America the Vulnerable
2,177円 Now available in a new edition entitled GLASS HOUSES: Privacy, Secrecy, and Cyber Insecurity in a Transparent World. A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies...
The Basics of IT Audit
4,225円 The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, ...
How Not To Use Your Smartphone
0円 Identity thieves can do an awful lot of bad once they have your personal information. And increasingly smartphone users are being hacked because they don't understand how to configure or use their devices safely. The bad guys can make your phone call or text premium numbers that they own, pocketi...
IT Auditing: Assuring Information Assets ...
8,800円 "IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected audit standards and guidelines into practical applications using detailed examples ...
Anti-Virus Protection
435円 If You Are A Computer Owner, Do Not Go Without Anti-Virus Software, Anti-Virus Protection, Anti-Virus Software Downloads, Anti-Virus Comparison, Windows Anti-Virus and Anti-Virus Scanning
CISSP Study Guide
6,339円 The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam’s Common Body of Knowledge. The ten...
The Shellcoder's Handbook
4,580円 This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the...
Security Information and Event Management...
9,162円 Implement SIEM to efficiently analyze and report data, respond to inside and outside threats, and follow compliance regulations Security Information and Event Management (SIEM) Implementation shows how to take advantage of SIEM technology for real-time analysis of security alerts generated by ...
Network Security Assessment
2,534円 There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wi...
Nagios 3 Enterprise Network Monitoring
5,493円 The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you. Once up and running, you'll ...
Handbook of Digital Forensics and Investi...
5,493円 Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as a...
Enterprise Security: A Data-Centric Appro...
3,946円 It's a reference guide to enterprise security programs. This book is intended for the IT security staff beginner to expert but would also be a valuable resource for other IT functions such as IT compliance, IT operations, and executives responsible for managing IT and information security. Unders...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!