 |
|
|
|
|
 Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook... |  |  Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators... |  |  Securing Hadoop
Implement robust end-to-end security for your Hadoop ecosystem
Overview
-
Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
-
Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
... |
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |