Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

CISSP Exam Cram 2
CISSP Exam Cram 2

Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during...

CISA Certified Information Systems Auditor All-in-One Exam Guide
CISA Certified Information Systems Auditor All-in-One Exam Guide

"All-in-One is All You Need."

CISA Certified Information Systems Auditor All in One Exam Guide

Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this...

Official (ISC)® Guide to the CISSP®-ISSEP® CBK®
Official (ISC)® Guide to the CISSP®-ISSEP® CBK®

Official (ISC)2В® Guide to the CISSP-ISSEPВ® CBKВ® provides an inclusive analysis of all of the topics covered on the newly created ISSEP Exam. The first fully comprehensive guide to the test, it promotes understanding of the four ISSEP domains. It explains ISSE by comparing it to a traditional Systems Engineering model,...

Securing SCADA Systems
Securing SCADA Systems
How to secure systems that weren't built for security

Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security...

PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
The tools and techniques for leveraging PKI technologies to provide secure Internet transactions

Do your customers have the confidence to do business over the Internet? By implementing Public Key Infrastructure (PKI) technologies, you’ll be able to quickly gain their trust through secure transactions. This book provides you with a clear...

Web Security Field Guide
Web Security Field Guide
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient...
Penetration Testing Bootcamp
Penetration Testing Bootcamp

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

...

Get Ready for OpenID
Get Ready for OpenID
This is the first book written on the OpenID system and it provides comprehensive information to beginners and mid level programmers of OpenID. The book includes topics like: o Introduction to identity management o Creating OpenID identities o Using OpenID to login to web sites o Understanding the OpenID protocol o Structure of OpenID messages o...
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy