Book picks similar to
Exam 98-366: Mta Networking Fundamentals by MOAC (Microsoft Official Academic Course)
computer
ms
reference
specialist-books
Incognito Toolkit - Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online
Rob Robideau - 2013
With laws getting stricter by the day and making it more and more difficult to properly protect your personal information, you need the most up-to-date information and tools available and that's what you will find in Incognito Toolkit! Don't let snoopers, investigators, and scammers look over your shoulder or track you while you work and play on the internet! Learn about the tools that will help you use the internet anonymously, privately, and securely to protect assets, avoid social stigmas, and make you safer. This book is full of information that large corporations, scammers, and nosy governments don't want you to find! You won't find a collection of techniques and creative methods like this anywhere else! Covered in Incognito Toolkit: - Making truly anonymous online purchases - Shortcomings of Bitcoin - Encrypting communications - Encryption for online file storage solutions - Locking down and monitoring your hardware - Browser Fingerprinting - Using TOR and VPNs - Creative Text and File Steganography Techniques - Critical Techniques for Publishing Anonymously - Cleaning photo and video metadata - Dealing with tracking cookies Updated December 4th, 2013 with new information about credit card skimmers, TOR hardware devices, and more!
Scroll up and click the "Look Inside" feature on the top left hand side of the page!
CISSP Study Guide
Eric Conrad - 2010
The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.
The Mac is Not a Typewriter
Robin P. Williams - 1989
Best-selling author Robin Williams's simple, logical principles for using type to produce beautiful, professional documents are as true now as they were when the original edition was published in 1989. This updated edition includes new examples and expanded information dedicated to the practical advice that made the first edition an enduring bestseller. Throughout, Robin shows you the small details that separate the pros from the amateurs: typographer versus typewriter quotation marks, en and em dashes, tabs and indents, kerning, leading, white space, widows and orphans, and hanging punctuation. If you prepare documents, you'll find The Mac is not a typewriter, Second Edition an indispensable guide. And those who read your documents will recognize the work of a pro, even if they don't know a curly quote from curly fries.