Book picks similar to
Introduction to Computer Networks and Cybersecurity by Chwan-Hwa Wu


1-cs-security
computer-networking
digital-security
non-fiction-computer-science

Cissp (Isc)2 Certified Information Systems Security Professional Official Study Guide


James Michael Stewart - 2003
    This comprehensive book will guide readers through CISSP exam topics, including: Access ControlApplication Development SecurityBusiness Continuity and Disaster Recovery PlanningCryptographyInformation Security Governance and Risk Management Legal, Regulations, Investigations and ComplianceOperations SecurityPhysical (Environmental) SecuritySecurity Architecture and DesignTelecommunications and Network SecurityThis study guide will be complete with 100% coverage of the exam objectives, real world scenarios, hands-on exercises, and challenging review questions, both in the book as well via the exclusive Sybex Test Engine.

Active Directory


Alistair G. Lowe-Norris - 2003
    Updated to cover Windows Server 2012, the fifth edition of this bestselling book gives you a thorough grounding in Microsoft's network directory service by explaining concepts in an easy-to-understand, narrative style.You'll negotiate a maze of technologies for deploying a scalable and reliable AD infrastructure, with new chapters on management tools, searching the AD database, authentication and security protocols, and Active Directory Federation Services (ADFS). This book provides real-world scenarios that let you apply what you've learned--ideal whether you're a network administrator for a small business or a multinational enterprise.Upgrade Active Directory to Windows Server 2012Learn the fundamentals, including how AD stores objectsUse the AD Administrative Center and other management toolsLearn to administer AD with Windows PowerShellSearch and gather AD data, using the LDAP query syntaxUnderstand how Group Policy functionsDesign a new Active Directory forestExamine the Kerberos security protocolGet a detailed look at the AD replication process

A MacKenzie Security Omnibus 1: Seduction and Sapphires, Shadows and Silk, Secrets and Satin, Sins and Scarlet Lace


Liliana Hart - 2019
     Bayleigh Scott has no idea who her new neighbor is, only that her body is drawn to him in ways she can’t explain, and the danger that surrounds him isn’t the deterrent she knows it should be. More than fireworks explode between Cade and Bayleigh when she discovers the real reason he relentlessly pursued her, but by then it’s too late, because she’s already been drawn into a deadly game of desire, deception and revenge. SHADOWS AND SILK Agent Brant Scott knows when a battle is lost. He’s been an integral part of hunting down members of the del Fuego cartel for years, but it’s not the violent criminals that have the ability to bring him to his knees. That honor belongs to one woman. And after spending a night in Darcy MacKenzie’s bed, he knows he has to disappear from her life or risk her finding out the one secret that can make her despise him forever. Darcy MacKenzie is hell on wheels. At least that’s what her brothers tell her. And when she has the chance to work with the elite team assigned to destroy the most dangerous drug cartel in the world, she jumps at the chance to lend her expertise by deciphering the Mayan hieroglyphs the cartel is using to send messages. The only problem is her partner is none other that Brant Scott—the only man she’s ever loved and the one who left her without a backward glance. With secrets of her own—and a body built for sin—Darcy is more than an equal match for the stubborn Brant. But loving each other could be more of a risk than either is willing to take. SECRETS AND SATIN No one knows heartbreak like Jade Jax. After losing her husband to a tragic death, she doesn’t believe love can happen twice. But after years of living a half-life without her husband, her body starts to waken again, and needs she’d forgotten come to the surface. Max Devlin never thought Jade would want him outside of his dreams, but fate plays a helping hand when they’re thrust into a high stakes mission, protecting each other’s backs like old times. Max decides he’s finally ready to end his bachelor ways, but he learns quickly that happily-ever-after isn't always possible. Because Jade has no desire to ever love again. Not when she knows how painful it can be. SINS AND SCARLET LACE Declan MacKenzie has loved the same woman for as long as he can remember, but after a mission early on in his career turns deadly, he realizes he can never have a wife or family and keep them safe. So he watches her marry another man. Sophia Huxley is involved in a nightmare. Her late husband has been labeled a traitor and he's made her the fall guy. There's no one she can call to prove her innocence. Except the man who broke her heart.

