 |
|
|
|
 |  |  Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the... |  |  |
|
|
|
 HIPAA Security Implementation Version 1.0 (SANS Step-by-Step Series)Written for the IT staff in hospitals, this guide provides step-by-step direction on how to apply the required and addressable HIPAA Security implementation specifications into a comprehensive solution.
A “consensus project” of numerous computer security experts has culminated in a Guide for... |  |  Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook... |  |  Infosec Management Fundamentals
Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the... |
|
|
Result Page: 4 3 2 1 |