Cybersecurity: Current Writings on Threats and Protection
PDF
Cybersecurity: Current Writings on Threats and Protection

Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk. This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of stat...

FISMA Principles and Best Practices: Beyond Compliance
PDF
FISMA Principles and Best Practices: Beyond Compliance

While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approach for establishing and implementing a comprehensive information security program, FISMA Pr...

A Year With Symfony: Writing healthy, reusable Symfony2 code
PDF
A Year With Symfony: Writing healthy, reusable Symfony2 code

I've written A Year With Symfony for you, a developer who will work with Symfony2 for more than a month (and probably more than a year). You may have started reading your way through the official documentation ("The Book"), the cookbook, some blogs, or an online tutorial. You know now how to create a Symfony2 application, with routing, controllers, entities or documents, Twig templates and maybe some unit tests. But after these basic...

Complete Guide to CISM Certification
PDF
Complete Guide to CISM Certification

The Certified Information Security Manager®(CISM®) certification program was developed by the Information Systems Audit and Controls Association (ISACA®). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM® Certification examines five functional areas―security governance, risk management, information security p...

The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence
PDF
The Threat Intelligence Handbook

It's easy to find descriptions of what threat intelligence is. But it's harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This book answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challe...

2010 Standard Catalog of® Firearms
PDF
2010 Standard Catalog of® Firearms

"Standard Catalog of" Firearms is a uniquely valuable resource. Hobbyists, dealers, shooters, hunters and private collectors have all come to rely on it for pricing and identification. Readers can use it to identify antique, collectible, vintage and modern firearms, refer to it for completely updated pricing and read it for collecting tips and techniques. It includes over 25,000 model listings that will allow readers to buy and sell ...

How to Build a Cyber-Resilient Organization
PDF
How to Build a Cyber-Resilient Organization

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment. This revolves arou...

The "Gun Digest" Book of Tactical Gear
PDF
The "Gun Digest" Book of Tactical Gear

The Gun Digest Book of Tactical Gear is the complete tactical gear reference, with complete listings of knives, flashlights, vests, tactical sights and optics and more, with select firearms and other weapons covered with the applicable gear. This everything guide includes: Articles from the top experts in the field A detailed where to find the gear guide Catalog listings of items covered

Microsoft Encyclopedia of Security
PDF
Microsoft Encyclopedia of Security

As a new student to the realm of security I've been hit hard with new terminology and after a while sometimes I find it hard to rememberr what an acronym stands for or what it means. This book makes it easy to look it up quickly for a refresher without having to flip through various books or search the internet. Great if you are a student like myself and working late at night cramming for an exam and you can't remember what PFS stand...