Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Choose an application
Discover the next level of network defense and penetration testing with the Metasploit 5.0 framework
Choose an application
Penetration testing (Computer security) --- Computer networks --- Access control.
Choose an application
Penetration testing (Computer security) --- Computer networks --- Hacking. --- Security measures.
Choose an application
Automated vehicles. --- Automated vehicles --- Penetration testing (Computer security) --- Security measures.
Choose an application
Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: -What's the most important decision you've made or action you've taken to enable a business risk' -How do you lead your team to execute and get results' -Do you have a workforce philosophy or unique approach to talent acquisition' -Have you created a cohesive strategy for your information security program or business unit' Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.
Penetration testing (Computer security) --- Information technology --- Computer security. --- Computer networks --- Security measures --- Management. --- Security measures.
Choose an application
This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security lessons learned. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
Penetration testing (Computer security) --- Ethical hacking (Computer security) --- Computer security --- Electrical engineering. --- Computer security. --- Data structures (Computer science). --- Communications Engineering, Networks. --- Systems and Data Security. --- Data Structures and Information Theory. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electric engineering --- Engineering --- Protection --- Security measures --- Telecommunication. --- Data protection. --- Information theory. --- Data and Information Security. --- Communication theory --- Communication --- Cybernetics --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Information theory --- Telecommuting --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Listing 1 - 7 of 7 |
Sort by
|