Shadow Force: Complete 5-Part Series


Camilla Blake - 2021
    No cliffhangers. Epic action, drama, suspense, clean romance, and happy ever afters. Highly rated authors.PART ONE: Shadow PromiseCade Montgomery will always carry the guilt for the men who died on his watch, and he will stop at nothing to find the people responsible. When Piper Collins, his former foster sister and the woman who stole his heart more than ten years ago, resurfaces, things get complicated.Piper Collins left the FBI after her fiancé died three years ago, to find his killer. That search leads her to Atlanta and back to Cade, the man who broke her heart when he left and never returned. When Cade meets with two men who are working for a known drug lord at the bar where she’s working undercover, Piper is disappointed to find he turned to a life of crime instead of being the man of conviction she used to know. But things aren’t adding up, and Piper hopes that, with his help, her fiancé’s killer will be brought to justice.PART TWO: Shadow SecretCruz Ortiz is no longer the man he used to be. After being taken hostage and almost beaten to death by a Venezuelan drug lord, Cruz joins Shadow Force with a new face, a new identity, and a death certificate for his old self. When Shadow Force is tasked with sending someone in undercover, Cruz is the obvious choice.Lydia Ayala is content with her life as a nurse practitioner in the slums of Miami. Sure, her patients tend to be gang members and drug dealers, but she’s confident she’s making a difference in the world. When she’s kidnapped and forced into a marriage, she plans to find a way out of the death sentence. But Cruz Ortiz keeps a watchful eye on her, and her chances to make a break are growing smaller, while the wedding is drawing closer.PART THREE: Shadow FlightRyder Blake is grateful Shadow Force scooped him up before he died a slow death at his desk at the CIA headquarters. After running for his life during a long-term undercover op, Ryder is convinced he’s put his clandestine days behind him. But when a large shipment of drugs and guns goes missing and the Russian Mafia boss who tried to have him killed is implicated, Ryder agrees to take on his old persona and enter a string of underground fights. Only, Jolie Phillips, the office manager for Shadow Force and a woman determined to be an operative, is assigned to the case with him, and Ryder is not a happy camper.A new organization comes to light as Ryder and Jolie travel around the southeast. As they get closer to the answers, the danger escalates, and Ryder and Jolie are running for their lives.PART FOUR: Shadow RescueFormer army and explosives expert Oscar Cortada is rumored to have one or two screws loose due to his infatuation with making things go Boom! But when he and the team stumble upon a container of women, Oscar is tormented by his memories. Oscar volunteers for the job to help Shadow Force uncover the missing people.Ivy Bell never stopped loving her husband while she pursued a career in acting and modeling. Still, after eleven years apart, it seemed they would never find their way back to each other. But when a new role opens up in Atlanta and Ivy arrives on set, she realizes things aren’t what they seem.PART FIVE: Shadow RedemptionLevi Slater has fought crime since his time with the DEA, but never before has he encountered a more evil and sinister group than the Los Caballeros del Camino, The Knights of the Way.Dr. Drew Bellamy has one objective: keep her son safe. But when she’s taken from outside her home and given an ultimatum, she finds herself scrambling and forcing her way out of captivity. When she runs smack into Levi Slater in the woods outside the compound where she was held, she faces a decision—trust him with her and her son’s life or go it alone.

Systems Analysis & Design in a Changing World


John W. Satzinger - 2000
    The Fourth Edition maintains the dual focus on the concepts and techniques from both the traditional, structured approach and the object-oriented approach to systems development. Instructors have the flexibility to emphasize one approach over the other, or both, while referring to one integrated case study that runs through every chapter.

McIntyre Security Bodyguard Series - Box Set 3


April Wilson - 2019
    They're married and expecting their first child. They've never been happier. A weekend getaway puts Beth in the wrong place at the wrong time, and all hell breaks loose, putting both Beth's life and her baby's life in mortal danger. When the unexpected happens, can Shane save his family? Can this alpha protector pull his wife back from the edge before it's too late? Hostage is book 7 in the McIntyre Security Bodyguard Series. It's a full-length novel (70,000 words) that ends in a wonderful HEA. Redeemed Annie Ten years ago, I made the biggest mistake of my life And I’ve paid the price every day since then, both in body and spirit Now I’m desperate, and the only man who can save me is the one I betrayed so long ago. I don’t deserve his forgiveness. He doesn’t owe me a thing. But like the hero he is, that won’t stop him from risking his life to save me…. even when I don’t deserve it. Jake My life ended the day Annie broke our engagement and married another man. I’ve been going through the motions ever since, unable to forget her. Unable to move on. I gave her my heart, and I don’t do give-backs, so she’s stuck with it, whether she wants it or not. When I find out she’s in danger, I’ll move Heaven and Earth to protect her, regardless of what it costs me. She doesn’t owe me a thing, but damn, I’ll go to my knees for her. For just one look, one touch, one word. Marry Me Lia McIntyre Lia's been with Jonah for nearly two years now. She loves her rock star boyfriend with a heart of gold. But deep down, she struggles with insecurity. She knows Jonah wants more with her, but she's afraid she can't live up to his expectations. And she thinks it's only a matter of time before he figures that out for himself. Jonah Locke Ever since leaving L.A. and his lucrative recording contract, Jonah Locke is thriving as an independent singer/songwriter. He's more popular than ever. He's living his dream, except for one small part. He wants to marry Lia. But every time he asks, she changes the subject. What's it going to take to get her to realize he's for real? Snowbound Fans of the McIntyre Security Bodyguard Series will love this new novella featuring Beth and Shane, as well as other favorites, including Luke, Sam, Cooper, Erin and Mack. This suspenseful Christmas novella will best be enjoyed as part of the series.

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

Ubuntu: The Beginner's Guide


Jonathan Moeller - 2011
     In the Guide, you'll learn how to: -Use the Ubuntu command line. -Manage users, groups, and file permissions. -Install software on a Ubuntu system, both from the command line and the GUI. -Configure network settings. -Use the vi editor to edit system configuration files. -Install and configure a Samba server for file sharing. -Install SSH for remote system control using public key/private key encryption. -Install a DHCP server for IP address management. -Install a LAMP server. -Install web applications like WordPress and Drupal. -Configure an FTP server. -Manage ebooks. -Convert digital media. -Manage and configure Unity, the default Ubuntu environment. -Manage and halt processes from the command line. -Set up both a VNC server and a client. -Enjoy games on Ubuntu. -And many other topics.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Stealing the Network: How to Own an Identity


Raven Alder - 2005
    Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

Cyberstrike: London


James Barrington - 2020
    7/7/2005: Ben Morgan, a cybersecurity specialist with the Metropolitan police, starts another day at work. It will be the last normal day he ever has.The Present: In Hong Kong, a crime overlord is offered a deal by shadowy agents from Beijing: his life for a new kind of operation in London. Morgan, now a part of an off the books cyber-terrorism prevention unit, must do everything to stop its spread.This is a new kind of war: different goals, tactics, rules, stakes. And Morgan is caught right in the centre... A pulse-pounding thriller rooted in reality, perfect for fans of Frederick Forsyth, Andy McNab and James Deegan.

Google+ for Business: How Google's Social Network Changes Everything


Chris Brogan - 2011
    Top social media consultant and Google+ early adopter Chris Brogan shows business people how to leverage its immense potential before their competitors even realize it's there.

Principles of Information Security


Michael E. Whitman - 2002
    Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.

OS X 10.10 Yosemite: The Ars Technica Review


John Siracusa - 2014
    Siracusa's overview, wrap-up, and critique of everything new in OS X 10.10 Yosemite.

Getting Started with OAuth 2.0


Ryan Boyd - 2011
    This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks.Understand OAuth 2.0’s role in authentication and authorizationLearn how OAuth’s Authorization Code flow helps you integrate data from different business applicationsDiscover why native mobile apps use OAuth differently than mobile web appsUse OpenID Connect and eliminate the need to build your own authentication system