Designing Network Security, 2nd Edition
Designing Network Security is a book that will teach you how to secure your corporate network infrastructure. Starting with security fundamentals, you'll learn how to define a …
CCNA Security 640-553 Cert Flash Cards Online
The CCNA Security 640-553 Cert Flash Cards Online is a custom flash card application loaded with 250 total questions that offer a good way to review all the objectives on the …
SSCP Video Mentor
Yet another title in the Pearson's series for interactive learning that targets users set on obtaining security certifications, SSCP Video Mentor is a combination of DVD and …
Network Security Auditing
This book is part of the Cisco Press Networking Technology Series, and is aimed at teaching security and network professionals the assessment, prevention, detection, reaction …
Eleventh Hour Security+: Exam SY0-201 Study Guide
For the people who have studied hard and are preparing for the Security+ certification exam, this book provide a handy reviewing list of all the critical information and the …
Security+ SY0-201 Video Mentor
When I glance at my bookshelf, I see many certification titles racking up an imposing number of pages, and I keep wondering why there's so little interactive material …
Securing the Borderless Network: Security for the Web 2.0 World
The future of the Web is mobile, virtualized, and collaborative. Among all the positive aspects and advantages that these changes will bring, there will also be some problems …
Keynesis Lockngo Professional 4.0
Keynesis Lockngo is a portable application that encrypts and hides your portable drive on Windows AND Mac without any installation. The only thing required to activate the …
Inside Cyber Warfare: Mapping the Cyber Underworld
The latest attacks and intrusions on networks of US companies and the speculation about their origins have surely made cyber war a distinctly possible reality in the minds of …
Hacking: The Next Generation
We have all been witnessing new kinds of attacks emerging thanks to new technologies and ways of using our computers and networks. The use of social media, an increasingly …
Insidious: How trusted employees steal millions and why it’s so hard for banks to stop them
Why do employees steal? As you will see in the book, it is a combination of motivation, opportunity and attitude. But it is all underlined by the issue of trust, which is …
Featured news
Resources
Don't miss
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years
- More employees get AI tools, fewer rely on them at work
- Energy sector orgs targeted with AiTM phishing campaign
- Exposed training apps are showing up in active cloud attacks