0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators (Paperback) Loot Price: R2,096
Discovery Miles 20 960
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators (Paperback): Johnny Long, Jack...

Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators (Paperback)

Johnny Long, Jack Wiles, Russ Rogers, Phil Drake, Ron J. Green, Gregory Kipper, Raymond Todd Blackwood, Amber Schroader; Contributions by Eric Cole, Dennis O'Brien

 (sign in to rate)
Loot Price R2,096 Discovery Miles 20 960 | Repayment Terms: R196 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and thoughts discussed here are as new as tomorrow s headlines, whereas others have been around for decades without being properly addressed. I hope you enjoy this book as much as we have enjoyed working with the various authors and friends during its development. Donald Withers, CEO and Cofounder of TheTrainingCo.
Jack Wiles, on Social Engineering offers up a potpourri of tips, tricks, vulnerabilities, and lessons learned from 30-plus years of experience in the worlds of both physical and technical security.
Russ Rogers on the Basics of Penetration Testing illustrates the standard methodology for penetration testing: information gathering, network enumeration, vulnerability identification, vulnerability exploitation, privilege escalation, expansion of reach, future access, and information compromise.
Johnny Long on No Tech Hacking shows how to hack without touching a computer using tailgating, lock bumping, shoulder surfing, and dumpster diving.
Phil Drake on Personal, Workforce, and Family Preparedness covers the basics of creating a plan for you and your family, identifying and obtaining the supplies you will need in an emergency.
Kevin O Shea on Seizure of Digital Information discusses collecting hardware and information from the scene.
Amber Schroader on Cell Phone Forensics writes on new methods and guidelines for digital forensics.
Dennis O Brien on RFID: An Introduction, Security Issues, and Concerns discusses how this well-intended technology has been eroded and used for fringe implementations.
Ron Green on Open Source Intelligence details how a good Open Source Intelligence program can help you create leverage in negotiations, enable smart decisions regarding the selection of goods and services, and help avoid pitfalls and hazards.
Raymond Blackwood on Wireless Awareness: Increasing the Sophistication of Wireless Users maintains it is the technologist s responsibility to educate, communicate, and support users despite their lack of interest in understanding how it works.
Greg Kipper on What is Steganography? provides a solid understanding of the basics of steganography, what it can and can t do, and arms you with the information you need to set your career path.
Eric Cole on Insider Threat discusses why the insider threat is worse than the external threat and the effects of insider threats on a company.
*Internationally known experts in information security share their wisdom
*Free pass to Techno Security Conference for everyone who purchases a book $1,200 value
*2-HOUR DVD with cutting edge information on the future of information security"

General

Imprint: Syngress Media,U.S.
Country of origin: United States
Release date: May 2007
First published: March 2007
Authors: Johnny Long • Jack Wiles • Russ Rogers • Phil Drake • Ron J. Green • Gregory Kipper • Raymond Todd Blackwood • Amber Schroader
Contributors: Eric Cole • Dennis O'Brien
Dimensions: 229 x 178 x 22mm (L x W x T)
Format: Paperback
Pages: 432
ISBN-13: 978-1-59749-138-9
Categories: Books > Computing & IT > Computer communications & networking > Network security
Promotions
LSN: 1-59749-138-1
Barcode: 9781597491389

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,704 R1,363 Discovery Miles 13 630
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,243 Discovery Miles 12 430
PCI Dss: A Pocket Guide
IT Governance Paperback R409 Discovery Miles 4 090
Two-Factor Authentication
Mark Stanislav Paperback R525 Discovery Miles 5 250
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,337 Discovery Miles 13 370
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R671 Discovery Miles 6 710
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,867 Discovery Miles 68 670
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,615 Discovery Miles 86 150
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R7,133 R6,586 Discovery Miles 65 860
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,585 Discovery Miles 65 850
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R12,724 Discovery Miles 127 240
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R8,709 Discovery Miles 87 090

See more

Partners