Security Control Evaluation

Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center

Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center By Marshall Copeland
English | PDF,EPUB | 2017 | 217 Pages | ISBN : 1484227395 | 16.9 MB

Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective.

Complete Guide to Security and Privacy Metrics (repost)  eBooks & eLearning

Posted by arundhati at May 17, 2017
Complete Guide to Security and Privacy Metrics (repost)

Debra S. Herrmann, "Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI"
2007 | ISBN: 0849354021 | PDF | 848 pages | 10 MB

The Complete Cyber Security Course: Volume 1-4  eBooks & eLearning

Posted by FenixN at April 5, 2017
The Complete Cyber Security Course: Volume 1-4

The Complete Cyber Security Course: Volume 1-4
HDRips | MP4/AVC, ~3870 kb/s | 1920x1080 | Duration: 52 hours | English: AAC, 128 kb/s (2 ch) | 17.54 GB
Genre: Development / Programming / Security

Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cybercriminals and more.

The Complete Cyber Security Course : Hackers Exposed! [Reduced]  eBooks & eLearning

Posted by ParRus at March 27, 2017
The Complete Cyber Security Course : Hackers Exposed! [Reduced]

The Complete Cyber Security Course : Hackers Exposed!
WEBRip | English | MP4 + Project files | 1280 x 720 | AVC ~661 kbps | 30 fps
AAC | 192 Kbps | 48.0 KHz | 2 channels | 11:06:53 | 3.25 GB
Genre: Video Tutorial

Volume 1 : Learn how to stop hackers, prevent tracking, advanced anonymous browsing and counter government surveillance

Lynda - CISSP Cert Prep: 3 Security Engineering  eBooks & eLearning

Posted by U.N.Owen at Nov. 8, 2016
Lynda - CISSP Cert Prep: 3 Security Engineering

Lynda - CISSP Cert Prep: 3 Security Engineering
Size: 543 MB | Duration: 4h 20m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Advanced | Language: English

Certified Information Systems Security Professional (CISSP) is the gold standard in IT security certification.

The Complete Cyber Security Course : Hacking Exposed!  eBooks & eLearning

Posted by IrGens at Sept. 19, 2016
The Complete Cyber Security Course : Hacking Exposed!

The Complete Cyber Security Course : Hacking Exposed!
.MP4, AVC, 3800 kbps, 1920x1080 | English, AAC, 128 kbps, 2 Ch | 11 hours | 9.66 GB
Instructor:

Lynda - Learn VMware NSX: Security  eBooks & eLearning

Posted by U.N.Owen at July 18, 2016
Lynda - Learn VMware NSX: Security

Lynda - Learn VMware NSX: Security
Size: 242 MB | Duration: 1h 21m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

Making sure an organization's software-defined network is secure is the main concern for any organization looking to move to the cloud.
Mastering Project Management: Applying Advanced Concepts to Systems Thinking, Control & Evaluation, Resource... (repost)

Mastering Project Management: Applying Advanced Concepts to Systems Thinking, Control & Evaluation, Resource Allocation by James Lewis
English | 2007-08-13 | ISBN: 0071462910 | 464 pages | PDF | 9,1 MB

Information Security for the Rest of Us  eBooks & eLearning

Posted by AlenMiler at Oct. 20, 2015
Information Security for the Rest of Us

Information Security for the Rest of Us by CR3 CONCEPTS LLC
English | 12 Oct. 2015 | ASIN: B016L46D3Q | 526 Pages | True MOBI (Kindle)/(EPUB/PDF conv) | 10.56 MB

Why is an ISMS so important? With the high number of computer attacks growing in complexity, data centers need new and faster "sniffers" with alerts to make sure data traveling through the LAN / WAN are clean and free of malicious code…
Managing Information Security Risks: The OCTAVE (SM) Approach by Christopher Alberts [Repost]

Managing Information Security Risks: The OCTAVE (SM) Approach by Christopher Alberts
English | July 19, 2002 | ISBN: 0321118863 | 512 Pages | CHM | 4 MB

An information security risk evaluation helps organizations evaluate organizational practice as well as the installed technology base and to make decisions based on potential impact.