Cybersecurity for Executives: A Practical Guide

Rating: 
Amazon Price: $92.95 $60.84 You save: $32.11 (35%). (as of November 24, 2017 21:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their businessEmphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issuesCovers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and DisclosuresProvides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel ManagementIdentifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information

Cybersecurity for Executives: A Practical Guide

Rating: 
Amazon Price: N/A (as of November 24, 2017 12:41 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Rating: 
Amazon Price: N/A (as of November 24, 2017 09:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed “Subversive Multi-Vector Threats or ‘SMT’s. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace.

Includes detailed analysis and examples of the threats in addition to related anecdotal informationAuthors’ combined backgrounds of security, military, and intelligence, give you distinct and timely insightsPresents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them

CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition (Certification & Career – OMG)

Rating: 
Amazon Price: $60.00 $39.58 You save: $20.42 (34%). (as of November 24, 2017 09:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This up-to-date self-study system offers 100% coverage of every topic on the 2016 version of the CISA exam

The fully revised new edition delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. Written by an IT security and auditing expert, CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition, covers all five exam domains developed by the Information Systems Audit and Control Association (ISACA).
Continue reading “CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition (Certification & Career – OMG)”

Botnets: The Killer Web Applications

Rating: 
Amazon Price: N/A (as of November 24, 2017 21:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.

* This is the first book to explain the newest internet threat – Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise
* Botnets are the most complicated and difficult threat the hacker world has unleashed – read how to protect yourself