![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 6 of 6 matches in All Departments
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In "Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization" Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. "Advanced Persistent Threat" is the first comprehensive manual
that discusses how attackers are breaking into systems and what to
do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: How and why organizations are being attacked How to develop a "Risk based Approach to Security" Tools for protecting data and preventing attacks Critical information on how to respond and recover from an intrusion The emerging threat to Cloud based networks "
This book shows everyday computer users how to become
cyber-sleuths. It takes readers through the many different issues
involved in spying on someone online. It begins with an explanation
of reasons and ethics, covers the psychology of spying, describes
computer and network basics, and takes readers step-by-step through
many common online activities, and shows what can be done to
compromise them. The book's final section describes personal
privacy and counter-spy techniques. By teaching by both theory and
example this book empowers readers to take charge of their
computers and feel confident they can be aware of the different
online activities their families engage in.
Have you noticed that some people in infosec simply have more success than others, however they may define success? Some people are simply more listened too, more prominent, make more of a difference, have more flexibility with work, more freedom, choices of the best projects, and yes, make more money. They are not just lucky. They make their luck. The most successful are not necessarily the most technical, although technical or "geek" skills are essential. They are an absolute must, and we naturally build technical skills through experience. They are essential, but not for Rock Star level success. The most successful, the Infosec Rock Stars, have a slew of other equally valuable skills, ones most people never develop nor even understand. They include skills such as self direction, communication, business understanding, leadership, time management, project management, influence, negotiation, results orientation, and lots more . . . Infosec Rock Star will start you on your journey of mastering these skills and the journey of moving toward Rock Star status and all its benefits. Maybe you think you can't be a Rock Star, but everyone can MOVE towards it and reap the benefits of vastly increased success. Remember, "Geek" will only get you so far . . .
Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don't require advanced (or even any) technical knowledge. In this book, cyber security expert, Dr. Eric Cole, provides a layman's look at how to protect yourself online. Dr. Cole makes the case that everyone is a potential target, not just the rich and famous. And we all have the ability to make it more difficult for cyber criminals to make us their next victim. He explains in plain language how to make your computer safer, protect your email, and guard your online accounts. Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet applies to organizations as well as individuals, and across professions. Doctors, lawyers, and teachers - anyone responsible for safeguarding a client's or student's data - will learn something they can use right away. Whether you're a parent wanting to know how to keep your children safe as they use the Internet, or a senior citizen who doesn't want to fall prey to an online scammer, or a daily technology user who wants to learn more about how to protect themselves in cyberspace, this book is for you.
Today, we live our lives-and conduct our business-online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments and best practices. But as you read this, there is a 70 percent chance that your data is compromised . . . you just don't know it yet. Cybersecurity attacks have increased exponentially, but because they're stealthy and often invisible, many underplay, ignore, or simply don't realize the danger. By the time they discover a breach, most individuals and businesses have been compromised for over three years. Instead of waiting until a problem surfaces, avoiding a data disaster means acting now to prevent one. In Cyber Crisis, Eric Cole gives readers a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience-as a professional hacker for the CIA, as the Obama administration's cybersecurity commissioner, and as a consultant to clients around the globe from Bill Gates to Lockheed Martin and McAfee-Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves. No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives-in healthcare and finance, for governments and private citizens-is both critical and vulnerable, and sooner or later, you or your company will be a target. This book is your guide to understanding the threat and putting together a proactive plan to minimize exposure and damage, and ensure the security of your business, your family, and your future.
The Secret Service, FBI, NSA, CERT (Computer Emergency Response
Team) and George Washington University have all identified Insider
Threats as one of the most significant challenges facing IT,
security, law enforcement, and intelligence professionals today.
|
You may like...
Fractal-Based Methods in Analysis
Herb Kunze, Davide La Torre, …
Hardcover
R2,715
Discovery Miles 27 150
Heat Transfers and Related Effects in…
Bernard Zappoli, Daniel Beysens, …
Hardcover
Mathematical Models of Tumor-Immune…
Amina Eladdadi, Peter Kim, …
Hardcover
|