 |
|
 Compensating Your Employees Fairly: A Guide to Internal Pay Equity
Compensation fairness is a universal preoccupation in today’s workplace, from whispers around the water cooler to kabuki in the C-suite. Gender discrimination takes center stage in discussions of internal pay equity, but many other protected characteristics may be invoked as grounds for alleging discrimination: age, race, disability,... |  |  SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award
"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog
SQL injection represents... |  |  Next Generation Red Teaming
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s... |
|
 Network Attacks and Exploitation: A Framework
Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate... |  |  Nmap 6: Network exploration and security auditing Cookbook
Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth.
Overview
-
Master the power of Nmap 6
-
Learn how the...
|  |  Penetration Testing with Perl
Harness the power of Perl to perform professional penetration testing
About This Book
-
Write your own custom information security tools using Perl and object-oriented Perl modules
-
Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
- ...
|
|
 Mastering Nmap Scripting Engine
Master the Nmap Scripting Engine and the art of developing NSE scripts
About This Book
-
Extend the capabilities of Nmap to perform custom tasks with the Nmap Scripting Engine
-
Learn the fundamentals of Lua programming
-
Develop powerful scripts for the Nmap Scripting...
|  |  Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers... |  |  Android Security Cookbook
Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Overview
-
Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
... |
|
 Cyber Security and IT Infrastructure Protection
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and... |  |  Kali Linux Cookbook
When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Overview
-
Recipes designed to educate you extensively on the penetration testing principles and Kali...
|  |  Crisis Management and Emergency Planning: Preparing for Today's Challenges
Emergency managers and officials have seen a tremendous increase in the planning responsibilities placed on their shoulders over the last decade. Crisis Management and Emergency Planning: Preparing for Today's Challenges supplies time-tested insights to help communities and organizations become better prepared to cope... |
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |