The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition

The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition

The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks….

VMware vSphere 5.5 Essentials

VMware vSphere 5.5 Essentials

Efficiently virtualize your IT infrastructure with vSphere About This Book Plan, deploy, and manage your vSphere environment for even the most complex IT infrastructures Familiarize yourself with vSphere infrastructure to become a skilled vSphere administrator Seamlessly configure and deploy vSphere with simple examples in this fast-paced guide Who…

Mastering Netscaler VPX

Mastering NetScaler VPX

Citrix NetScaler is one of the best Application Delivery Controller products in the world. The Application Delivery Controllers are commonly used for load balancing purposes, to optimize traffic, and to perform extra security settings. This book will give you an insight into all the available features that the…

Solving Cyber Risk

Solving Cyber Risk

The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with…

Linux Basics for Hackers

Linux Basics for Hackers

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you’re getting started along the exciting…

Privileged Attack Vectors

Privileged Attack Vectors

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in…

Network Security Through Data Analysis, 2nd Edition

Network Security Through Data Analysis, 2nd Edition

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network…

Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations

Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company operations is a board-level discussion. Across all industries, companies are pouring…

Cisco Next-Generation Security Solutions

Cisco Next-Generation Security Solutions

Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network security experts introduce these products and solutions, and offer expert guidance…