Hacking Web Intelligence

Hacking Web Intelligence

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift...

Managing Cisco Network Security

Managing Cisco Network Security

Developed for IT professionals, this text details the strategies, tactics, and methods for designing, configuring, and maintaining Cisco Secure networks....

Investigating Internet Crimes

Investigating Internet Crimes

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they...

Identity and Access Management

Identity and Access Management

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan,...

Cloud Storage Forensics

Cloud Storage Forensics

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have...

Social Media Security

Social Media Security

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society....

Network and System Security

Network and System Security

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide...

Managing Information Security

Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems,...

FISMA Compliance Handbook

FISMA Compliance Handbook

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what...