Library

Explore 200,000 online courses/books/problem sets in over 2,050 subjects. From Computer Science, Business, and Personal Development to Arts, STEM, and more. Find your perfect MOOC.

Library

Learning Product
Subject
Difficulty
Cost
Certificate
Provider
Publisher
University
Institution
Tag

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks

Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks...

Books Wiley 💰 Information Security

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks

Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security...

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity professionCybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of...

Books Wiley 💰 Information Security

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity professionCybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding...

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

A step-by-step guide to identifying and defending against attacks on the virtual environmentAs more and more data is moved into virtual environments the need to secure them becomes increasingly...

Books Wiley 💰 Information Security

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

A step-by-step guide to identifying and defending against attacks on the virtual environmentAs more and more data is moved into virtual environments the need to secure them becomes...

Cyber Security Policy Guidebook

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security...

Books Wiley 💰 Information Security

Cyber Security Policy Guidebook

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber...

The Web Application Hacker's Handbook, 2nd Edition

The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose personal...

Books Wiley 💰 Information Security

The Web Application Hacker's Handbook, 2nd Edition

The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose...

Cyberwar and Information Warfare

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare.The aim...

Books Wiley 💰 Information Security

Cyberwar and Information Warfare

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare.The...

Information Security: Principles and Practice, 2nd Edition

Now updated—your expert guide to twenty-first century information securityInformation security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex...

Books Wiley 💰 Information Security

Information Security: Principles and Practice, 2nd Edition

Now updated—your expert guide to twenty-first century information securityInformation security is a rapidly evolving field. As businesses and consumers become increasingly dependent on...

Implementing SSL/TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet securityIf you are a network professional who knows C programming, this practical book is for you. Focused on how to...

Books Wiley 💰 Information Security

Implementing SSL/TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet securityIf you are a network professional who knows C programming, this practical book is for you. Focused on how...

Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's securityMost IT security teams concentrate on keeping networks and systems safe from attacks from the...

Books Wiley 💰 Information Security

Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's securityMost IT security teams concentrate on keeping networks and systems safe from attacks from...

Security in a Web 2.0+ World: A Standards-Based Approach

Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust.Security for a Web 2.0+ World looks at the perplexing...

Books Wiley 💰 Information Security

Security in a Web 2.0+ World: A Standards-Based Approach

Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust.Security for a Web 2.0+ World looks at the...

Computer Security Handbook, Fifth Edition

The classic and authoritative reference in the field of computer security, now completely updated and revised.With the continued presence of large-scale computers; the proliferation of desktop,...

Books Wiley 💰 Information Security

Computer Security Handbook, Fifth Edition

The classic and authoritative reference in the field of computer security, now completely updated and revised.With the continued presence of large-scale computers; the proliferation of...

Schneier on Security

Presenting invaluable advice from the world's most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths...

Books Wiley 💰 Information Security

Schneier on Security

Presenting invaluable advice from the world's most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the...

Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The...

Books Wiley 💰 Information Security

Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security....

Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The...

Books Wiley 💰 Information Security

Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security....

Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The...

Books Wiley 💰 Information Security

Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security....

Wireless Security Architecture

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutionsWireless Security Architecture: Designing and Maintaining Secure Wireless for...

Books Wiley 💰 Information Security

Wireless Security Architecture

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutionsWireless Security Architecture: Designing and Maintaining Secure Wireless...

Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each...

Books Wiley 💰 Information Security

Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates...

Software Transparency

Discover the new cybersecurity landscape of the interconnected software supply chainIn Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran...

Books Wiley 💰 Information Security

Software Transparency

Discover the new cybersecurity landscape of the interconnected software supply chainIn Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of...

Blue Fox

Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devicesFinding and mitigating security...

Books Wiley 💰 Information Security

Blue Fox

Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devicesFinding and mitigating...

Project Zero Trust

Implement Zero Trust initiatives efficiently and effectivelyIn Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern...

Books Wiley 💰 Information Security

Project Zero Trust

Implement Zero Trust initiatives efficiently and effectivelyIn Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at...

Records : 41100 of 72640 | Page : of 3632