Building a HIPAA-Compliant Cybersecurity Program

Building a HIPAA-Compliant Cybersecurity Program

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for…

Social Security For Dummies, 3rd Edition

Social Security For Dummies, 3rd Edition

Make sure you get the benefits you’ve earned Navigate your way around the complex system with ease Incorporate Social Security into your financial plan Your Social Security safety net Social Security exists to give us peace of mind, yet most of us spend sleepless nights anxious about our…

Spring Security Essentials

Spring Security Essentials

Spring Security is a framework that focuses on providing both authentication and authorization to Java applications. Like all Spring projects, the real power of Spring Security is how easily it can be extended to meet custom requirements. The popularity of the Spring framework is increasing and the security…

Mastering Bitcoin, 2nd Edition

Mastering Bitcoin, 2nd Edition

Join the technological revolution that’s taking the world of finance by storm.¬†Mastering Bitcoin¬†is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money. Whether you’re building the next killer app, investing in a startup, or simply curious…

Digital Privacy and Security Using Windows

Digital Privacy and Security Using Windows

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and…

VMware vCloud Security

VMware vCloud Security

VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security. This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience…

CISSP in 21 Days, Second Edition

CISSP in 21 Days, Second Edition

Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. But passing the final exam is challenging. This happens when they cover everything but do…

Hacking For Dummies, 3rd Edition

Hacking For Dummies, 3rd Edition

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It’s bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in…

Practical Internet of Things Security

Practical Internet of Things Security

With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need…

Practical Digital Forensics

Practical Digital Forensics

Digital Forensics is a methodology which includes using various tools, techniques, and programming language. This book will get you started with digital forensics and then follow on to preparing investigation plan and preparing toolkit for investigation. In this book you will explore new and promising forensic processes and…