Digital Forensics Basics

Digital Forensics Basics

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder’s footprints and to gather the necessary digital evidence in a forensically sound manner...
Mastering Ethereum

Mastering Ethereum

If you’re looking to get started with the Ethereum protocol–or are among the many open source developers, integrators, and system administrators already working with this platform–Mastering Ethereum is the definitive book on the topic. Ethereum represents the gateway to a worldwide, decentralized computing paradigm. This platform enables you...
Securities Industry Essentials Exam For Dummies with Online Practice

Securities Industry Essentials Exam For Dummies with Online Practice

Get ready to qualify for the security industry job of your dreams The Securities Industry Essentials (SIE) Exam is a new test administered by FINRA beginning in October 2018. This exam is required as a prerequisite to each series level knowledge exam (such as Series 7). If you’re...
CCNA Security 640-554 Official Cert Guide

CCNA Security 640-554 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. CCNA Security 640-554 Official...
Cybersecurity Incident Response

Cybersecurity Incident Response

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don’t allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires...
Firewalls Don’t Stop Dragons, 3rd Edition

Firewalls Don’t Stop Dragons, 3rd Edition

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself―step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You...
CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide

CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide

The CompTIA Security+ Get Certified Get Ahead SY0-401 Study Guide is an update to the top-selling SY0-201 and SY0-301 study guides, which have helped thousands of readers pass the exam the first time they took it. After a comprehensive review by ProCert Labs, the SY0-401 version has been...
Pro iOS Security and Forensics

Pro iOS Security and Forensics

Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks. Managing...
Cracking Codes with Python

Cracking Codes with Python

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You’ll...
Learning Kali Linux

Learning Kali Linux

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you...
Open Source Intelligence Methods and Tools

Open Source Intelligence Methods and Tools

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals...
Intelligence-Driven Incident Response

Intelligence-Driven Incident Response

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With...
Asset Attack Vectors

Asset Attack Vectors

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include...
Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations

Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company operations is a board-level discussion. Across all industries, companies are pouring...
CompTIA Security+ Practice Tests

CompTIA Security+ Practice Tests

1,000 Challenging practice questions for Exam SY0-501 CompTIA Security+ Practice Tests provides invaluable practice for candidates preparing for Exam SY0-501. Covering 100% of exam objectives, this book provides 1,000 practice questions to help you test your knowledge and maximize your performance well in advance of exam day. Whether...
CompTIA CySA+ Practice Tests

CompTIA CySA+ Practice Tests

Some copies of CompTIA Security+ Study Guide: Exam SY0-501 (9781119416876) were printed without discount exam vouchers in the front of the books. If you did not receive a discount exam voucher with your book, please visit http://media.wiley.com/product_ancillary/5X/11194168/DOWNLOAD/CompTIA_Coupon.pdf to download one. Expert preparation covering 100% of Security+ exam SY0-501...
Building a HIPAA-Compliant Cybersecurity Program

Building a HIPAA-Compliant Cybersecurity Program

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for...
Social Security For Dummies, 3rd Edition

Social Security For Dummies, 3rd Edition

Make sure you get the benefits you’ve earned Navigate your way around the complex system with ease Incorporate Social Security into your financial plan Your Social Security safety net Social Security exists to give us peace of mind, yet most of us spend sleepless nights anxious about our...
Spring Security Essentials

Spring Security Essentials

Spring Security is a framework that focuses on providing both authentication and authorization to Java applications. Like all Spring projects, the real power of Spring Security is how easily it can be extended to meet custom requirements. The popularity of the Spring framework is increasing and the security...
Mastering Bitcoin, 2nd Edition

Mastering Bitcoin, 2nd Edition

Join the technological revolution that’s taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money. Whether you’re building the next killer app, investing in a startup, or...