Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led...
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book...
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that...
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three...
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a...
Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational...
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise...
Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood...
Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash...
Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth...