Web Hosting Security

Applied Network Security Monitoring: Collection, Detection, and Analysis

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach, complete with real-world examples that teach you the key concepts of NSM.  Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, …

Learn more

Eleventh Hour CISSP: Study Guide

Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP …

Learn more

Click Here to Kill Everybody: Security and Survival in a Hyper-connected World

A world of “smart” devices means the Internet can kill people. We need to act. Now.Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers―from home thermostats to chemical plants―are all online. The Internet, once a virtual abstraction, can now sense and touch the physical world.As we open …

Learn more

Dark Territory: The Secret History of Cyber War

“An important, disturbing, and gripping history” (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer.In June 1983, President Reagan watched the movie War Games, in which a teenager …

Learn more

Cryptography and Network Security: Principles and Practice (7th Edition)

The Principles and Practice of Cryptography and Network Security Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is …

Learn more

System Forensics, Investigation, and Response (Information Systems Security & Assurance)

Revised and updated to address current issues and technology, System Forensics, Investigation, and Response, Third Edition provides a solid, broad grounding in digital forensics. The text begins by examining the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of …

Learn more

Principles of Computer Security, Fourth Edition (Official Comptia Guide)

Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+.Principles of Computer Security, Fourth Edition is a student-tested, introductory computer security textbook that provides comprehensive coverage of computer and network security fundamentals in an engaging and dynamic full-color design. In addition to teaching key computer security concepts, the textbook …

Learn more

Legal Issues in Information Security (Jones & Bartlett Learning Information Systems Security & Assurance Series)

Part of the Jones & Bartlett Learning Information Systems Security and Assurance Serieshttp://www.issaseries.com Revised and updated to address the many changes in this evolving field, the Second Edition of Legal Issues in Information Security (Textbook with Lab Manual) addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to …

Learn more

Business Data Communications- Infrastructure, Networking and Security (7th Edition)

For Business Data Communications, Data Communications, and introductory Networking for Business courses. T he content is also appropriate for the Introduction to Networking course in a MBA program. Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are …

Learn more

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Cutting-edge cybersecurity solutions to defend against the most sophisticated attacksThis professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest …

Learn more

Recommended