Categories Unlimited Books

The Four Pillars of Endpoint Security

Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By apply the Four Pillars of Endpoint Security, businesses can stay competitive and […]

Read More
Categories Unlimited Books

2600: The Hacker Digest – Volume 29

Volume 29 of The Hacker Digest consists of articles published in 2600 Magazine from 2012 to 2013 on nearly 100 subjects of interest to hackers and those who want to understand what hacking is all about. In addition, all of the popular payphone photos, back cover photos, and expanded front cover photos are included in […]

Read More
Categories Unlimited Books

Auditing Cloud Computing: A Security and Privacy Guide (Wiley Corporate F&A…

The auditor’s guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy […]

Read More
Categories Unlimited Books

Sscp (R) (Isc)2 (R) Systems Security Certified Practitioner Official Study …

Fully updated Study Guide for the SSCP This guide prepares you for the SSCP, Systems Security Certified Practitioner certification examination by focusing on the Common Body of Knowledge (CBK) as determined by ISC2 in seven high level topics. This Sybex Study Guide covers 100% of all exam objectives. You’ll prepare for the exam smarter and […]

Read More