Cybersecurity Information

Cybersecurity Information Gathering using Kali Linux  eBooks & eLearning

Posted by AlenMiler at March 1, 2016
Cybersecurity Information Gathering using Kali Linux

Cybersecurity Information Gathering using Kali Linux by Tim Scott
English | Feb. 2, 2016 | ASIN: B01BFMJHFK | 90 Pages | AZW3/MOBI/EPUB/PDF (conv) | 11.02 MB

This is a beginner’s book, to explain what cybersecurity information gathering (reconnaissance) is, and how to use this knowledge to improve the security of your data and programs.

Personal Cybersecurity: How to Avoid and Recover from Cybercrime  eBooks & eLearning

Posted by arundhati at Jan. 20, 2017
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Marvin Waschke, "Personal Cybersecurity: How to Avoid and Recover from Cybercrime"
2017 | ISBN-10: 1484224299 | 240 pages | PDF | 4 MB

Cybersecurity, Cyberanalysis and Warning (repost)  eBooks & eLearning

Posted by interes at Jan. 14, 2017
Cybersecurity, Cyberanalysis and Warning (repost)

Cybersecurity, Cyberanalysis and Warning by Kerry T. Norwood , Sandra P. Catwell
English | 2009 | ISBN: 1606926586 | 117 pages | PDF | 2 MB

Assessment of Current Cybersecurity Practices in the Public Domain  eBooks & eLearning

Posted by AlenMiler at Dec. 31, 2016
Assessment of Current Cybersecurity Practices in the Public Domain

Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain by Sandia National Laboratories
English | 30 Dec. 2016 | ISBN: 1541296052 | 50 Pages | PDF (True) | 479.81 KB

This report assesses current (public domain) cyber security practices with respect to cyber indications and warnings.

Accounting Information Systems and Cyber Security: Stay ahead of the technology curve  eBooks & eLearning

Posted by AlenMiler at Dec. 22, 2016
Accounting Information Systems and Cyber Security: Stay ahead of the technology curve

Accounting Information Systems and Cyber Security: Stay ahead of the technology curve by Y.K. Wong-Steele Ph.D.
English | 18 Dec. 2016 | ASIN: B01N5H39G7 | 46 Pages | AZW3/MOBI/EPUB/PDF (conv) | 1.31 MB

With fast growth in information technologies, as well as an increasing number of mobile and wireless devices and services, the need to address vulnerabilities has been highly prioritized by many large corporations, as well as small and medium companies.

How to Measure Anything in Cybersecurity Risk  eBooks & eLearning

Posted by interes at Dec. 14, 2016
How to Measure Anything in Cybersecurity Risk

How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard and Richard Seiersen
English | 2016 | ISBN: 1119085292 | 304 pages | EPUB | 4 MB

Cybersecurity Illustrated: Just the Essentials (in just 2 hours)  eBooks & eLearning

Posted by AlenMiler at Dec. 14, 2016
Cybersecurity Illustrated: Just the Essentials (in just 2 hours)

Cybersecurity Illustrated: Just the Essentials (in just 2 hours) by Peter Kim
English | 11 Dec. 2016 | ASIN: B01MTZY6U2 | 182 Pages | AZW3/MOBI/EPUB/PDF (conv) | 4.51 MB

This book is for IT security professionals who have tried to use ISO 27002 and NIST SP 800-53, or compliance standards to start an IT security program but found them too generic and abstract to get started.

Cybersecurity and Cyberwar: What Everyone Needs to Know (Repost)  eBooks & eLearning

Posted by roxul at Dec. 3, 2016
Cybersecurity and Cyberwar: What Everyone Needs to Know (Repost)

P.W. Singer, Allan Friedman, "Cybersecurity and Cyberwar: What Everyone Needs to Know"
2014 | ISBN: 0199918112, 0199918090 | English | 320 pages | PDF, EPUB | 3 MB

Coursera - Building an Information Risk Management Toolkit  eBooks & eLearning

Posted by ParRus at Nov. 6, 2016
Coursera - Building an Information Risk Management Toolkit

Coursera - Building an Information Risk Management Toolkit
WEBRip | English | MP4 + PDF Guides | 960 x 540 | AVC ~119 kbps | 29.970 fps
AAC | 128 Kbps | 44.1 KHz | 2 channels | Subs: English (.srt) | 13:15:24 | 1.89 GB
Genre: eLearning Video / Information Technology, Computer Security, Risk

In this course, you will explore several structured, risk management approaches that guide information security decision-making. Course topics include: developing and maintaining risk assessments (RA); developing and maintaining risk management plans (RM); regulatory and legal compliance issues affecting risk plans; developing a control framework for mitigating risks; risk transfer; business continuity and disaster recovery planning from the information security perspective.

Hack-Proof Your Life Now!: The New Cybersecurity Rules  eBooks & eLearning

Posted by AlenMiler at Oct. 27, 2016
Hack-Proof Your Life Now!: The New Cybersecurity Rules

Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect your email, computers, and bank accounts from hacks, malware, and identity theft by Sean M. Bailey
English | 25 Oct. 2016 | ASIN: B01LXP4Q7O | 172 Pages | PDF | 955.81 KB

Everyone is vulnerable to a cyber attack. Regardless of your age and station in life, one simple click of the mouse can open a Pandora's Box few of us could have imagined even five years ago.