ساخت آزمایشگاههای pentesting مجازی برای تست نفوذپذیری ...
Building Virtual Pentesting Labs for Advanced Penetrati ......
امنیت بدون ابهام؛ راهنمای فعالیتهای PKI
Security without Obscurity: A Guide to PKI Operations
VMware vCloud Security
Computer Forensics with FTK
iOS Application Security
Learning Network Forensics
Network Forensics
امنیت وب؛ دیدگاه کلاه سفید
Web Security: A WhiteHat Perspe ...
اواخر سال 2013، حدود چهل میلیون کارت بانکی مشتری و کارت بانکی اعتباری، در نقض داده در مقصد به بیرون درز کرد. این رویداد فاجعهبار، یکی از بزرگترین نقض ...
ساخت آزمایشگاههای pentesting مجا ...
Building Virtual Pentesting Lab ...
از ویژگیهای کتاب “ساخت آزمایشگاههای pentesting مجازی برای تست نفوذپذیری پیشرفته” میتوان به موارد زیر اشاره کرد: ساخت و توسعه روشها و مهارتهای ن ...
امنیت مردم محور
People-Centric Security: Transf ...
“امنیت مردم محور” با اتخاذ برنامهای که بر پایه امنیت انسانی قرار دارد موجب بهحداقلرساندن خطر، محافظت از دارایی شرکتها و اجتناب از حوادث فاجعهبار ...
امنیت بدون ابهام؛ راهنمای فعالیت ...
Security without Obscurity: A G ...
اکثر کتابهای موجود در زمینه زیرساخت کلید عمومی (PKI)، به نظر میرسد که بر روی رمزنگاری نامتقارن، استانداردهای X.509، سلسله مراتب صدور گواهی (CA) یا س ...
Building a HIPAA-Compliant Cybe ...
Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and ...
Social Security For Dummies, 3r ...
Make sure you get the benefits you’ve earned Navigate your way around the complex system with ease Incorporate Social Security into your financial pla ...
Mastering Bitcoin, 2nd Edition
Join the technological revolution that’s taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of ...
Digital Privacy and Security Us ...
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure ...
VMware vCloud Security
VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMwar ...
Computer Forensics with FTK
With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and approp ...
Testing and Securing Android St ...
Today, mobile applications are increasingly being used to access the Web. Mobile developers play a key role in how consumers access the Web with milli ...
SSCP Systems Security Certified ...
This fully-updated, integrated self-study system offers complete coverage of the revised 2015 Systems Security Certified Practitioner (SSCP) exam doma ...
CISSP All-in-One Exam Guide, 7t ...
A fully revised edition of the #1 CISSP training resource Thoroughly updated for the latest release of the Certified Information Systems Security Prof ...
Cybersecurity for Hospitals and ...
This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. The vulnerab ...
Managing Risk and Information S ...
This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience abou ...
Cryptography and Network Securi ...
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-stu ...
iOS Application Security
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, ...
Building a Comprehensive IT Sec ...
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further ...
SSCP (ISC)2 Systems Security Ce ...
Fully updated Study Guide for the SSCP This guide prepares you for the SSCP, Systems Security Certified Practitioner certification examination by focu ...
Inside Cyber Warfare, 2nd Editi ...
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly rea ...
Learning Network Forensics
We live in a highly networked world. Every digital device―phone, tablet, or computer is connected to each other, in one way or another. In this new ag ...
Network Forensics
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional ...
Security and Privacy in Interne ...
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hack ...
Information Security, 2nd Editi ...
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consume ...
Intermediate Security Testing w ...
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defend ...