FREE EBOOK - A Treatise on Systems (volume 1)
by Mark Burgess
Network and System Administration usually refers only to the traditional skills and recipes for keeping computers and networks running properly. But, in truth, this view omits the most important part of the system: humans. The skill needed to comprehend and tame systems comprising both humans and machines is that of managing complexity. In this book, first written in 2002 and updated now, Mark Burgess summa...
Publisher: Self-publishing | Release: 2017
Hacking Exposed Malware & Rootkits, 2nd Edition
by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate...
Price: $6.00 | Publisher: McGraw-Hill | Release: 2016
Hacking Exposed Industrial Control Systems
by Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt
This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effec...
Price: $35.87 | Publisher: McGraw-Hill | Release: 2016
FREE EBOOK - Managing Risk and Information Security, 2nd Edition
by Malcolm Harkins
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience.Managing Risk and Information Security provides thought leadership ...
Price: $22.68 | Publisher: Apress | Release: 2016
by Ed Pollack
This book is an introduction and deep-dive into the many uses of dynamic SQL in Microsoft SQL Server. Dynamic SQL is key to large-scale searching based upon user-entered criteria. It's also useful in generating value-lists, in dynamic pivoting of data for business intelligence reporting, and for customizing database objects and querying their structure.Executing dynamic SQL is at the heart of applicati...
Price: $29.99 | Publisher: Apress | Release: 2016
Building a Comprehensive IT Security Program
by Jeremy Wittkop
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing ...
Price: $39.99 | Publisher: Apress | Release: 2016
Identity and Data Security for Web Development
by Jonathan LeBlanc, Tim Messerschmidt
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are p...
Price: $33.33 | Publisher: O'Reilly Media | Release: 2016
Mastering Kali Linux Wireless Pentesting
by Brian Sak, Jilumudi Raghu Ram
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit.This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration te...
Price: $49.99 | Publisher: Packt Publishing | Release: 2016
by Srinivasa Rao Kotipalli, Mohammed A. Imran
With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security.Hacking Android...
Price: $30.99 | Publisher: Packt Publishing | Release: 2016
by Benoy Antony, Konstantin Boudnik, Cheryl Adams, Branky Shao, Cazen Lee, Kai Sasaki
Professional Hadoop is the complete reference and resource for experienced developers looking to employ Apache Hadoop in real-world settings. Written by an expert team of certified Hadoop developers, committers, and Summit speakers, this book details every key aspect of Hadoop technology to enable optimal processing of large data sets. Designed expressly for the professional developer, this book skips over ...
Price: $34.32 | Publisher: Wrox | Release: 2016