FISMA Principles and Best Practices: Beyond Compliance
PDF
FISMA Principles and Best Practices: Beyond Compliance

While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approach for establishing and implementing a comprehensive information security program, FISMA Pr...

A Year With Symfony: Writing healthy, reusable Symfony2 code
PDF
A Year With Symfony: Writing healthy, reusable Symfony2 code

I've written A Year With Symfony for you, a developer who will work with Symfony2 for more than a month (and probably more than a year). You may have started reading your way through the official documentation ("The Book"), the cookbook, some blogs, or an online tutorial. You know now how to create a Symfony2 application, with routing, controllers, entities or documents, Twig templates and maybe some unit tests. But after these basic...

Complete Guide to CISM Certification
PDF
Complete Guide to CISM Certification

The Certified Information Security Manager®(CISM®) certification program was developed by the Information Systems Audit and Controls Association (ISACA®). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM® Certification examines five functional areas―security governance, risk management, information security p...

The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence
PDF
The Threat Intelligence Handbook

It's easy to find descriptions of what threat intelligence is. But it's harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This book answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challe...

2010 Standard Catalog of® Firearms
PDF
2010 Standard Catalog of® Firearms

"Standard Catalog of" Firearms is a uniquely valuable resource. Hobbyists, dealers, shooters, hunters and private collectors have all come to rely on it for pricing and identification. Readers can use it to identify antique, collectible, vintage and modern firearms, refer to it for completely updated pricing and read it for collecting tips and techniques. It includes over 25,000 model listings that will allow readers to buy and sell ...

The "Gun Digest" Book of Tactical Gear
PDF
The "Gun Digest" Book of Tactical Gear

The Gun Digest Book of Tactical Gear is the complete tactical gear reference, with complete listings of knives, flashlights, vests, tactical sights and optics and more, with select firearms and other weapons covered with the applicable gear. This everything guide includes: Articles from the top experts in the field A detailed where to find the gear guide Catalog listings of items covered

Microsoft Encyclopedia of Security
PDF
Microsoft Encyclopedia of Security

As a new student to the realm of security I've been hit hard with new terminology and after a while sometimes I find it hard to rememberr what an acronym stands for or what it means. This book makes it easy to look it up quickly for a refresher without having to flip through various books or search the internet. Great if you are a student like myself and working late at night cramming for an exam and you can't remember what PFS stand...

Handbook of Electronic Security and Digital Forensics
PDF
Handbook of Electronic Security and Digital Forensics

The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It ...

Just Say No to Microsoft: How to Ditch Microsoft and Why It's Not as Hard as You Think
PDF
Just Say No to Microsoft: How to Ditch Microsoft and Why It's Not as Hard as You Think

Just Say No to Microsoft begins by tracing Microsoft's rise from tiny software startup to monopolistic juggernaut and explains how the company's practices over the years have discouraged innovation, stunted competition, and helped foster an environment ripe for viruses, bugs, and hackers. Readers learn how they can dump Microsoft products--even the Windows operating system--and continue to be productive. The book also shows how to wo...