You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The business to business trade publication for information and physical Security professionals.
If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely automate recurring tasks. Updated and expanded to cover the latest operating systems, technologies, and Perl modules, this edition of the "Otter Book" will help you: Manage user accounts Monitor filesystems and processes Work with configuration files in important formats such as XML and YAML Administer databases, including MySQL, MS-SQL, and Oracle with DBI ...
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network, tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, "Security Threats Are Real (STAR), focuses on these real-world lessons.The F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are "Easter eggs—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, S...
Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference.
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes. Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. What You Will Learn: Build a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constantly changing threats Prepare fo...
A guide to managing the process of securing an enterprise network, covering all aspects from perimeter security to application security.
Did you ever find yourself reading a book, an article or some piece of trashy hack journalism and think… That’s me they’re describing! The new football superstar, captured in grainy black and white on the happiest day of your life…before you descended into the realm of bitter fantasy, sucked dry by million-pound contracts and damning interviews. Even on your death bed, they never let you forget you were just a council-estate kid with one particular talent, who got too big for your boots. A politician of overwhelming courage, a life dedicated to public service and a conscience bordering on saintly…one taken-out-of-context photograph, and it’s all over. Questions asked, rumours paraded as facts in that oversized vehicle of gossip and allegation… You know you should stop reading the papers, refuse to fall for all that airbrushed deceit, unplug from the multiplex of distorted truth, disconnect from the media altogether… But then how would you know I exist? For I am Death, and I bring destruction.
A concise but comprehensive guide to providing the best possible security for a server, with examples and background to help you understand the issues involved. For each of the tasks or services covered, this book lays out the reasons for security, the risks and needs involved, the background to understand the solutions, and step by step guidelines for doing the job.
This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We have taken a deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioral guidelines, where we provide examples of how we got here, what we can do about it, why we got here, and how we can avoid these traps in the future. This is a unique viewpoint that has never been explored – the five battlefields include Economics, Technology, Information, Education, and Leadership – and how each has contributed to our current disadvantage on the global stage. We go on to discuss how Ze...