Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Tame Your Anxiety: Rewiring Your Brain for Happiness
Tame Your Anxiety: Rewiring Your Brain for Happiness

Anxiety is natural. Calm is learned.

If you didn’t learn yesterday, you can learn today.

It’s not easy, of course. Once your natural alarm system is triggered, it’s hard to find the off switch. Indeed, you don’t have an off switch until you build one....

The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
This book focuses on the application of ionic liquids in flow assurance in the oil and gas industry. It discusses their physiochemical properties, and considers the role of ionic liquids as gas hydrate inhibitors in offshore pipelines.

Gas hydrate occurrence can pose a major threat to pipeline integrity. Therefore, different...

Protective Security: Creating Military-Grade Defenses for Your Digital Business
Protective Security: Creating Military-Grade Defenses for Your Digital Business

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised:...

CompTIA CySA+ Study Guide: Exam CS0-001
CompTIA CySA+ Study Guide: Exam CS0-001

Prepare yourself for the newest CompTIA certification

The CompTIA Cybersecurity Analyst+ (CySA+) Study Guide provides 100% coverage of all exam objectives for the new CySA+ certification. The CySA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis,...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy