrates that in many ways, information technology is politics." -- Philip N. Howard, Director, Project on Information Technology and...
In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensiv...
Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk. This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of stat...
Learn how to accelerate network-based delivery of rich applications and content. This book provides an introduction to the Content Networking market, and describes the players, the problems, and the solutions to the problems facing companies seeking to pr