Amazon Price: $40.00 $32.85 You save: $7.15 (18%). (as of February 18, 2018 08:52 –
Defend against corporate espionage launched from social networks
Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive volume. Assess your global social media presence and identify vulnerabilities Establish solid security policies at every level of your organization Allocate resources for planning, administration, and corrective action Monitor usage by employees, clients, competitors, and the public Block cyberstalking. phishing, malware, and identity theft exploits Guard intellectual property rights, trademarks, copyrights, and logos Preserve your brand image using online reputation management tools
Continue reading “Securing the Clicks Network Security in the Age of Social Media”
Amazon Price: $25.95 $25.95 (as of February 18, 2018 06:28 –
The Internet is often called a superhighway, but it may be more analogous to a city: an immense tangle of streets, highways, and interchanges, lined with homes and businesses, playgrounds and theatres. We may not physically live in this city, but most of us spend a lot of time there, and even pay rents and fees to hold property in it.
But the Internet is not a city of the 21st century. Jeffrey Hunker, an internationally known expert in cyber-security and counter-terrorism policy, argues that the Internet of today is, in many ways, equivalent to the burgeoning cities of the early Industrial Revolution: teeming with energy but also with new and previously unimagined dangers, and lacking the technical and political infrastructures to deal with these problems. In a world where change of our own making has led to unexpected consequences, why have we failed, at our own peril, to address these consequences?
Continue reading “Creeping Failure: How We Broke the Internet and What We Can Do to Fix It”
Amazon Price: $49.95 $36.56 You save: $13.39 (27%). (as of February 18, 2018 21:03 –
Every day, over half a billion iOS users blindly entrust mobile devices with their personal information. If you write an application that mishandles that information, you'll create a goldmine for attackers—and a catastrophe for you and your customers. Whether you develop iOS apps or test their defenses, it's critical that you know how to track down and eliminate security threats before they become real issues.
In iOS Application Security, author David Thiel shows you how to write apps that actually protect users from the bad guys. He covers everything you need to know to design secure iOS apps from the ground up, including:
Continue reading “iOS Application Security: The Definitive Guide for Hackers and Developers”
Amazon Price: N/A (as of February 18, 2018 14:16 –
Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.
Continue reading “Computer Forensics InfoSec Pro Guide”
Amazon Price: $74.99 $47.32 You save: $27.67 (37%). (as of February 18, 2018 20:24 –
"When it comes to software security, the devil is in the details. This book tackles the details."
–Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies
"McGraw's book shows you how to make the 'culture of security' part of your development lifecycle."
–Howard A. Schmidt, Former White House Cyber Security Advisor
Continue reading “Software Security: Building Security In”