Security Books
-
Thor's Microsoft Security Bible: A Collection of Practical Security Techniques
Published 9 years ago
by Timothy Thor Mullen, Syngress
Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.
-
CISA Certified Information Systems Auditor All-in-One Exam Guide, 2nd Edition
Published 9 years ago
by Peter Gregory, McGraw-Hill Osborne Media
"All-in-One is All You Need"The new edition of this trusted resource offers complete, up-to-date coverage of all the material included on the latest release of the Certified Information Systems Auditor exam. Written by an IT security and audit expert, CISA Certified Information Systems Auditor All-in-One Exam Guide, Second Edition covers all five exam domains developed by the Information Systems Audit and Control Association (ISACA)
-
Metasploit: A Penetration Tester's Guide
Published 9 years ago
by David Kennedy, Jim OGorman, Devon Kearns, Mati Aharoni, No Starch Press
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors.
-
RHCE Red Hat Certified Engineer Linux Study Guide (Exam N0-201), 6th Edition (Certification Press)
Published 9 years ago
by Michael Jang, McGraw-Hill Osborne Media
Fully revised to cover the Red Hat Certified Engineer exam revision based on Red Hat Enterprise Linux 6Updated for the release of Red Hat Enterprise Linux 6 and the related Red Hat Certified Engineer certification exam revision, RHCE Red Hat Certified Engineer Linux Study Guide, Sixth Edition provides complete coverage of all official exam objectives and the revised format for the RHCE exam.
-
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (IEEE
Published 9 years ago
by Stuart Jacobs, Wiley-IEEE Press
Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning.
-
CCNP Security Secure 642-637 Official Cert Guide
Published 9 years ago
by Sean Wilkins, Trey Smith, Cisco Press
Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.CCNP Security SECURE 642-637 Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques.
-
CompTIA Security+ Deluxe Study Guide: Exam SY0-301
Published 9 years ago
by Emmett Dulaney, Sybex
Get a host of extras with this Deluxe version of our top-selling Security+ study guide!Prepare for CompTIA's new Security+ exam SY0-301 with this Deluxe Edition of our popular CompTIA Security+ Study Guide, 5th Edition. In addition to the 100% coverage of all exam essentials and study tools you'll find in the regular study guide, the Deluxe Edition gives you over additional hands-on lab exercises and study tools, three additional practice exams, author videos, and the exclusive Security Admi
-
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
Published 9 years ago
by Andrew Hoog, Katie Strzempka, Syngress
As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.
-
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Published 9 years ago
by Andrew Hoog, Syngress
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis.
-
CompTIA Security+ Study Guide: Exam SY0-301
Published 9 years ago
by Emmett Dulaney, Sybex
The preparation you need for the new CompTIA Security+ exam SY0-301This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside the new, CompTIA Authorized edition, you'll find complete coverage of all Security+ exam objectives, loads of real-world examples, and a CD packed with cutting-edge exam prep tools.