Catalog Search Results
Author
Language
English
Description
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that."Instant Citrix Security How-to" will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be...
Author
Language
English
Description
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments."Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and...
3) OSCP Offensive Security Certified Professional Practice Tests With Answers To Pass the OSCP Ethical
Author
Language
English
Description
Embark on a transformative journey into the world of cybersecurity mastery with mastering offensive security. This comprehensive guide is meticulously crafted to propel aspiring professionals through the intricate realm of offensive security, serving as an indispensable roadmap to conquering the challenges of the coveted Offensive Security Certified Professional (OSCP) certification. Delve into a multifaceted exploration of offensive security practices,...
Author
Language
English
Description
Unleash the Power of NSX Datacenter for Seamless Virtualization and Unparalleled Security
Book Description
"Embark on a transformative journey into the world of network virtualization with 'Ultimate VMware NSX for Professionals.' This comprehensive guide crafted by NSX experts, starts with an exploration of Software Defined Networking, NSX architecture, and essential components in a systematic approach. It then dives into the intricacies of...
Author
Language
English
Description
"Defending the Digital Perimeter: Network Security Audit Readiness Strategies" is a must-read eBook for IT professionals, cybersecurity experts, and business leaders who are dedicated to safeguarding their organization's digital assets. In today's interconnected world, where data breaches and cyberattacks are on the rise, maintaining a robust and secure network perimeter is of paramount importance.This comprehensive eBook delves into the intricacies...
Author
Language
English
Description
"Safeguarding the Digital Fortress: A Guide to Cyber Security" is an essential resource that equips readers with the knowledge and tools needed to navigate the complex world of cyber security. In this comprehensive guide, a clear and concise roadmap for individuals and organizations to protect their digital assets from the ever-evolving threats of the digital age is provided. Chapters included:Chapter 1: Fundamentals of Information SecurityChapter...
Author
Language
English
Formats
Description
Prepare for the CompTIA CySA+ certification exam with the official and updated study guide for Exam CS0-003 In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You'll find clear and concise information on critical security topics presented by way of practical, real-world...
Author
Series
Language
English
Description
Step into the enigmatic world of cyberspace with "Incredible Mysteries: Internet Mysteries," a captivating exploration of the internet's most baffling enigmas. This book takes readers on a journey through the digital realm's darkest corners, unveiling mysteries that have perplexed the online community and beyond.
Embark on a quest to unravel the secrets of Cicada 3301, a complex series of puzzles attracting cryptologists from around the globe...
Author
Language
English
Description
Elevate your Java security skills for the modern cloud era KEY FEATURES ● Understanding Zero-Trust security model for Java.● Practical cloud security strategies for developers.● Hands-on guidance for secure Java application development. DESCRIPTION This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice,...
Author
Language
Français
Description
Dans ce livre, nous plongeons dans l'univers complexe de la sécurité des réseaux sans fil. À l'ère de la connectivité omniprésente, la protection de nos données et de notre vie privée est devenue une priorité absolue. Ce livre offre une exploration détaillée des méthodes de sécurisation des réseaux WiFi, allant du décryptage des mots de passe à la prévention des attaques malveillantes.Nous commençons par démystifier les protocoles...
Author
Language
English
Description
Security Operation Center (SOC), as the name suggests, is a central operation center that deals with information and cyber security events by employing people, processes, and technology. It continuously monitors and improves an organization's security posture. It is considered to be the first line of defense against cyber security threats. HOW A SECURITY OPERATIONS CENTER WORKS:Rather than being focused on developing a security strategy, designing...
Author
Language
English
Description
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments KEY FEATURES ● A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity.● Learn everything you need to know about VAPT, from planning and governance to the PPT framework.● Develop the skills you need to perform VAPT effectively and protect your organization from cyberattacks....
13) Freelance
Publisher
Relativity Media Llc
Pub. Date
2024.
Language
English
Formats
Description
Ex-special forces operative Mason Pettis is stuck in a dead-end desk job when he reluctantly takes on a freelance gig to provide private security for washed-up journalist Claire Wellington as she interviews the ruthless but impeccably dressed dictator, Juan Venegas. When a military coup breaks out just as she's about to get the scoop of a lifetime, the unlikely trio must figure out how to survive the jungle AND each other to make it out alive!
Author
Language
English
Description
Unlock the world of digital investigation and fortify your expertise in Computer Hacking Forensic Investigation (CHFI) with this comprehensive guide. Tailored specifically for aspirants aiming to ace the CHFI certification, this book is a roadmap to success, blending theory with hands-on practice test questions and detailed answers. Explore the intricate landscape of digital forensics as you navigate through chapters meticulously designed to encompass...
Author
Language
English
Description
Forge Your Future with Fortified Cloud Security
Imagine elevating your business's cloud security to an unprecedented level, where each line of code propels you towards unmatched resilience and efficiency. Blueprints of DevSecOps: Foundations to Fortify Your Cloud is the essential guide for IT professionals, business leaders, and security enthusiasts poised to transform their approach to cloud security through the powerful amalgamation of development,...
Author
Language
English
Description
In "Careers in Information Technology: Cybersecurity Analyst," readers are introduced to the vital and ever-changing topic of cybersecurity in a perceptive manner. This thorough guide delves into the fascinating field of cybersecurity, illuminating the many prospects, difficulties, and routes to success in this highly sought-after profession. Because businesses, governments, and individuals rely on the security of their digital assets and data, cybersecurity...
Author
Language
English
Description
���� Introducing "Cyber Auditing Unleashed" - Your Ultimate Guide to Advanced Security Strategies for Ethical Hackers! ����
Are you ready to master the art of ethical hacking and become a formidable defender of the digital realm? Look no further! Dive into the world of cybersecurity with our comprehensive book bundle, "Cyber Auditing Unleashed." This four-book collection is your ticket to advanced security auditing, providing you...
Author
Language
English
Description
In today's digital age, the protection and effective management of information and knowledge have become paramount. As organizations and individuals navigate a rapidly evolving technological landscape, the need for robust security governance and management practices has never been greater. "Information and Knowledge Security Governance and Management" is your comprehensive guide to understanding and implementing the critical strategies necessary to...
Author
Language
English
Description
Buckle up and prepare to dive into the thrilling world of Zero-Click Exploits. This isn't your average cybersecurity guide - it's a wild ride through the dark underbelly of the digital world, where zero-click exploits reign supreme.Join Josh, a seasoned cybersecurity professional and the mastermind behind Greyhat Intelligence & Investigative Solutions, as he spills the beans on these sneaky attacks that can compromise systems without a single click....
In Interlibrary Loan
Didn't find what you need? Items not owned by Pueblo Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request