Securing the Cloud: Cloud Computer Security Techniques and Tactics

Rating: 
Amazon Price: N/A (as of July 23, 2019 14:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology.

Named The 2011 Best Identity Management Book by InfoSec ReviewsProvides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trustDiscusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recoveryDetails the benefits of moving to the cloud-solving for limited availability of space, power, and storage

Introduction to Computer Networks and Cybersecurity

Rating: 
Amazon Price: N/A (as of July 23, 2019 19:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues.

Get the Fundamentals of Internet Architecture and the Protocol Layers
Continue reading “Introduction to Computer Networks and Cybersecurity”

Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide

Rating: 
Amazon Price: $99.95 $77.99 You save: $21.96 (22%). (as of July 23, 2019 11:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

[Note: This Second Edition is also available in Kindle format!]

Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast – no more finger pointing because the packets never lie! From "Death by Database" to "Troubleshooting Time Syncing," 49 case studies offer insight into performance and security situations solved with Wireshark.
Continue reading “Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide”

HACKING ÉTICO 101 – Cómo hackear profesionalmente en 21 días o menos! (Spanish Edition)

Rating: 
Amazon Price: N/A (as of March 20, 2018 05:55 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

HACKING ÉTICO 101 – Cómo hackear profesionalmente en 21 días o menos!
Por Karina Astudillo B.

¿Siente curiosidad sobre cómo realizan pruebas de intrusión los hackers? ¿Ha querido tomar cursos presenciales de hacking ético pero no tiene el tiempo o el dinero para hacerlo?
Continue reading “HACKING ÉTICO 101 – Cómo hackear profesionalmente en 21 días o menos! (Spanish Edition)”

Ethical Hacking and Penetration Testing Guide

Rating: 
Amazon Price: N/A (as of July 23, 2019 16:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test.

The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.
Continue reading “Ethical Hacking and Penetration Testing Guide”