While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approach for establishing and implementing a comprehensive information security program, FISMA Pr...
I've written A Year With Symfony for you, a developer who will work with Symfony2 for more than a month (and probably more than a year). You may have started reading your way through the official documentation ("The Book"), the cookbook, some blogs, or an online tutorial. You know now how to create a Symfony2 application, with routing, controllers, entities or documents, Twig templates and maybe some unit tests. But after these basic...
The Certified Information Security Manager®(CISM®) certification program was developed by the Information Systems Audit and Controls Association (ISACA®). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM® Certification examines five functional areas―security governance, risk management, information security p...
It's easy to find descriptions of what threat intelligence is. But it's harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This book answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challe...
"Standard Catalog of" Firearms is a uniquely valuable resource. Hobbyists, dealers, shooters, hunters and private collectors have all come to rely on it for pricing and identification. Readers can use it to identify antique, collectible, vintage and modern firearms, refer to it for completely updated pricing and read it for collecting tips and techniques. It includes over 25,000 model listings that will allow readers to buy and sell ...
The Gun Digest Book of Tactical Gear is the complete tactical gear reference, with complete listings of knives, flashlights, vests, tactical sights and optics and more, with select firearms and other weapons covered with the applicable gear. This everything guide includes: Articles from the top experts in the field A detailed where to find the gear guide Catalog listings of items covered
As a new student to the realm of security I've been hit hard with new terminology and after a while sometimes I find it hard to rememberr what an acronym stands for or what it means. This book makes it easy to look it up quickly for a refresher without having to flip through various books or search the internet. Great if you are a student like myself and working late at night cramming for an exam and you can't remember what PFS stand...
Emergency Response Guidebook 2008: A Guidebook For First Responders During The Initial Phase Of A Dangerous Goods/Hazardous Materials Transportation Incident
The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It ...
Just Say No to Microsoft begins by tracing Microsoft's rise from tiny software startup to monopolistic juggernaut and explains how the company's practices over the years have discouraged innovation, stunted competition, and helped foster an environment ripe for viruses, bugs, and hackers. Readers learn how they can dump Microsoft products--even the Windows operating system--and continue to be productive. The book also shows how to wo...