File Size: 779 KB
Print Length: 120 pages
Publisher: Institute of Information Security (December 24, 2014)
Publication Date: December 24, 2014
Sold by: Digital Services LLC
Language: English
ASIN: B00QD2FZWM
Text-to-Speech: Enabled
X-Ray: Not Enabled
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Not Enabled
Best Sellers Rank: #689,755 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #178 in Books > Computers & Technology > Security & Encryption > Viruses #654 in Books > Computers & Technology > Internet & Social Media > Hacking #11861 in Kindle Store > Kindle eBooks > Computers & Technology
This is a very comprehensive title that arms IT Security managers with a framework required to properly manage a security organization. Highly recommended.
Hackers vs. Security Pros: A Security Manager's Playbook (The CTO Playbook 1) The Ultimate Guide to WordPress Security: Secure and protect your WordPress website form hackers and protect your data, get up to date security updates Framing Floors Walls Ceilings (For Pros By Pros) Smart Business for Contractors: A Guide to Money and the Law (For Pros By Pros) Bathroom Remodeling (For Pros By Pros) Plumbing (For Pros By Pros) Framing Roofs (For Pros By Pros) Building with Masonry: Brick, Block & Concrete / For Pros by Pros Web Services, Service-Oriented Architectures, and Cloud Computing: The Savvy Manager's Guide (The Savvy Manager's Guides) System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager (SCCM) Unleashed The Government Manager's Guide to Source Selection (The Government Manager's Essential Library Book 2) CCM Certification Study Guide 2015-2016: Case Manager's Review Book for the Certified Case Manager Exam Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Hackers & Painters: Big Ideas from the Computer Age Hackers and Painters: Big Ideas from the Computer Age Black Hat Python: Python Programming for Hackers and Pentesters Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics) Network Forensics: Tracking Hackers through Cyberspace Design for Hackers: Reverse Engineering Beauty