Catalog Search Results
Author
Language
English
Description
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that."Instant Citrix Security How-to" will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be...
Author
Language
English
Description
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments."Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and...
4) OSCP Offensive Security Certified Professional Practice Tests With Answers To Pass the OSCP Ethical
Author
Language
English
Description
Embark on a transformative journey into the world of cybersecurity mastery with mastering offensive security. This comprehensive guide is meticulously crafted to propel aspiring professionals through the intricate realm of offensive security, serving as an indispensable roadmap to conquering the challenges of the coveted Offensive Security Certified Professional (OSCP) certification. Delve into a multifaceted exploration of offensive security practices,...
Author
Language
English
Description
Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle!
Are you concerned about the growing threats in the digital world? Do you want to safeguard your digital assets and protect your online presence? Look no further! CYBERWATCH 101 is your comprehensive guide to mastering the art of cyber defense and infrastructure security.
���� BOOK 1 - CYBERWATCH: A BEGINNER'S GUIDE TO DIGITAL SECURITY: Get started on your cybersecurity journey...
Author
Language
English
Description
Empower Your Digital Shield with Splunk Expertise!
Book Description
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.
This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).
It...
Author
Language
English
Description
Unleash the Power of NSX Datacenter for Seamless Virtualization and Unparalleled Security
Book Description
"Embark on a transformative journey into the world of network virtualization with 'Ultimate VMware NSX for Professionals.' This comprehensive guide crafted by NSX experts, starts with an exploration of Software Defined Networking, NSX architecture, and essential components in a systematic approach. It then dives into the intricacies of...
8) Cybersecurity and Ethical Hacking: Exploring the Dark Art of Ethical Hacking and Penetration Testing
Author
Language
English
Description
"Cybersecurity and Ethical Hacking: Exploring the Dark Art of Ethical Hacking and Penetration Testing" is a comprehensive guide that provides an in-depth exploration of the latest techniques and tools used by cybersecurity professionals to protect networks and systems from cyber threats. With the rise of cybercrime, protecting digital assets has become a critical concern for individuals and organizations alike. This book provides a practical and accessible...
Author
Language
English
Description
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.
Book Description
Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive...
Author
Language
English
Description
Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis" is a comprehensive guide to understanding the vulnerabilities and defenses of network protocols. In today's interconnected world, networks are essential for communication and collaboration, making them a prime target for hackers seeking to exploit vulnerabilities in the protocols that underpin them. This book provides a detailed overview of network protocols, including...
Author
Language
English
Description
Welcome to "Cybersecurity in the Digital Age: Safeguarding Data and Privacy." In today's interconnected world, where digital technologies are deeply embedded in our daily lives, the need for robust cybersecurity measures has never been more critical. This book serves as a comprehensive guide to understanding the threats posed by cybercriminals and how individuals and organizations can protect themselves against these threats. As technology continues...
Author
Language
English
Description
"Hacking and Cybersecurity: Building Resilient Digital Defenses" is a comprehensive guide to understanding the fundamentals of cybersecurity and the principles of hacking, and building resilient digital defenses to protect against cyberattacks. In today's interconnected world, cyberattacks are becoming increasingly frequent and sophisticated, posing a threat to individuals, organizations, and governments. This book provides a detailed overview of...
Author
Language
English
Description
"Safeguarding the Digital Fortress: A Guide to Cyber Security" is an essential resource that equips readers with the knowledge and tools needed to navigate the complex world of cyber security. In this comprehensive guide, a clear and concise roadmap for individuals and organizations to protect their digital assets from the ever-evolving threats of the digital age is provided. Chapters included:Chapter 1: Fundamentals of Information SecurityChapter...
Author
Language
English
Description
Introducing the "Defense in Depth" Book Bundle
Are you concerned about the ever-growing threats to your digital world? Do you want to fortify your network security and bolster your cyber resilience? Look no further - the "Defense in Depth" book bundle is your ultimate resource to safeguard your digital assets.
This comprehensive bundle consists of four carefully curated volumes, each designed to cater to different levels of expertise, from beginners...
Author
Series
Language
English
Description
Step into the enigmatic world of cyberspace with "Incredible Mysteries: Internet Mysteries," a captivating exploration of the internet's most baffling enigmas. This book takes readers on a journey through the digital realm's darkest corners, unveiling mysteries that have perplexed the online community and beyond.
Embark on a quest to unravel the secrets of Cicada 3301, a complex series of puzzles attracting cryptologists from around the globe...
Author
Language
English
Description
Elevate your Java security skills for the modern cloud era KEY FEATURES ● Understanding Zero-Trust security model for Java.● Practical cloud security strategies for developers.● Hands-on guidance for secure Java application development. DESCRIPTION This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice,...
Author
Language
English
Description
In the Digital Age of the twenty-first century, the question is not if you will be targeted, but when. For an enterprise to be fully prepared for the immanent attack, it must be actively monitoring networks, taking proactive steps to understand and contain attacks, enabling continued operation during an incident, and have a full recovery plan already in place. Are you prepared? If not, where does one begin?
Cybersecurity expert Ray Rothrock has provided...
Author
Language
English
Description
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments KEY FEATURES ● A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity.● Learn everything you need to know about VAPT, from planning and governance to the PPT framework.● Develop the skills you need to perform VAPT effectively and protect your organization from cyberattacks....
Author
Language
Français
Description
Dans ce livre, nous plongeons dans l'univers complexe de la sécurité des réseaux sans fil. À l'ère de la connectivité omniprésente, la protection de nos données et de notre vie privée est devenue une priorité absolue. Ce livre offre une exploration détaillée des méthodes de sécurisation des réseaux WiFi, allant du décryptage des mots de passe à la prévention des attaques malveillantes.Nous commençons par démystifier les protocoles...
Author
Language
English
Description
In today's world, security is paramount for individuals, businesses, and organizations alike. With the increasing prevalence of crime and cyberattacks, it is more important than ever to take steps to protect your property, assets, and people.This article provides an overview of key security measures that can be implemented to enhance security for homes, businesses, and organizations. By implementing these measures, you can reduce your risk of being...
In Inter-Library Loan Service
Didn't find what you need? Items not owned by Pasco County Library System can be requested from other Inter-Library Loan Service libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try submitting a Purchase Suggestion. Submit Purchase Suggestion