Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inside Network Security Assessment: Guarding Your IT Infrastructure

Buy
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the International Information Systems Security Certification Consortium, this book was developed with the goal of being a text for the CISSP continuing education class on Network Security Assessment. You will be provided with step-by-step training on assessing security, from paperwork to penetration testing to ethical hacking. The supporting website will also provide you with access to a variety of tools, checklists, and templates to make your job even easier. You'll save everyone time and money by learning to perform security assessments yourself with the help of Inside Network Security Assessment.

About author

Michael Gregg is the president of Superior Solutions, Inc., a Houston-based security assessment and training firm. He has more than 20 years of experience in the IT field. He holds two associate's degrees, a bachelor's degree, and a master's degree. Some of the certifications he maintains are the following: CISSP, MCSE, CCNA, CTT+, A+, N+, Security+, CIW Security Analyst, CEH, NSA IAM, SCNP, DCNP, CCE, and TICSA.

David Kim, B.S.E.E., is the Senior Vice President and Chief Operating Officer of Security Evolutions, Inc. (SEI) and former Chief Operating Officer of (ISC)2 Institute. SEI specializes in IT security training, IT security consulting services, and IT security development. David is responsible for leading the vision of SEI's information security products and services portfolio and managing the day-to-day operations for SEI's P&L Business Units.
(HTML tags aren't allowed.)

Introduction to Search Engine Optimization: A Guide for Absolute Beginners
Introduction to Search Engine Optimization: A Guide for Absolute Beginners
Don't be intimidated by all the search engine optimization (SEO) tools out there. You will start out learning about keywords and the importance of quality content and then walk through incremental steps as you try out the tools and master the tips and strategies. If you are completely new to search engine optimization and you want...
Baker's Biographical Dictionary of Popular Musicians Since 1990 Edition 1.
Baker's Biographical Dictionary of Popular Musicians Since 1990 Edition 1.
Reference & Research Book News : "The two volumes follow the 2001 expansion of Baker's Biographical Dictionary of Musicians and offer 583 approximately one-page profiles of bands and individual artists working in all popular musical genres - from electronica and hip hop to heavy metal, country, and world music. "...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...


Global Distributed Applications With Windows DNA (Artech House Computing Library)
Global Distributed Applications With Windows DNA (Artech House Computing Library)
Provides a full description of the Microsoft Windows Distributed Internet Applications Architecture (DNA), its purpose, and its proper use for Internet applications development. DLC: Microsoft Windows (Computer file).

Welcome to Global Distributed Applications With Windows DNA. You have probably made a number of assumptions simply by
...
A Field Guide to Wireless LANs for Administrators and Power Users
A Field Guide to Wireless LANs for Administrators and Power Users
  • Deploy, manage, and troubleshoot any wireless LAN ... home or business
  • WLAN technology for non-experts: clear, accurate, easy
  • Proven quick-start configurations for Windows®, and Linux®, and MacOS®
  • No-hassle wireless security solutions
  • Covers IEEE 802.11a, 802.11b,...
Managing Startups: Best Blog Posts
Managing Startups: Best Blog Posts

If you want salient advice about your startup, you’ve hit the jackpot with this book. Harvard Business School Professor Tom Eisenmann annually compiles the best posts from many blogs on technology startup management, primarily for the benefit of his students. This book makes his latest collection available to the broader...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy