Catalog Search Results
Author
Language
English
Description
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that."Instant Citrix Security How-to" will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be...
Author
Language
English
Formats
Description
The host of CNBC's Mad Money presents the ultimate guide to lifetime investing for listeners of any age. Whether you're a recent college grad trying to figure out how to start investing, a young parent struggling to decide where and how to put away money, or someone well into middle age and worried about whether you've saved enough money for retirement, Jim Cramer's Stay Mad for Life has the answers. Bestselling author Jim Cramer covers all the essentials:...
Author
Language
English
Description
Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle!
Are you concerned about the growing threats in the digital world? Do you want to safeguard your digital assets and protect your online presence? Look no further! CYBERWATCH 101 is your comprehensive guide to mastering the art of cyber defense and infrastructure security.
���� BOOK 1 - CYBERWATCH: A BEGINNER'S GUIDE TO DIGITAL SECURITY: Get started on your cybersecurity journey...
4) Burp Suite
Author
Language
English
Description
Introducing the "Burp Suite: Novice to Ninja" Book Bundle - Your Path to Becoming a Cybersecurity Expert!
Are you ready to unlock the secrets of ethical hacking and penetration testing? Do you want to master the art of securing web applications, networks, mobile devices, and cloud environments? Look no further, because our comprehensive book bundle has you covered!
What's Inside:
���� Book 1 - Burp Suite Fundamentals: A Novice's Guide to...
Author
Language
English
Description
Unlock the Power of Blue Team Defense!
���� Introducing "Blue Team Operations: Defense" - Your Comprehensive Cybersecurity Solution
Are you ready to take on the challenges of the ever-evolving digital threat landscape? Equip yourself with the knowledge and skills needed to excel in the realm of cybersecurity defense with our exclusive book bundle, "Blue Team Operations: Defense." This comprehensive collection of four essential volumes covers...
6) OSCP Offensive Security Certified Professional Practice Tests With Answers To Pass the OSCP Ethical
Author
Language
English
Description
Embark on a transformative journey into the world of cybersecurity mastery with mastering offensive security. This comprehensive guide is meticulously crafted to propel aspiring professionals through the intricate realm of offensive security, serving as an indispensable roadmap to conquering the challenges of the coveted Offensive Security Certified Professional (OSCP) certification. Delve into a multifaceted exploration of offensive security practices,...
Author
Language
English
Description
Recent regulations about cybersecurity put pressure on every Board Director and C-Suite executive to understand the risks and impact of a breach. When your company's CIO or CISO speaks, how much do you understand? If you don't speak the language of cybersecurity, you are not only at a disadvantage, but you could also be legally liable.
This book was written to be a translator, handbook, and dictionary for anyone who isn't an expert in the world...
Author
Language
English
Description
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments."Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and...
Author
Language
English
Description
Empower Your Digital Shield with Splunk Expertise!
Book Description
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.
This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).
It...
Author
Language
English
Description
Unleash the Power of NSX Datacenter for Seamless Virtualization and Unparalleled Security
Book Description
"Embark on a transformative journey into the world of network virtualization with 'Ultimate VMware NSX for Professionals.' This comprehensive guide crafted by NSX experts, starts with an exploration of Software Defined Networking, NSX architecture, and essential components in a systematic approach. It then dives into the intricacies of...
Author
Language
English
Description
Welcome to "Cybersecurity in the Digital Age: Safeguarding Data and Privacy." In today's interconnected world, where digital technologies are deeply embedded in our daily lives, the need for robust cybersecurity measures has never been more critical. This book serves as a comprehensive guide to understanding the threats posed by cybercriminals and how individuals and organizations can protect themselves against these threats. As technology continues...
Author
Language
English
Description
In today's digital landscape, web apps evolve rapidly, demanding enhanced security. This “Ultimate Web Authentication Handbook” offers a comprehensive journey into this realm. Beginning with web authentication basics, it builds a strong foundation. You'll explore cryptography fundamentals, essential for secure authentication. The book delves into the connection between authentication and network security, mastering federated authentication via...
Author
Language
English
Description
Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to.
KEY FEATURES ? Dive into real-world practical hands-on experience with authentication protocols through sample code.? Gain a programmer's perspective on cryptography, certificates, and their role in securing authentication processes.? Explore a wide array of authentication protocols, including TLS, SAML, OAuth, OIDC, WebAuthn, and Digital Identity.?...
Author
Language
English
Description
"Defending the Digital Perimeter: Network Security Audit Readiness Strategies" is a must-read eBook for IT professionals, cybersecurity experts, and business leaders who are dedicated to safeguarding their organization's digital assets. In today's interconnected world, where data breaches and cyberattacks are on the rise, maintaining a robust and secure network perimeter is of paramount importance.This comprehensive eBook delves into the intricacies...
Author
Language
English
Description
"Safeguarding the Digital Fortress: A Guide to Cyber Security" is an essential resource that equips readers with the knowledge and tools needed to navigate the complex world of cyber security. In this comprehensive guide, a clear and concise roadmap for individuals and organizations to protect their digital assets from the ever-evolving threats of the digital age is provided. Chapters included:Chapter 1: Fundamentals of Information SecurityChapter...
Author
Language
English
Description
Introducing the "Defense in Depth" Book Bundle
Are you concerned about the ever-growing threats to your digital world? Do you want to fortify your network security and bolster your cyber resilience? Look no further - the "Defense in Depth" book bundle is your ultimate resource to safeguard your digital assets.
This comprehensive bundle consists of four carefully curated volumes, each designed to cater to different levels of expertise, from beginners...
Author
Language
English
Description
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.
Book Description
Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive...
Author
Language
English
Description
Elevate your Java security skills for the modern cloud era KEY FEATURES ● Understanding Zero-Trust security model for Java.● Practical cloud security strategies for developers.● Hands-on guidance for secure Java application development. DESCRIPTION This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice,...
Author
Series
Language
English
Description
Step into the enigmatic world of cyberspace with "Incredible Mysteries: Internet Mysteries," a captivating exploration of the internet's most baffling enigmas. This book takes readers on a journey through the digital realm's darkest corners, unveiling mysteries that have perplexed the online community and beyond.
Embark on a quest to unravel the secrets of Cicada 3301, a complex series of puzzles attracting cryptologists from around the globe...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request