Your cart is empty
The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you'll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared. * Discover how much you already know by beginning with an assessment test * Understand all content, knowledge, and tasks covered by the CISA exam * Get more in-depths explanation and demonstrations with an all-new training video * Test your knowledge with the electronic test engine, flashcards, review questions, and more The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you're looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.
The completely updated NETWORK+ GUIDE TO NETWORKS, International Edition gives readers the technical skills and industry know-how required to begin an exciting career installing, configuring, and troubleshooting computer networks. The text also prepares readers for CompTIA's Network+ N10-005 certification exam with fundamentals in protocols, topologies, hardware, and network design.
After exploring TCP/IP, Ethernet, wireless transmission, and security concepts, as well as an all-new chapter on virtual networks, readers can increase their knowledge with the practical "On-the Job" stories, Review Questions, Hands-On Projects, and Case Projects.
NETWORK+ GUIDE TO NETWORKS, International Edition also includes reference appendices, a glossary, and full-color illustrations. The features of the text combined with its emphasis on real-world problem solving, provides readers with the tools they need to succeed in any computing environment.
Master the technical skills and industry know-how to begin an exciting career installing, configuring, and troubleshooting computer networks with the completely updated NETWORK+ GUIDE TO NETWORKS, 7E. You can prepare for success on CompTIA's Network+ N10-006 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, and troubleshooting. This edition addresses today's latest technology with new features that make essential information easily accessible and help you visualize high-level concepts. New OSI layer icons visually link concepts and the OSI model. New and updated "On the Job" stories, Applying Concepts activities, Hands-On and Case Projects let you explore concepts in more depth. The NETWORK+ GUIDE TO NETWORKS, 7E's emphasis on real-world problem solving provides the tools you need to succeed in any computing environment.
GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you learn. Perfect for students and professionals alike in this high-demand, fast-growing field, GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES, Third Edition, is a must-have resource for success as a network security professional.
Master the technical skills and industry knowledge you need to begin an exciting career installing, configuring and troubleshooting computer networks with West/Dean/Andrews' NETWORK+ GUIDE TO NETWORKS, 8th edition. It thoroughly prepares you for success on CompTIA's Network+ N10-007 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, security and troubleshooting. Virtualization-based projects give you experience working with a wide variety of hardware, software, operating systems and device interactions, while "On the Job" stories, Applying Concepts activities, and Hands-On and Capstone Projects let you explore concepts in more depth. MindTap Networking offers additional practice and certification prep. The text's emphasis on real-world problem solving provides the tools for success in any computing environment.
Providing essential information for business managers, computer programmers, system designers, as well as home computer users, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 8e provides a thorough introduction that includes coverage of the language of computer networks as well as the effects of data communications on business and society. Balancing technical concepts with everyday issues, it equips you with a solid understanding of the basic features, operations, and limitations of different types of computer networks. It offers full coverage of wireless technologies, industry convergence, compression techniques, network security, LAN technologies, VoIP, and error detection and correction. The Eighth Edition also offers up-to-the-minute coverage of near field communications, updated USB interface, lightning interface, and IEEE 802.11 ac and ad wireless standards, firewall updates, router security problems, the Internet of Things, cloud computing, zero-client workstations, and Internet domain names.
With a foreword from Bill Gates From Microsoft's President and one of the tech industry's wisest thinkers, a frank and thoughtful reckoning with how to balance enormous promise and existential risk as the digitization of everything accelerates. __________ Microsoft President Brad Smith operates by a simple core belief: when your technology changes the world, you bear a responsibility to help address the world you have helped create. This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. Now, though, we have reached an inflection point: Silicon Valley has moved fast and it has broken things. A new understanding has emerged that companies that create technology must accept greater responsibility for the future. And governments will need to regulate technology by moving faster and catching up with the pace of innovation that is impacting our communities and changing the world. In Tools and Weapons, Brad Smith takes us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no pre-existing playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of AI, big tech's relationship to inequality and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book opens up the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. Every tool can be a weapon in the wrong person's hands, and companies are being challenged in entirely new ways to embrace the totality of their responsibilities. We have moved from a world in which Silicon Valley could take no prisoners to one in which tech companies and governments must work together to address the challenges and adapt to the changes technology has unleashed. There are huge ramifications to be thought through, and Brad Smith provides a marvellous and urgently necessary contribution to that effort.
Would you say your phone is safe, or your computer? What about your car? Or your bank? There is a global war going on and the next target could be anyone, from a global corporation to a randomly selected person. From cybercrime villages in Romania to intellectual property theft campaigns in China, these are the true stories of the hackers behind some of the largest cyberattacks in history, and those committed to stopping them. You've never heard of them and you're not getting their real names. Kate Fazzini has met the hackers that create new cyberweapons, hack sports cars and develop ransomware capable of stopping international banks in their tracks. Kingdom of Lies is a fast-paced look at technological innovations that were mere fantasy only a few years ago, but now make up an integral part of all our lives.
*THE INSTANT NEW YORK TIMES BESTSELLER AND WORLD ECONOMIC FORUM BOOK
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.
In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.
All you need to know about SharePoint Online and SharePoint Server 2019 SharePoint is an enterprise portal server living under the Microsoft Office umbrella. It can be used as a local installation (on-premises) or an online service. The SharePoint Online service comes bundled with Office 365. You can use SharePoint to aggregate sites, information, data, and applications into a single portal. SharePoint 2019 contains highly integrated features that allow you to work with it directly from other Office products such as Teams, Word, Excel, PowerPoint, and many others. SharePoint 2019 For Dummies provides a thorough update on how to make the most of all the new SharePoint and Office features--while still building on the great and well-reviewed content in the prior editions. The book shows those new to SharePoint or new to SharePoint 2019 how to get up and running so that you and your team can become productive with this powerful tool. Find high-level, need-to-know information for "techsumers," administrators, and admins Learn how SharePoint Online can get you started in minutes without the hassle and frustration of building out your own servers Find everything you need to know about the latest release of SharePoint Online and SharePoint Server 2019 Get your hands on the best guide on the market for SharePoint 2019!
Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and exciting skill. This book first introduces the fundamental building blocks that form a modern network, such as protocols, topologies, hardware, and network operating systems. It then provides in-depth coverage of the most important concepts in contemporary networking, such as TCP/IP, Ethernet, wireless transmission, and security. After reading the book and completing the end-of-chapter exercises, you will be prepared to select the best network design, hardware, and software for your environment. You will also have the skills to build a network from scratch and maintain, upgrade, and troubleshoot an existing network. Finally, you will be well prepared to pass CompTIA (the Computing Technology Industry Association) Network+ certification exam. This book explains concepts logically and in a clear, approachable style. In addition, concepts are reinforced by real-world examples of networking issues from a professionals standpoint. Each chapter opens with an On the Job story from a network engineer. These real-world examples, along with Hands-on Projects and Case Projects in each chapter, make this book a practical learning tool. The numerous tables and illustrations, along with the glossaries, appendices, and study questions make the book a valuable reference for any networking professional.
Object Lessons is a series of short, beautifully designed books about the hidden lives of ordinary things. Do you feel your consciousness, your attention, and your intelligence (not to mention your eyesight) being sucked away, byte by byte, in a deadening tsunami of ill-composed blather, corporate groupthink, commercial come-ons, and other meaningless internet flotsam? Do your work life and your social life, hideously conjoined in your inbox, drag each other down in a surreal cycle of neverending reposts, appointments, and deadlines? Sometime in the mid-1990s, we began, often with some trepidation, to enroll for a service that promised to connect us-electronically and efficiently-to our friends and lovers, our bosses and merchants. If it seemed at first like simply a change in scale (our mail would be faster, cheaper, more easily distributed to large groups), we now realize that email entails a more fundamental alteration in our communicative consciousness. Despite its fading relevance in the lives of the younger generation in the face of an ever-changing array of apps and media, email is probably here to stay, for better or worse. Object Lessons is published in partnership with an essay series in The Atlantic.
Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.
