Category: Security & Encryption

IT Audit Field Manual 0

IT Audit Field Manual

eBook Details: Paperback: 336 pages Publisher: WOW! eBook (September 13, 2024) Language: English ISBN-10: 1835467938 ISBN-13: 978-1835467930 eBook Description: IT Audit Field Manual: Strengthen your cyber defense through proactive IT auditing. Master effective IT auditing techniques, from security control reviews to advanced cybersecurity practices, with this essential field manual. As cyber threats evolve and regulations tighten, IT professionals struggle to maintain effective auditing practices and ensure robust cybersecurity across complex systems. Drawing from over a decade of submarine military service and extensive cybersecurity experience, Lewis offers a unique blend of technical expertise and field-tested insights in this comprehensive field manual. Serving as a...

Mastering Microsoft Defender for Office 365 0

Mastering Microsoft Defender for Office 365

eBook Details: Paperback: 426 pages Publisher: WOW! eBook (September 13, 2024) Language: English ISBN-10: 1835468284 ISBN-13: 978-1835468289 eBook Description: Mastering Microsoft Defender for Office 365: Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting. Unlock the full potential of Microsoft Defender for Office 365 with this comprehensive guide, covering its advanced capabilities and effective implementation strategies. Navigate the “security Wild West” with Microsoft Defender for Office 365, your shield against the complex and rapidly evolving cyber threats. Written by a cybersecurity veteran with 25 years of experience, including combating nation-state adversaries and organized cybercrime gangs, this book...

The Developer’s Playbook for Large Language Model Security: Building Secure AI Applications 0

The Developer’s Playbook for Large Language Model Security

eBook Details: Paperback: 200 pages Publisher: WOW! eBook (October 15, 2024) Language: English ISBN-10: 109816220X ISBN-13: 978-1098162207 eBook Description: The Developer’s Playbook for Large Language Model Security: Building Secure AI Applications Large language models (LLMs) are not just shaping the trajectory of AI, they’re also unveiling a new era of security challenges. This The Developer’s Playbook for Large Language Model Security practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. With this...

Incident Response for Windows 0

Incident Response for Windows

eBook Details: Paperback: 244 pages Publisher: WOW! eBook (August 23, 2024) Language: English ISBN-10: 1804619329 ISBN-13: 978-1804619322 eBook Description: Incident Response for Windows: Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems. Get to grips with modern sophisticated attacks, their intrusion life cycles, and the key motivations of adversaries, and build the most effective cybersecurity incident preparedness, response, remediation, and prevention methodologies. Cybersecurity incidents are becoming increasingly common and costly, making incident response a critical domain for organizations to understand and implement. This Incident Response for Windows book enables you to effectively detect, respond to, and prevent cyberattacks on Windows-based systems by...

DevSecOps for Azure 0

DevSecOps for Azure

eBook Details: Paperback: 342 pages Publisher: WOW! eBook (August 28, 2024) Language: English ISBN-10: 1837631115 ISBN-13: 978-1837631117 eBook Description: DevSecOps for Azure: End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud. Gain holistic insights and practical expertise in embedding security within the DevOps pipeline, specifically tailored for Azure cloud environments. Businesses must prioritize security, especially when working in the constantly evolving Azure cloud. However, many organizations struggle to maintain security and compliance. Attackers are increasingly targeting software development processes, making software supply chain security crucial. This includes source control systems, build systems, CI/CD platforms, and various artifacts. With the help...