Home | Amazing | Today | Tags | Publishers | Years | Search 
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
A one-stop source of security and privacy information for IT professionals, covering everything you’ll need to know to pass the Systems Security Certified Practitioner examination

This prep guide and general reference will help you breeze through the SSCP security certification test by greatly enhancing your understanding of how to...

CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Inside Network Security Assessment: Guarding Your IT Infrastructure
Inside Network Security Assessment: Guarding Your IT Infrastructure
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the...
Dictionary of Information Security
Dictionary of Information Security

IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification...

CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

Applied Public Key Infrastructure (Frontiers in Artificial Intelligence and Applications)
Applied Public Key Infrastructure (Frontiers in Artificial Intelligence and Applications)
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ N10-006 Cert Guide

This approved study guide helps you master topics on the CompTIA Network+ N10-006 exam, including the following:

  •  Computer network fundamentals
  • The OSI model and TCP/IP stack
  • ...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAPcm CBK
Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAPcm CBK
Certification and accreditation has become a major topic of discussion in
the information security arena over the past two to three years, at least
in U.S. government circles. Many government organizations are currently
engaged in employing certification and accreditation processes in response
to the requirements of the Federal
...
Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy