security

Principles of Information Security

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Readers will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally …

Learn more

Incident Response & Computer Forensics, Third Edition

The definitive guide to incident response–updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle …

Learn more

File System Forensic Analysis

The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques   Most digital evidence is stored within the computer’s file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference …

Learn more

The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build …

Learn more

@War: The Rise of the Military-Internet Complex

A surprising, page-turning account of how the wars of the future are already being fought todayThe United States military currently views cyberspace as the “fifth domain” of warfare (alongside land, air, sea, and space), and the Department of Defense, the National Security Agency, and the CIA all field teams of hackers who can, and do, launch computer virus strikes against enemy …

Learn more

Linux Forensics

Linux Forensics is the most comprehensive and up-to-date resource for those wishing to quickly and efficiently perform forensics on Linux systems. It is also a great asset for anyone that would like to better understand Linux internals. Linux Forensics will guide you step by step through the process of investigating a computer running Linux. …

Learn more

Cyberpower and National Security (National Defense University)

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National …

Learn more

Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world’s top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of …

Learn more

Password Keeper: A Password Journal Organizer (blue & brown floral)

Password KeeperFinally end your lost password frustrations with this pocket-sized password organizer. It’s a sleek and stylish password reminder book that has over 300 spots for logging important information. Whether you need it for work or home, this journal will organize all your logins, passwords, hints, security questions and more. There’s even additional log space for …

Learn more

Dropcam Pro Wi-Fi Wireless Video Monitoring Security Camera

Dropcam Pro Internet Wi-Fi Video Monitoring Cameras help you stay connected with what you love, no matter where you are. In less than a minute, you’ll have it set up and securely streaming high-definition video to you over your home Wi-Fi. Use it to watch your home, your baby, the dog or your small business. Every camera comes …

Learn more