Home | Amazing | Today | Tags | Publishers | Years | Search 
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Python Penetration Testing Essentials
Python Penetration Testing Essentials

Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • ...
RESTful Rails Development: Building Open Applications and Services
RESTful Rails Development: Building Open Applications and Services

The Web is slowly but surely changing from a model in which a human reader browses content on web pages to a model in which services and clients (not necessarily humans) exchange information. And because of this, author Silvia Puglisi explains, it makes more sense to build platforms instead of just products or applications. Platforms...

eBay For Dummies
eBay For Dummies

The leading guide for eBay buyers and sellers, updated to give you all the essentials for buying and selling on eBay

More than 112 million people regularly use eBay. To find the best deals and make the best profits, you need the guidance in this book from eBay expert Marsha Collier! With more than half a million copies...
Windows 10 Guidebook: A tour into the future of computing
Windows 10 Guidebook: A tour into the future of computing

Windows 10 is really easy to use with this guide – for Windows insiders upgrading from Windows 7 or 8.1 to Windows 10, as well as for first-time users that want to learn about the operating system basics. 
Chapters 1 and 2 present the new and changed features in Windows 10. Furthermore, we describe what you have to watch
...

Under Attack
Under Attack

The wording "Under Attack" implies a dangerous situation - one that signifies we are currently under assault. In this book, the Celebrity Experts® showcased are in the vanguard of protecting data and sensitive information under threat - the threat of digital information being made available to unscrupulous sources, and at times...

Information: A Very Short Introduction
Information: A Very Short Introduction

We live in a society that is awash with information, but few of us really understand what information is. In this Very Short Introduction, one of the world's leading authorities on the philosophy of information and on information ethics, Luciano Floridi, offers an illuminating exploration of information as it relates to both...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

Windows 8.1 All-in-One For Dummies
Windows 8.1 All-in-One For Dummies

Ten minibooks in one get you thoroughly caught up on Windows 8.1!

With new improvements and changes, Windows 8.1 offers a refreshed user interface, better integration between the new and traditional Windows interfaces, and more. This updated top-selling guide is what you need to get up to speed on everything Windows 8.1....

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy