Designing Network Security, 2nd Edition
Designing Network Security is a book that will teach you how to secure your corporate network infrastructure. Starting with security fundamentals, you'll learn how to define a …
CCNA Security 640-553 Cert Flash Cards Online
The CCNA Security 640-553 Cert Flash Cards Online is a custom flash card application loaded with 250 total questions that offer a good way to review all the objectives on the …
SSCP Video Mentor
Yet another title in the Pearson's series for interactive learning that targets users set on obtaining security certifications, SSCP Video Mentor is a combination of DVD and …
Network Security Auditing
This book is part of the Cisco Press Networking Technology Series, and is aimed at teaching security and network professionals the assessment, prevention, detection, reaction …
Eleventh Hour Security+: Exam SY0-201 Study Guide
For the people who have studied hard and are preparing for the Security+ certification exam, this book provide a handy reviewing list of all the critical information and the …
Security+ SY0-201 Video Mentor
When I glance at my bookshelf, I see many certification titles racking up an imposing number of pages, and I keep wondering why there's so little interactive material …
Securing the Borderless Network: Security for the Web 2.0 World
The future of the Web is mobile, virtualized, and collaborative. Among all the positive aspects and advantages that these changes will bring, there will also be some problems …
Keynesis Lockngo Professional 4.0
Keynesis Lockngo is a portable application that encrypts and hides your portable drive on Windows AND Mac without any installation. The only thing required to activate the …
Inside Cyber Warfare: Mapping the Cyber Underworld
The latest attacks and intrusions on networks of US companies and the speculation about their origins have surely made cyber war a distinctly possible reality in the minds of …
Hacking: The Next Generation
We have all been witnessing new kinds of attacks emerging thanks to new technologies and ways of using our computers and networks. The use of social media, an increasingly …
Insidious: How trusted employees steal millions and why it’s so hard for banks to stop them
Why do employees steal? As you will see in the book, it is a combination of motivation, opportunity and attitude. But it is all underlined by the issue of trust, which is …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)