🦃 Cozy up with autumn reads! Let our AI Librarian pick your perfect fireside book 🍁
Explore the literary world of this author
Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire acr...
Learn From the Experts Who Take Down Hackers
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you wha...
Securing Vista Against Malicious Attacks
It's not the computer. The hacker's first target is YOU! A dirty little secret that vendors don't want you to know is that good computer security does...
Preparing for the Day When Quantum Computing Breaks Today's Crypto
Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, d...
* Talks about hardening a Windows host before deploying Honeypot * Covers how to create your own emulated services to fool hackers * Discusses physica...
Virus Protection for Windows
Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly r...
Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products Educates re...
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware vi...
Covers Exams 70-270, 70-297, and 70-298
Overview, study guide, and practice exams for Microsoft Certified Systems Engineer (MCSE) core exams 70-270, 70-297, and 70-298....
...
Market_Desc: · Tech Professionals· Students in Computer Security Courses Special Features: · Exclusive coverage and in-depth analysis: step-by-step...