Security Integrator

Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS... (repost)

Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 by Barry L. Williams
English | 2013 | ISBN: 1466580585 | 152 pages | PDF | 3 MB
National Security, Surveillance and Terror: Canada and Australia in Comparative Perspective

National Security, Surveillance and Terror: Canada and Australia in Comparative Perspective (Crime Prevention and Security Management) by Randy K. Lippert
English | 3 Jan. 2017 | ISBN: 3319432427 | 348 Pages | PDF | 4.08 MB

This edited collection brings together leading scholars to comparatively investigate national security, surveillance and terror in the early 21st century in two major western jurisdictions, Canada and Australia.
Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016

Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016
Springer | 18 Nov 2016 | English | ISBN: 3319494449 | 444 pages | PDF | 27 Mb

International Trade and Food Security: The Future of Indian Agriculture  eBooks & eLearning

Posted by roxul at Dec. 10, 2016
International Trade and Food Security: The Future of Indian Agriculture

Pramod, "International Trade and Food Security: The Future of Indian Agriculture"
English | ISBN: 1780642822 | 2015 | 248 pages | PDF | 9 MB
Protecting Mobile Networks and Devices: Challenges and Solutions (Series in Security, Privacy and Trust)

Protecting Mobile Networks and Devices: Challenges and Solutions (Series in Security, Privacy and Trust) by Weizhi Meng
English | 5 Jan. 2017 | ISBN: 1498735835 | 332 Pages | PDF | 15.44 MB

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.

Private Investigation and Homeland Security  eBooks & eLearning

Posted by hill0 at Dec. 10, 2016
Private Investigation and Homeland Security

Private Investigation and Homeland Security by Daniel J. Benny
English | 30 Dec. 2016 | ISBN: 1498773974 | 198 Pages | PDF | 10.52 MB

The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.

Assessing and Mitigating Security Risks  eBooks & eLearning

Posted by naag at Dec. 10, 2016
Assessing and Mitigating Security Risks

Assessing and Mitigating Security Risks
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours 14M | 302 MB
Genre: eLearning | Language: English

The capacity to perform risk management is crucial for anyone hoping to defend their networks and resources. This course will teach you about risk policy, assessment, analysis, and mitigation of your networks.

Implementing a Security Assessment and Authorization Process  eBooks & eLearning

Posted by naag at Dec. 10, 2016
Implementing a Security Assessment and Authorization Process

Implementing a Security Assessment and Authorization Process
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 278 MB
Genre: eLearning | Language: English

This course teaches you how to approach reviewing the security of systems before introducing them to your environment and how to formally authorize systems. Both are key skills in the National Initiative for Cybersecurity Education framework.
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws (2nd Edition)

Marcus Pinto, "The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws (2nd Edition)"
English | 2011 | ISBN: 1118026470 | EPUB | 617 pages | 19.64 MB
Decision Support for Natural Disasters and Intentional Threats to Water Security

Decision Support for Natural Disasters and Intentional Threats to Water Security (NATO Science for Peace and Security Series C: Environmental Security) by Tissa Illangasekare
English | June 9, 2009 | ISBN: 9048127122 9048127114 | 258 Pages | PDF | 24 MB

The NATO Advanced Research Workshop, “Decision Support for Natural Disasters and Intentional Threats to Water Security” was the result of close collaboration between environmental, security, water resource, and health officials in the United States and Croatia. The premise of the Workshop is that multiple, disparate threats to water security exist, and that shared decision support structures provide effective means for avoiding and responding to potential or actual situations.