Amazon Price: N/A (as of November 23, 2017 09:24 –
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.
With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.
Continue reading “Computer and Information Security Handbook”
Amazon Price: $40.00 $36.00 You save: $4.00 (10%). (as of November 23, 2017 10:46 –
This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out.
PoC||GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.
Continue reading “PoC or GTFO”
Amazon Price: $66.95 $64.87 You save: $2.08 (3%). (as of November 22, 2017 21:04 –
A cogent overview of the threat spectrum of cyberspace attacks and cyber weapons, this book introduces the arsenal of cyber tools and sophisticated attacks targeting our national security and our critical infrastructure sectors. Topics include the history of cyber security and the computer industry, cyber intelligence, and recent conflicts and warfare. From a strategic viewpoint, the book also explores legal and international issues in cyberspace, economic costs, the threat landscape, and future trends.
Amazon Price: N/A (as of November 23, 2017 10:03 –
Implement an Effective Security Metrics Project or Program
IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. The Security Process Management Framework is introduced and analytical strategies for security metrics data are discussed. You'll learn how to take a security metrics program and adapt it to a variety of organizational contexts to achieve continuous security improvement over time. Real-world examples of security measurement projects are included in this definitive guide. Define security metrics as a manageable amount of usable data Design effective security metrics Understand quantitative and qualitative data, data sources, and collection and normalization methods Implement a programmable approach to security using the Security Process Management Framework Analyze security metrics data using quantitative and qualitative methods Design a security measurement project for operational analysis of security metrics Measure security operations, compliance, cost and value, and people, organizations, and culture Manage groups of security measurement projects using the Security Improvement Program Apply organizational learning methods to security metrics
Amazon Price: N/A (as of November 23, 2017 08:46 –
If you’re a programmer new to regular expressions, this easy-to-follow guide is a great place to start. You’ll learn the fundamentals step-by-step with the help of numerous examples, discovering first-hand how to match, extract, and transform text by matching specific words, characters, and patterns.