Defensive Security Handbook

Author: Lee Brotherston
Publisher: "O'Reilly Media, Inc."
ISBN: 1491960353
Size: 65.38 MB
Format: PDF, Docs
View: 6559
Download Read Online
Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, ...

Defensive Security Handbook

Author: Lee Brotherston
Publisher:
ISBN: 9781491960387
Size: 76.13 MB
Format: PDF, Docs
View: 7624
Download Read Online
Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, ...

Defensive Security Handbook

Author: Lee Brotherston
Publisher: "O'Reilly Media, Inc."
ISBN: 1491960337
Size: 57.26 MB
Format: PDF, ePub
View: 3640
Download Read Online
Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, ...

Information Security Handbook

Author: Darren Death
Publisher: Packt Publishing Ltd
ISBN: 1788473264
Size: 41.28 MB
Format: PDF, Kindle
View: 5636
Download Read Online
Style and approach This book takes a practical approach, walking you through information security fundamentals, along with information security best practices.

Zero Trust Networks

Author: Evan Gilman
Publisher: "O'Reilly Media, Inc."
ISBN: 149196216X
Size: 27.17 MB
Format: PDF, ePub
View: 6755
Download Read Online
That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it.

Network Security Through Data Analysis

Author: Michael Collins
Publisher: "O'Reilly Media, Inc."
ISBN: 1449357881
Size: 12.88 MB
Format: PDF, ePub
View: 5544
Download Read Online
Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques.

Crafting The Infosec Playbook

Author: Jeff Bollinger
Publisher: "O'Reilly Media, Inc."
ISBN: 1491913614
Size: 30.16 MB
Format: PDF, ePub
View: 1861
Download Read Online
This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements.

Network Security Assessment

Author: Chris McNab
Publisher: "O'Reilly Media, Inc."
ISBN: 1491911069
Size: 56.76 MB
Format: PDF, ePub, Mobi
View: 444
Download Read Online
System complexity and attack surfaces continue to grow. This book provides a process to help you mitigate risks posed to your network.

Intelligence Driven Incident Response

Author: Scott J Roberts
Publisher: "O'Reilly Media, Inc."
ISBN: 1491935200
Size: 38.38 MB
Format: PDF
View: 2967
Download Read Online
In three parts, this in-depth book includes: The fundamentals: get an introduction to cyber threat intelligence, the intelligence process, the incident-response process, and how they all work together Practical application: walk through the ...