0 - 500
0
500

Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland

Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland

During the last two decades, the infrastructure of the U.S. economy has undergone a fundamental set of changes. It has steadily increased its reliance on its service sector and high-technology economy. The U.S. has come to depend on computers, electronic data storage and transfers, and highly integrated communications networks. The result is the rapid development…

Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security

Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security

Handling computers has gotten easier than before. However, do you know the world of the Internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how can you safeguard yourself from the different threats? Let’s find out.We will also take a look at…

Managing Information Security Risks: The OCTAVE (SM) Approach

Managing Information Security Risks: The OCTAVE (SM) Approach

Provides information on the principles and implementations of OCTAVE. This book also provides a systematic way to evaluate and manage information security risks. It illustrates the implementation of self-directed evaluations and shows how to tailor evaluation methods to different types of organizations.

Learning Veeam® Backup and Replication for VMware vSphere

Learning Veeam® Backup and Replication for VMware vSphere

Learn how to protect your data in your VMware vSphere infrastructure with Veeam® Backup & ReplicationAbout This Book Explore Veeam Backup and Replication v7 infrastructure and its components Create backup, replication, and restore strategies that protect data, your company’s most valuable asset Includes advanced features like off-site replication and tape retention Who This Book Is…

Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy

Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy

Reimagine your organization’s security stance, desktop standards, and server administration with centralized management via Group PolicyKey FeaturesWork through advanced filtering techniques for Group Policy ObjectsConfigure Windows Group Policy with GPMC and PowerShellExplore everyday functions and advanced administration tasks in Group PolicyBook DescriptionWindows Group Policy is a powerful yet underutilized centralized management tool in corporate networks,…

Introduction to Security and Network Forensics

Introduction to Security and Network Forensics

Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea. Providing such a foundation, Introduction to Security and Network Forensics covers the basic principles of intrusion detection…

NIST Special Publication 800-123 Guide to General Server Security

NIST Special Publication 800-123 Guide to General Server Security

This is a Hard copy of the NIST Special Publication 800-123 Guide to General Server Security The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security of servers that provide services over network communications as a main function. Hosts that incidentally provide…