Security Books



Bookstore > Books > Security

Principles of Computer Security, 5th Edition

Principles of Computer Security, 5th Edition

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Writte...
Hands-On Security in DevOps

Hands-On Security in DevOps

DevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security of an entire organization. Hands-On Security in DevOps shows you how to adopt DevOps techniques to continuously improve your organization's security at every level, rather than just focusing on protecti...
Windows Server 2016 Security, Certificates, and Remote Access Cookbook

Windows Server 2016 Security, Certificates, and Remote Access Cookbook

Windows Server 2016 is an operating system designed to run on today's highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking th...
Pro iOS Security and Forensics

Pro iOS Security and Forensics

Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.Managing and maintaining iPh...
Machine Learning and Security

Machine Learning and Security

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you'll explore ways to apply machine learning to security is...
Microsoft Azure Security Center

Microsoft Azure Security Center

This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key opera...
Securing DevOps

Securing DevOps

An application running in the cloud can benefit from incredible efficiencies, but they come with unique security threats too. A DevOps team's highest priority is understanding those risks and hardening the system against them.Securing DevOps teaches you the essential techniques to secure your cloud services. Using compelling case studies,...
Hands-On Cybersecurity with Blockchain

Hands-On Cybersecurity with Blockchain

Blockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the world's most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value.This boo...
Practical Linux Security Cookbook, 2nd Edition

Practical Linux Security Cookbook, 2nd Edition

Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security aws, and these security aws allow attackers to get into your system and modify or even destroy...
Learning Regular Expressions

Learning Regular Expressions

Regular expression experts have long been armed with an incredibly powerful tool, one that can be used to perform all sorts of sophisticated text processing and manipulation in just about every language and on every platform. That's the good news. The bad news is that for too long, regular expressions have been the exclusive property of o...
Networking All-in-One For Dummies, 7th Edition

Networking All-in-One For Dummies, 7th Edition

Whether you're in charge of a small network or a large network, Networking All-in-One is full of the information you'll need to set up a network and keep it functioning. Fully updated to capture the latest Windows 10 releases through Spring 2018, this is the comprehensive guide to setting up, managing, and securing a successful network.In...
Windows 10 All-In-One For Dummies, 3rd Edition

Windows 10 All-In-One For Dummies, 3rd Edition

Are you ready to become the resident Windows 10 expert in your office? Look no further! This book is your one-stop shop for everything related to the latest updates to this popular operating system. With the help of this comprehensive resource, you'll be able to back up your data and ensure the security of your network, use Universal Apps...
Hacking For Dummies, 6th Edition

Hacking For Dummies, 6th Edition

In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that i...
Linux All-In-One For Dummies, 6th Edition

Linux All-In-One For Dummies, 6th Edition

Inside, over 800 pages of Linux topics are organized into eight task-oriented mini books that help you understand all aspects of the latest OS distributions of the most popular open-source operating system in use today. Topics include getting up and running with basics, desktops, networking, internet services, administration, security, sc...
CISSP For Dummies, 6th Edition

CISSP For Dummies, 6th Edition

If you're a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass the exam. Plus, you'll get tips on setting up a 60-day study plan, tips for exam day, and access to an onli...
Gray Hat Hacking, 5th Edition

Gray Hat Hacking, 5th Edition

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-t...
Microsoft SQL Server 2017 on Linux

Microsoft SQL Server 2017 on Linux

This comprehensive guide shows, step-by-step, how to set up, configure, and administer SQL Server 2017 on Linux for high performance and high availability. Written by a SQL Server expert and respected author, Microsoft SQL Server 2017 on Linux teaches valuable Linux skills to Windows-based SQL Server professionals. You will get clear cove...
Learn Salesforce Lightning

Learn Salesforce Lightning

Refer to this invaluable how-to guide for basic training on Salesforce Lightning. Salespeople and technical users and consultants will no longer have to resort to learning the interface on their own, which is very time consuming.Learn Salesforce Lightning is a step-by-step visual guide that offers immediate and valuable solutions to the n...
Practical JSF in Java EE 8

Practical JSF in Java EE 8

Master the Java EE 8 and JSF (JavaServer Faces) APIs and web framework with this practical, projects-driven guide to web development. This book combines theoretical background with a practical approach by building four real-world applications. By developing these JSF web applications, you'll take a tour through the other Java EE technolog...
Raspberry Pi for Arduino Users

Raspberry Pi for Arduino Users

Leverage your Arduino skills in the Raspberry Pi world and see how to cross the two platforms into sophisticated programs.The Arduino and Raspberry Pi communities overlap more than you might think. Arduinos can be expanded to have network capabilities with a variety of "shields", all of which increase the cost and complexity of ...

Pages: 1, 2, 3 ... 22 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.