Network Security

Learning Ansible

Learning Ansible

Automation includes provisioning new servers, making sure the servers adhere to their role and maintain the desired state from a configuration perspective, and orchestrating various actions across environments and deploying code as expected to all these servers. This is where Ansible steps in. It is secure, highly reliable, and minimalistic … Read More »

Security and the Networked Society

Security and the Networked Society

This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and infor… Read More »

Getting an Information Security Job For Dummies

Getting an Information Security Job For Dummies

Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you’ve come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting … Read More »

Mobile Application Security

Mobile Application Security

Secure today’s mobile devices and applications Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA pl… Read More »

Learning Chef

Learning Chef

Get a hands-on introduction to the Chef, the configuration management tool for solving operations issues in enterprises large and small. Ideal for developers and sysadmins new to configuration management, this guide shows you to automate the packaging and delivery of applications in your infrastructure. You’ll be able to build (or rebuild) y… Read More »

Enterprise Cybersecurity Study Guide

Enterprise Cybersecurity Study Guide

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program … Read More »

Computer, Network, Software, and Hardware Engineering with Applications

Computer, Network, Software, and Hardware Engineering with Applications

There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex computer and systems. Books on software engineering typically portray software… Read More »

Mastering Zabbix

Mastering Zabbix

Monitoring systems are a crucial part of any IT environment. They can be extremely useful not only to identify specific problems, but also to measure your system’s performance and find the best way to improve it. However, they can be misleading and confusing if not correctly configured and managed. False alarms and missing data can und… Read More »

Cisco Next-Generation Security Solutions

Cisco Next-Generation Security Solutions

Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network security experts introduce these products and solutions, and offer expert guidance fo… Read More »

Implementing SSL / TLS Using Cryptography and PKI

Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a… Read More »

Configuration Management with Chef-Solo

Configuration Management with Chef-Solo

Chef is a configuration management tool used to handle the hardest part of infrastructure, easing the deployment of servers and applications to any infrastructure. Chef-Solo is an open source version of the chef-client that allows you to use cookbooks with nodes, without requiring access to a Chef server. In any infrastructure, managing serv… Read More »

Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations

Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company operations is a board-level discussion. Across all industries, companies are… Read More »

The Network Security Test Lab

The Network Security Test Lab

The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing proce… Read More »

Network Attacks and Exploitation

Network Attacks and Exploitation

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and secu… Read More »

Network Security Through Data Analysis, 2nd Edition

Network Security Through Data Analysis, 2nd Edition

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your net… Read More »


Request IT ebooks HERE!!!