Books

9 results found
Title Authors Description OpenBook ID
CompTIA security+ study guide CompTIA security+ study guide Emmett A. Dulaney "The preparation you need for the CompTIA Security+ exam SY0-301This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside t… OL15934060W
Metasploit Metasploit David Kennedy "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is… OL15991444W
Introduction to contextual processing Introduction to contextual processing Gregory Vert "Develops a Comprehensive, Global Model for Contextually Based Processing Systems A new perspective on global information systems operation Helping to advance a valuable paradigm shift in the next ge… OL15998960W
Protecting your internet identity Protecting your internet identity Ted Claypoole "Protecting Your Internet Identity: Are you Naked Online? helps readers, young and old alike, understand the implications of their online personas and reputations. The authors offer a guide to the ma… OL16318337W
The death of the Internet The death of the Internet Markus Jakobsson "Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affec… OL16318634W
CISA CISA David L. Cannon "The industry-leading study guide for the CISA exam, fully updated More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as th… OL16516868W
Policing global movement Policing global movement S. Caroline Taylor,Daniel Joseph Torpy,Das, Dilip K. "This book builds on the tradition of previous volumes produced from annual International Police Executive Symposium (IPES) meetings. Three sections highlight the themes of tourism; trafficking; stra… OL16704852W
The definitive guide to complying with the HIPAA/HITECH privacy and security rules The definitive guide to complying with the HIPAA/HITECH privacy and security rules John J. Trinckes "The security standards in HIPAA were developed to implement appropriate security safeguards for the protection of certain Electronic Protected Health Information (EPHI) that may be at risk while per… OL22639978W
Core software security Core software security James F. Ransome "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to… OL23325553W