58836e713eb09.jpeg
PDF
Official (ISC)2® Guide to the ISSAP® CBK

Candidates for the CISSP-ISSAP® professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP® CBK®, but also the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements. Supplying an authoritative review of the key concepts and requirements of the ISSAP® CBK®, the Official (ISC)2® Guide to the ISSAP® CBK® provides the practica...

588356216e933.jpeg
PDF
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll lo...

5883561fe084b.jpeg
PDF
Guide to Network Defense and Countermeasures

GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest t...

58821d1e296d3.jpeg
PDF
Apress - Enterprise Mac Security 2016, 3rd Edition

Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new 10.11 operating system. A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this mi...

5881b2de6cbb1.jpeg
PDF
Software Networks: Virtualization, SDN, 5G, Security

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network equipment. This architecture deals with mechanisms capable of controlling automatically the pl...

5881b2dcdb957.jpeg
PDF
Auditing and Security

This up–to–date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company′s IT platforms–from the mainframe to the individual PC–as well as the networks that connect them to each other and to the global marketplace.

58817f82f153c.jpeg
PDF
Windows Hacking: crack all cool stuff of windows

This book has been published for education purpose only. It does not in deem to legitimize certain steps that may be illegal under applicable law and organization policies in different parts of the world. This book does not contain any legal permission on what may be deemed as legal. Readers are advised to examine the privacy policy, organization policies and the laws of respective countries before taking their own decisions. They ca...

58817f812b40f.jpeg
PDF
Transnational Security

Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing transnational security threats has proven to be a very difficult challenge for governments and institutions around the world. Transnational Security addresses these issues, which are at the forefront of every global security professional’s agenda. This book analyzes the most pressing c...

5880c70d8eb23.jpeg
PDF
Windows 10: Security Yes, but Privacy Please

Windows 10 is getting excellent reviews and it’s a free upgrade the first year. Users love Windows 10 so there’s no reason not to upgrade. Windows 10 has the state of the art in security and Microsoft recommends you use the default settings for the best computing experience. If you are concerned about privacy, Microsoft has designed options for you in Windows 10 so that you can control your privacy settings. In this kindle book the a...

588064067e137.jpeg
PDF
How not to get hacked: Are you safe online?

Do you think you are safe when browsing online? Thousands of people are scammed everyday resulting in either their account getting hacked or a huge monetary loss. Your computer might be home to deadly malware keeping track of everything you do. Believe it or not, you are at risk even when you are not connected to internet. How do you ensure that you are not a potential victim in this web of scams? This book will take you through that...