Book
Wall, T. E., Rodrick, J. (2021)
The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could …
Available Formats:
Softcover
eBook
Book
Garbis, J., Chapman, J. W. (2021)
Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance …
Available Formats:
Softcover
eBook
Book
Daswani, N., Elbayadi, M. (2021)
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, …
Available Formats:
Softcover
eBook
Book
Sabharwal, N., Pandey, P. (2021)
Discover the methodologies and best practices for getting started with Google cloud automation services including Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins …
Available Formats:
Softcover
eBook
Book
Raghavendra, S. (2021)
Implement different testing techniques using Selenium WebDriver with the Python programming language. This quick reference provides simple functional test cases with a …
Available Formats:
Softcover
eBook
Book
Norberg, S. (2020)
Incorporate security best practices into ASP.NET Core. This book covers security-related features available within the framework, explains where these feature may fall short, and …
Available Formats:
eBook
Softcover
Book
Yao, J., Zimmer, V. (2020)
Use this book to build secure firmware. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. …
Available Formats:
Softcover
eBook
Book
Calles, M. A. (2020)
Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these …
Available Formats:
Softcover
eBook
Book
Parker, C. (2020)
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by …
Available Formats:
Softcover
eBook
Book
Ciesla, R. (2020)
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the …
Available Formats:
Softcover
eBook
Book
Blum, D. (2020)
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to …
Available Formats:
Softcover
eBook
Book
Haber, M. J. (2020)
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase …
Available Formats:
Softcover
eBook
Book
Zeeshan, A. A. (2020)
Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You will not only learn the various stages in the DevOps …
Available Formats:
Softcover
eBook
Book
Seaman, J. (2020)
Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements. The guidance provided in …
Available Formats:
Softcover
eBook
Book
Oakley, J. G. (2020)
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the …
Available Formats:
Softcover
eBook
Book
Thompson, E. C. (2020)
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and …
Available Formats:
Softcover
eBook
Book
Dennedy, M. F., Fox, J., Finneran, T., Bobbitt, L., Guel, M. (2020)
Engineer privacy into software, systems, and applications. This book is a resource for developers, engineers, architects, and coders. It provides tools, methodologies, templates, …
Available Formats:
Softcover
eBook
Book
Haber, M. J., Rolls, D. (2020)
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, …
Available Formats:
Softcover
eBook
Book
Siriwardena, P. (2020)
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common …
Available Formats:
Softcover
eBook
Book
Chopra, A., Chaudhary, M. (2020)
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers …
Available Formats:
Softcover
eBook