51F6+1QGRRL._SX331_BO1,204,203,200_
PDF
Full Disclosure: The Perils and Promise of Transparency

Sunshine may indeed be the best disinfectant, in Louis Brandeis' words, but only if we know when, where, and how to shine the light. That is exactly the task that Full Disclosure sets itself. This is an important book at an important time, for everyone from mayors to senators to secretary generals."   "Governmental transparency efforts inform the public about additives in the food we eat, dangerous criminals in our neighborhoods...

004ea606_medium
PDF
Series 7 Exam Practice Questions

This 129 page workbook contains 2 full-length practice tests for the Series 7 (250 questions each test), with each being followed by an explanations and answers section that addresses each question. The quality of this prep material may only be weighed once I take the test, but given my background as a teacher, I can see great value in the "test then explain" method. There is a great deal of psychology to support the value of pre-tes...

5169NjWSvmL._SX330_BO1,204,203,200_
PDF
Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities

"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"-- Maximiliano E. Korstanje is editor in chief of International Journal of Safety and Security in Tourism...

516eJbbWKxL._SY291_BO1,204,203,200_QL40_
PDF
Improving Information Security Practices Through Computational Intelligence

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence prese...

5c88ab4d9c2fd.jpg
PDF
Freedom From Fear, Freedom From Want

Adopting an interdisciplinary perspective, Freedom from Fear, Freedom from Want is a brief introduction to human security, conflict, and development. The book analyzes such key human security issues as climate change, crimes against humanity, humanitarian intervention, international law, poverty, terrorism, and transnational crime, among others. The authors encourage readers to critically assess emerging threats while evaluating pote...

5c78dfc1b8b6d.jpg
PDF
Privileged Attack Vectors

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges. In decades past, an en...

5c78dfc001d44.jpg
PDF
Corporate Security Crossroads

Even though terrorism poses an increasing threat to multinational companies, corporate leaders can thwart attacks by learning to navigate the complexities of foreign governments, social unrest, and cultural dissonance. • Covers different operational environments • Offers strategies for minimizing risk, such as shortening supply chains and creating redundancies to mitigate cyberattacks or physical threats • Discusses the use of corpor...

5c738a79ae346.jpg
PDF
Privacy: A Very Short Introduction

It is widely recognized that our privacy is under threat. Electronic surveillance, biometrics, CCTV, ID cards, RFID codes, online security, encryption, the interception of email, the monitoring of employees--all raise fundamental questions about privacy. Legal expert Raymond Wacks here provides a compact introduction to this complex and controversial concept. He explores the tension between free speech and privacy which is often test...