Security & Encryption - Blowout Sale! Save up to 98%


Blowout Sale! Up to 98% off on Security & Encryption at Lit Blogger. Top brands include Course Technology, Microsoft, Ingramcontent, imusti, CreateSpace Independent Publishing Platform, Brand: CRC Press, Delmar Cengage Learning, Vpt, Jones & Bartlett Learning, Brand: Saunders, Opentask, Brand: Taylor Trade Publishing, Brand: Apress, & Rosen Classroom. Hurry! Limited time offers. Offers valid only while supplies last.



Computer Forensics: Investigating Network Intrusions and Cybercrime (CHFI), 2nd Edition
Computer Forensics: Investigating Network Intrusions and Cybercrime (CHFI), 2nd Edition
By Course Technology
In Stock
$74.95
$55.65
You Save: 26%

ean: 9781305883505, isbn: 1305883500,

4.8 out of 5 stars with 43 reviews
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of four books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation


Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World (Developer Best Practices)
Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World (Developer Best Practices)
By Microsoft
In Stock
$52.50

mpn: illustrations, ean: 9780735617223, isbn: 0735617228,

4.7 out of 5 stars with 60 reviews
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the


Official (ISC)2 Guide to the CISSP CBK, Fourth Edition ((ISC)2 Press)
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition ((ISC)2 Press)
By Ingramcontent
In Stock
$79.95
$51.93
You Save: 35%

mpn: 206 black & white illustrations, 81 blac, ean: 9781482262759, isbn: 1482262754,

4.7 out of 5 stars with 26 reviews
As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of


Hazard Mitigation in Emergency Management
Hazard Mitigation in Emergency Management
By imusti
In Stock
$99.95
$70.91
You Save: 29%

ean: 9780124201347, isbn: 0124201342,

4.6 out of 5 stars with 74 reviews
Hazard Mitigation in Emergency Management introduces readers to mitigation, one of the four foundational phases of emergency management, and to the hazard mitigation planning process. Authors Islam and Ryan review the hazard mitigation framework in both private sector and governmental agencies, covering the regulatory and legal frameworks for mitigation, as well as risk assessment processes and strategies, and tools and techniques that can prevent, or lessen, the impact of disasters. The book


Insider Threats Meet Access Control: Insider Threats Detected Using Intent-based Access Control (IBAC)
Insider Threats Meet Access Control: Insider Threats Detected Using Intent-based Access Control (IBAC)
By CreateSpace Independent Publishing Platform
In Stock
$14.99

ean: 9781539772019, isbn: 1539772012,

4.6 out of 5 stars with 113 reviews
Existing access control mechanisms are based on the concepts of identity enrollment and recognition, and assume that recognized identity is synonymous with ethical actions. However, statistics over the years show that the most severe security breaches have been the results of trusted, authorized, and identified users who turned into malicious insiders. Therefore, demand exists for designing prevention mechanisms. A non-identity-based authentication measure that is based on the intent of the


Security Awareness: Applying Practical Security in Your World
Security Awareness: Applying Practical Security in Your World
By Course Technology
In Stock
$113.95
$89.83
You Save: 21%

ean: 9781305500372, isbn: 1305500377,

4.0 out of 5 stars with 148 reviews
Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my


Critical Infrastructure: Homeland Security and Emergency Preparedness, Third Edition
Critical Infrastructure: Homeland Security and Emergency Preparedness, Third Edition
By Brand: CRC Press
In Stock
$104.95
$72.36
You Save: 31%

mpn: 3 black & white tables, ean: 9781466503458, isbn: 1466503459,

4.4 out of 5 stars with 11 reviews
Since the initial inception of this book, there have been significant strides to safeguard the operations of our world’s infrastructures. In recent years, there has also been a shift to more fluid postures associated with resilience and the establishment of redundant infrastructure. In keeping with the fast-changing nature of this field, Critical Infrastructure: Homeland Security and Emergency Preparedness, Third Edition has been revised and updated to reflect this shift in focus and to


Cybersecurity: The Essential Body Of Knowledge
Cybersecurity: The Essential Body Of Knowledge
By Delmar Cengage Learning
In Stock
$122.95
$59.39
You Save: 52%

mpn: 9781435481695, ean: 9781435481695, isbn: 1435481690,

4.6 out of 5 stars with 103 reviews
CYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization. In this unique book, concepts are not presented as stagnant theory; instead, the content is interwoven in a real world adventure story that runs throughout. In the story, a


Blockchain Applications: A Hands-On Approach
Blockchain Applications: A Hands-On Approach
By Vpt
In Stock
$85.00
$60.18
You Save: 29%

ean: 9780996025560, isbn: 0996025561,

4.0 out of 5 stars with 80 reviews
In the US, the services sector provides employment to about 100 million, while the manufacturing sector provides employment to about 20 million. These sectors are highly automated, and driven by sophisticated business processes forming an integral part of the digital economy. While the applications themselves may be distributed over the Internet in time and space, the core business, regulatory, and financial aspects of the digital economy are still centralized, with the need for centralized


System Forensics, Investigation, and Response (Information Systems Security & Assurance)
System Forensics, Investigation, and Response (Information Systems Security & Assurance)
By Jones & Bartlett Learning
In Stock
$99.95
$67.78
You Save: 32%

ean: 9781284121841, isbn: 1284121844,

4.7 out of 5 stars with 52 reviews
Revised and updated to address current issues and technology, System Forensics, Investigation, and Response, Third Edition provides a solid, broad grounding in digital forensics. The text begins by examining the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. Part II addresses the tools,


CompTIA Security+ Guide to Network Security Fundamentals, 6th edition
CompTIA Security+ Guide to Network Security Fundamentals, 6th edition
By Course Technology
In Stock
$195.95
$131.16
You Save: 33%

ean: 9781337288781, isbn: 1337288780,

4.1 out of 5 stars with 50 reviews
Mapped to the new CompTIA Security+ SY0-501 Certification Exam, best-selling COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, thoroughly prepares readers for professional certification and career success. The text covers threats, attacks, and vulnerabilities; technologies and tools for combating attacks, architecture, and design; identity and access management; risk management; and cryptography. It also includes expansive coverage of embedded device security, attacks and defenses,


Facility Coding Exam Review 2013: The Certification Step with ICD-9-CM
Facility Coding Exam Review 2013: The Certification Step with ICD-9-CM
By Brand: Saunders
In Stock
$86.95
$1.50
You Save: 98%

ean: 9781455722884, isbn: 145572288X,

4.0 out of 5 stars with 44 reviews
With the expert insight of leading coding educator Carol J. Buck, this complete exam review highlights the content you’ll need to master to pass the AHIMA CCS certification exam and take your coding career to the next step. CCS Coding Exam Review 2013: The Certification Step with ICD-9-CM features an easy-to-follow outline format that guides you through the anatomy, terminology, and pathophysiology for each organ system; reimbursement concepts; an overview of CPT, ICD-9-CM, and HCPCS coding;


Pattern-Oriented Memory Forensics: A Pattern Language Approach
Pattern-Oriented Memory Forensics: A Pattern Language Approach
By Opentask
In Stock
$30.00
$1.46
You Save: 95%

mpn: colour illustrations, ean: 9781908043764, isbn: 1908043768,

4.4 out of 5 stars with 54 reviews
This is a full-color transcript of a lecture which introduces a pattern language for memory forensics - investigation of past software behaviour in memory snapshots. It provides a unified language for discussing and communicating detection and analysis results despite the proliferation of operating systems and tools, a base language for checklists, and an aid in accelerated learning. The lecture has a short theoretical part and then illustrates various patterns seen in crash dumps by using


Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 3
Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 3
By CreateSpace Independent Publishing Platform
In Stock
$14.95
$1.39
You Save: 91%

mpn: black & white illustrations, ean: 9781519234742, isbn: 1519234740,

4.3 out of 5 stars with 21 reviews
As a crucial component of our Nation's critical infrastructure, the health sector is an obvious and wide open target for bad actors. Hackers, both state sponsored and mercenary have been effortlessly pummeling our health sector networks while organizations do little to stop them. A firewall and anti-virus software will do little to stop intruders yet little, if anything, is being done to create standards to thwart a breach. Cybersecurity-centric components must be included in the curriculum of


Safety Monitor: How to Protect Your Kids Online
Safety Monitor: How to Protect Your Kids Online
By Brand: Taylor Trade Publishing
In Stock
$14.95
$1.50
You Save: 90%

ean: 9781566251860, isbn: 1566251869,

4.8 out of 5 stars with 15 reviews
Safety Monitor provides hands-on, step-by-step, practical instruction for parents to protect their children from exploitation, sexual predators, adult-only content, pornography, and other harmful content that comes with computer and Internet access.Used Book in Good Condition.


Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .NET)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .NET)
By Brand: Apress
In Stock
$39.99
$0.98
You Save: 98%

ean: 9781590598078, isbn: 1590598075,

4.6 out of 5 stars with 21 reviews
If you work with identity solutions or structures, you will find Beginning Windows CardSpace: From Novice to Professional essential to understanding and successfully implementing CardSpace solutions. Topics range from a fundamental discussion of identity to comprehensive coverage of Windows CardSpace. You'll learn what CardSpace is all about, where you can and should use it, and how you would implement it. Additionally, multiple case studies showcase different scenarios where the technology is


Online Gaming Safety and Privacy (21st Century Safety and Privacy)
Online Gaming Safety and Privacy (21st Century Safety and Privacy)
By Rosen Classroom
In Stock
$12.95
$1.07
You Save: 92%

ean: 9781448895847, isbn: 1448895847,

4.8 out of 5 stars with 57 reviews
It is estimated that 97 percent of teens ages 12 to 17 play video games. And often these games are played online, allowing for interaction with gamers from across the globe. But this comes with a downside when cyberbullying and hacking come into play. This guide to safe online gaming is a valuable resource for any teen gamer, as well as his or her parents. Written by a gaming blogger and longtime game enthusiast, it covers all of the bases of gaming safety..



Viewing Page 1 of 1

View more products in Computers & Technology.
Feel free to Browse Our Catalog.



Privacy Policy / Terms of Service / Accessibility Statement
© 2019 - litblogger.org. All Rights Reserved.