Information Assurance Handbook: Effective Computer Security and Risk Management Strategies (Networking & Comm – OMG)

Rating: 
Amazon Price: $60.00 $39.96 You save: $20.04 (33%) (as of October 22, 2020 20:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Best practices for protecting critical data and systems

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike.
Continue reading “Information Assurance Handbook: Effective Computer Security and Risk Management Strategies (Networking & Comm – OMG)”

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Rating: 
Amazon Price: $39.95 $27.96 You save: $11.99 (30%) (as of October 23, 2020 16:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed.
Continue reading “Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners”