Advanced Persistent Training

Advanced Persistent Training

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise…

Chef Essentials

Chef Essentials

Chef is a configuration management tool that turns IT infrastructure into code. Chef provides tools to manage systems at scale. With this book, you will learn how to use the same tools that companies such as Facebook, Riot Games, and Ancestry.com use to manage and scale their infrastructure….

NTP Security

NTP Security

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline….

CEH v9

CEH v9: Certified Ethical Hacker Version 9

Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently…

VMware View Security Essentials

VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the…

Practical Information Security Management

Practical Information Security Management

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective…

From Hacking to Report Writing

From Hacking to Report Writing

This book will teach you everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate,…

Mastering Microsoft Forefront UAG 2010 Customization

Mastering Microsoft Forefront UAG 2010 Customization

Mastering Microsoft Forefront UAG 2010 Customization is a hands-on guide with step-by-step instructions for enhancing the functionality of UAG through customization. Each topic details one key aspect of functionality and the operative mechanism behind it, and suggests functionality that can be achieved with customization, along with helpful code…