Essential Linux Management Skills Made Easy
Effectively deploy and maintain Linux and other Free and Open Source Software (FOSS) on your servers or entire network using this practical resource. "Linux Administration: A Beginner's Guide, Sixth Edition" provides up-to-date details on the latest Linux distributions, including Fedora, Red Hat Enterprise Linux, CentOS, Debian, and Ubuntu. Learn how to install and customize Linux, work from the GUI or command line, configure Internet and intranet services, interoperate with Windows systems, and create reliable backups. Performance tuning, security, and virtualization are also covered and real-world examples help you put the techniques presented into practice. "Install and configure popular Linux distributions, including the latest versions of Fedora, CentOS, openSUSE, Debian, and Ubuntu Administer Linux servers from the GUI or from the command line (shell) Manage users, permissions, folders, and native FOSS applications Compile, tune, upgrade, and customize the latest Linux kernel 3.x series Work with proc, SysFS, and cgroup file systems Understand and manage the Linux TCP/IP networking stack and services for both IPv4 and IPv6 Build robust firewalls, and routers using Netfilter and Linux Create and maintain print, e-mail, FTP, and web servers Use LDAP or NIS for identity management Set up and administer DNS, POP3, IMAP3, and DHCP servers Use GlusterFS, NFS, and Samba for sharing and distributing file system resources Explore and implement Linux virtualization technologies using KVM"
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Achieve Extreme Application Performance for a Private Cloud with Oracle Exalogic Elastic Cloud Transition to a private cloud computing infrastructure and achieve unmatched levels of performance with help from this Oracle Press guide. Oracle Exalogic Elastic Cloud Handbook shows you how to plan, implement, and maintain a private cloud. Find out how to set up components, deploy Java applications, maximize redundancy and throughput, and migrate legacy workloads. Examples, screenshots, and diagrams are included throughout this comprehensive resource. Configure Oracle Exalogic Elastic Cloud nodes and racks Optimize Java EE application performance on Oracle WebLogic Server Provision and administer a highly scalable private cloud Build, debug, and manage custom Java applications Secure, monitor, and tune using Oracle Enterprise Manager Leverage capabilities from Oracle Fusion Middleware Consolidate Oracle and third-party application workloads
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. You'll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on learning and help you implement your new skills. Security technology continues to evolve, and yet not a week goes by without news of a new security breach or a new exploit being released. The Network Security Test Lab is the ultimate guide when you are on the front lines of defense, providing the most up-to-date methods of thwarting would-be attackers. * Get acquainted with your hardware, gear, and test platform * Learn how attackers penetrate existing security systems * Detect malicious activity and build effective defenses * Investigate and analyze attacks to inform defense strategy The Network Security Test Lab is your complete, essential guide.
While Kubernetes has established itself as the industry standard for managing containers and their life cycles, there's a definite need for good practices on how to write native applications. This practical guide shows application and infrastructure developers, DevOps practitioners, and site reliability engineers how to develop cloud native apps that run on Kubernetes. Red Hat's developer advocate Michael Hausenblas and senior software engineer Stefan Schimanski guide you through Kubernetes' basic building blocks including the client-go API library, custom resources, and cloud native programming languages. This intermediate-level book requires a minimum understanding of development and system administration tools and practices such as package management, the Go programming language, and using Git.
CISSP Study Guide - fully updated for the 2018 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Six unique 150 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 700 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to develop the right strategies to thwart these attacks. This book clears the confusion by outlining the approaches that work, the tools that work, and resources needed to apply them. * Understand the fundamental concepts of computer network exploitation * Learn the nature and tools of systematic attacks * Examine offensive strategy and how attackers will seek to maintain their advantage * Understand defensive strategy, and how current approaches fail to change the strategic balance Governments, criminals, companies, and individuals are all operating in a world without boundaries, where the laws, customs, and norms previously established over centuries are only beginning to take shape. Meanwhile computer espionage continues to grow in both frequency and impact. This book will help you mount a robust offense or a strategically sound defense against attacks and exploitation. For a clear roadmap to better network security, Network Attacks and Exploitation is your complete and practical guide.
The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology.
You may like...
Official (ISC)2 Guide to the CISSP CBK
John Warsinske, Mark Graff, … Hardcover
Mastering Microsoft Azure Infrastructure…
John Savill Paperback
Terraform: Up & Running - Writing…
Yevgeniy Brikman Paperback
Blockchain and the Law - The Rule of…
Primavera de Filippi, Aaron Wright Paperback
Guide to Supporting Microsoft Private…
Ron Carswell Paperback
Getting an Information Security Job For…
Peter H. Gregory Paperback (1)
CompTIA Linux+ Study Guide - Exam…
Christine Bresnahan, Richard Blum Paperback
The Art of Memory Forensics - Detecting…
Michael Hale Ligh, Andrew Case, … Paperback
Session Initiation Protocol (SIP…
Travis Russell Hardcover R1,697 Discovery Miles 16 970
Networking All-in-One For Dummies
Doug Lowe Paperback