Home | Amazing | Today | Tags | Publishers | Years | Search 
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference

You're in charge of IT, facilities, or core operations for your organization when a hurricane or a fast-moving wildfire hits. What do you do?

Simple. You follow your business continuity/disaster recovery plan. If you've prepared in advance, your operation or your company can continue to conduct business while...

Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Overview

  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn...
Securing Hadoop
Securing Hadoop

Implement robust end-to-end security for your Hadoop ecosystem

Overview

  • Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
  • Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
  • ...
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Diagnosis and Treatment of Radiation Injuries (Safety Report, Iaea Comprehensive No Inis Ser. Series, 8000)
Diagnosis and Treatment of Radiation Injuries (Safety Report, Iaea Comprehensive No Inis Ser. Series, 8000)
According to the International Basic Safety Standards an accident is “any unintended event, including operating errors, equipment failures or other mishaps, the consequences or potential consequences of which are not negligible from the point of view of protection or safety” [1].

A radiological accident
...
CompTIA CySA+ Study Guide: Exam CS0-001
CompTIA CySA+ Study Guide: Exam CS0-001

Prepare yourself for the newest CompTIA certification

The CompTIA Cybersecurity Analyst+ (CySA+) Study Guide provides 100% coverage of all exam objectives for the new CySA+ certification. The CySA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis,...

Misadventures in Health Care: Inside Stories (Human Error and Safety)
Misadventures in Health Care: Inside Stories (Human Error and Safety)

Misadventures in Health Care: Inside Stories presents an alternative approach to attributing the cause of medical error solely to the health care provider. That alternative, the systems approach, pursues why an incident occurs in terms of factors in the context of care that affect the care provider to induce an error. The basis for...

The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy