Web Hosting Security

The Security Development Lifecycle

The software industry has been struggling with how to create and release software that is more security-enhanced and reliable— the Security Development Lifecycle (SDL) provides a methodology that works. Adapted from Microsoft’s standard development process, SDL is a critical way to help reduce the number of security defects in code at every stage of the development process, from …

Learn more

Guide to Firewalls and VPNs

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the …

Learn more

Max Power 2020: Check Point Firewall Performance Optimization: Foreword by Dameon D. Welch-Abernathy a.k.a. PhoneBoy

http://www.maxpowerfirewalls.comTypical causes of performance-related issues on Check Point (R) firewalls are explored in this book through a process of discovery, analysis, and remediation. This Third Edition has been fully updated for version R80.30 and Gaia kernel 3.10.You will learn about: Common OSI Layer 1-3 Performance IssuesGaia OS OptimizationClusterXL Health AssessmentCoreXL & SecureXL TuningAccess Control Policy OptimizationIPSec VPN Performance …

Learn more

Network Forensics: Tracking Hackers through Cyberspace

“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.” – Dr. Craig S. Wright (GSE), Asia …

Learn more

Cybersecurity: The Beginner’s Guide: A comprehensive guide to getting started in cybersecurity

It’s not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO’s like Satya Nadella, McAfee’s CEO Chris Young, Cisco’s CIO Colin Seward along with organizations like ISSA, research firms like …

Learn more

CompTIA Network+ Certification Premium Bundle: All-in-One Exam Guide, Seventh Edition with Online Access Code for Performance-Based Simulations, Video Training, and Practice Exams (Exam N10-007)

Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This Premium Bundle includes Mike Meyers’ bestselling exam guide and access to online video training, practice exams, simulations, and much more!Take the CompTIA Network+ N10-007 exam with confidence using this bestselling exam …

Learn more

Internet Security: A Hands-on Approach

This book is a part of another book titled “Computer & Internet Security: A Hands-on Approach, 2nd Edition” (687 pages). It is created to lower the cost on students, as many courses only need this part. It covers 16 of the 26 chapters.Teaching Internet security principles via hands-on activitiesUnique among computer security texts, the Second Edition of the …

Learn more

Real-World Electronic Voting: Design, Analysis and Deployment (Series in Security, Privacy and Trust)

Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting. This book explores recent innovations in both poll-site and remote voting systems and their application throughout the world. The …

Learn more

Damn I Can’t Remember: A Premium Journal And Logbook To Protect Usernames and Passwords Modern Password Keeper Vault Notebook and Online Organizer

Want to Remember the Passwords!This is the perfect book to keep all your password information together and secure. This book has approximately 53 pages and is printed on high quality stock. In addition, the pages are alphabetized so you can quickly and conveinently find what you need. Whether its social media, bills or online account info, you can …

Learn more

Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation

Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world’s leading bug ­hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities.You’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol …

Learn more

Deals