877.791.9571 |

About the Author:


Cryptography, Chapter 7

Excerpted from CISSP All-in-One Exam Guide, 6th Edition by Shon Harris (McGraw-Hill; 2013) with permission from McGraw-Hill.

Shon Harris, CISSP, MCSE, is the founder and CEO of Shon Harris Security LLC and Logical Security LLC, a […]


Security Automation Essentials

Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP provides IT security managers in both government agencies and private organizations with full details on the capabilities of […]


Reverse Deception

This book shows how to assess a network’s vulnerabilities, zero in on targets, and effectively block intruders. Using the tested security techniques and real-world case studies featured in this […]


Hacking Exposed 7: Network Security Secrets & Solutions

The expert advice and defense strategies from the world-renowned Hacking Exposed team shows IT security pros how to bolster their system’s security and defeat the tools and tactics of […]


Computer Incident Response Planning

See the McGraw Hill excerpt: Computer Incident Response Planning here:

Author bio:
N.K. McCarthy has more than 20 years of experience in the IT sector, most recently managing the information security […]


Chapter 5: CRPD & Security

In Wireless Network Security: A Beginner’s Guide, author Tyler Wrightson discusses the many attack vectors that target wireless networks and clients, and explains how to identify and prevent them. Actual […]


Social Media Security

Excerpted from Securing the Clicks: Network Security in the Age of Social Media by Gary Bahadur, Jason Inasi, Alex de Carvalho (McGraw-Hill; 2012) with permission from McGraw-Hill.

Securing the Clicks serves as a practical guidebook for […]

MH1 sullivan0071776168

Book Excerpt: Web Application Security, A Beginner’s Guide

Web Application Security: A Beginner’s Guide provides IT professionals with an actionable, rock-solid foundation in Web application security–from a complete overview of the tools and resources essential to Web […]