Categories Unlimited Books

Software Life Cycle Management Standards: Real-world scenarios and solution…

Get the benefits of the ISO19770 standard for software asset management In Software Life Cycle Management Standards, David Wright calls on his vast experience to explain how the ISO/IEC 19770 standard applies to the whole of the software lifecycle. He gives up-to-date information using practical examples, clear diagrams, and entertaining anecdotes. For software publishers and […]

Read More
Categories Unlimited Books

Elliptic Curves and Their Applications to Cryptography: An Introduction

Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. Elliptic Curves and Their Applications to […]

Read More
Categories Unlimited Books

Information Technology Risk Management in Enterprise Environments: A Review…

Discusses all types of corporate risks and practical means of defending against them. Security is currently identified as a critical area of Information Technology management by a majority of government, commercial, and industrial organizations. Offers an effective risk management program, which is the most critical function of an information security program.

Read More
Categories Unlimited Books

Mastering FreeBSD and OpenBSD Security: Building, Securing, and Maintaining…

FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty […]

Read More
Categories Unlimited Books

The Corporate Information Security Policy (Writing Information Security Pol…

Every organization needs to protect their information assets from the increasingly sophisticated threats out to steal them. The agreed set of potection measures are documented in policies. This series begins with the overarching document, the corporate information security policy and will continue with functional policies that address discrete subjects. A template document and a set […]

Read More
Categories Unlimited Books

The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk

The Weakest Link looks at one of the biggest issues in cyber security: how to protect organisations from their own employees. Many cyber threats don’t involve hackers using clever software to penetrate company networks; threats can often involve employees acting in ways that, accidentally or deliberately, leak information or damage assets without a hacker being […]

Read More
Categories Unlimited Books

Ethical Hacking and Countermeasures: Attack Phases

The EC-Council-Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and […]

Read More
Categories Unlimited Books

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate …

An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In […]

Read More