Categories Unlimited Books

Data Analytics for Internal Auditors (Internal Audit and IT Audit)

There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that auditors as well as management have the ability […]

Read More
Categories Unlimited Books

Cisco Firewalls (Cisco Press Networking Technology)

Cisco Firewalls Cisco Firewalls Concepts, design and deployment for Cisco Stateful Firewall solutions ” In this book, Alexandre proposes a totally different approach to the important subject of firewalls: Instead of just presenting configuration models, he uses a set of carefully crafted examples to illustrate the theory in action. A must read!” –Luc Billot, Security […]

Read More
Categories Unlimited Books

Writing Security Tools and Exploits

Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds […]

Read More
Categories Unlimited Books

Bitcoin Essentials

Key Features Learn how to use the advanced features of Bitcoin wallets Set up your Bitcoin mining operations to mine with efficiency Explore what the future holds for mining and blockchains in this pragmatic guide Book Description Blockchain is being billed as the technology of the future. Bitcoin is the first application of that technology. […]

Read More
Categories Unlimited Books

IoT Security Issues

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the […]

Read More