Bookshelf
-
Book excerpt: Data mesh increases data access and value
Zhamak Dehghani, a pioneer in data mesh technology, discusses how the concept decentralizes data to improve data-related decision-making and value in her book. Continue Reading
-
How to apply and edit Wireshark display filters
Wireshark display filters enable users to narrow the scope of a network traffic scan. Use this tutorial to apply and edit display filters to make detailed network sniffing easier. Continue Reading
-
Customize workflows with Wireshark profiles
Wireshark has a variety of uses, which is why creating multiple personalized Wireshark profiles is important. Learn about Wireshark profiles, how to share them and more. Continue Reading
-
Digital transformations require empathy
Agility, experimentation and empathy are critical drivers to a successful digital transformation. Learn why IT leaders should focus on these three critical skills. Continue Reading
-
9 practice questions on twisted-pair network cables
Take this practice quiz on twisted-pair cables, sampled from 'Networking Essentials: A CompTIA Network+ N10-008 Textbook,' to test your understanding for the certification exam. Continue Reading
-
An introduction to twisted-pair cable wiring
This excerpt from 'Networking Essentials: A CompTIA Network+ N10-008 Textbook' provides an overview of twisted-pair network cables and acts as a study tool for the exam. Continue Reading
-
Considerations for configuring twisted-pair cables
In this Q&A, author Jeffrey Beasley discusses what students who plan to take the CompTIA Network+ exam should know about twisted-pair cables, from configuration to troubleshooting. Continue Reading
-
How AI serves as a cornerstone of Industry 4.0
For manufacturing environments to be included in Industry 4.0, they must adopt up-to-date technologies to improve operations. AI should be foremost among them. Continue Reading
-
How companies can avoid a poor candidate experience
In a competitive job market, companies must learn how to avoid a poor candidate experience. Here are some best practices to follow. Continue Reading
-
10 open source coding books to read in 2023
Open source technology and programming languages are the foundation of modern software development. Use these books to take advantage of all that open source software has to offer. Continue Reading
-
How recruiters can reject candidates respectfully
How recruiters reject job candidates can make a huge difference in a candidate's feelings towards a company. Learn some ways that recruiters can improve the rejection process. Continue Reading
-
Inside the PEIR purple teaming model
Want to try purple team exercises but aren't sure how to do so? Try the 'Prepare, Execute, Identify and Remediate' purple teaming model. Continue Reading
-
Understanding purple teaming benefits and challenges
Blue teams and red teams are coming together to form purple teams to improve their organization's security posture. What does this mean for the rivals? And how does it work? Continue Reading
-
4 types of employee reactions to a digital transformation
The success of a digital transformation project depends on employee buy-in. Discover how organizations can address employee reactions to digital transformation. Continue Reading
-
10 important components of SDN controllers
SDN controller features include modularity, APIs, clustering and GUIs. Read more in this chapter excerpt from 'SDN-Supported Edge-Cloud Interplay for Next Generation Internet of Things.' Continue Reading
-
When REST API design goes from helpful to harmful
REST may be a somewhat non-negotiable standard in web API development, but has it fostered overreliance? Learn why other design styles could -- and should -- get an equal chance. Continue Reading
-
FinOps model eases cloud billing complexities
Cloud cost management is a top priority on admin's minds. FinOps expert Mike Fuller talks about cloud billing challenges and how to overcome them in this Q&A. Continue Reading
-
How common is commonsense AI?
'Machines like Us' co-author Ron Brachman explains what it would take to build common sense into AI systems and the benefits of doing so. Continue Reading
-
How to configure Windows privacy settings with Intune
To personalize UX, Windows devices aren't shy about collecting user data. This isn't ideal for enterprise security. Discover how to lock down privacy settings with Intune. Continue Reading
-
Windows security tips for the enterprise
Securing a Windows environment is no easy feat. Read up on low-hanging fruit to quickly address, as well as top tips from two security practitioners to get started. Continue Reading
-
Understanding Azure Virtual Desktop management and storage
In this Q&A, author Ryan Mangan discusses best practices for Azure Virtual Desktop management, the importance of storage and more from his book, 'Mastering Azure Virtual Desktop.' Continue Reading
-
8 coding books to read in 2023
Coding books are a great learning resource for developers of all skill levels and backgrounds, offering authoritative and comprehensive coverage of a specific topic area. Continue Reading
-
Test your Azure Virtual Desktop storage management skills
Use these questions to test how well you know the best practices for managing Azure Virtual Desktop storage. Continue Reading
-
Cisco collaboration study guide for 350-801 CLCOR exam
Learn the basics of Cisco collaboration products and how to deploy collaboration tools in this excerpt from 'CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide.' Continue Reading
-
Cisco collaboration 350-801 CLCOR practice test questions
This 350-801 CLCOR practice test for the CCNP and CCIE certifications quizzes readers on Cisco collaboration technologies, from endpoints to applications. Continue Reading
-
IT influences shift to net positive enterprise
In this Q&A, business sustainability expert Andrew Winston discusses why companies need to become net positive by contributing more than they take. Continue Reading
-
Understanding malware analysis and its challenges
Discover what to expect in a malware analyst career, from the types of malware you'll encounter to important tools to use to difficulties that arise for those new to the field. Continue Reading
-
Why is malware analysis important?
Malware continues to plague all organizations, causing data loss and reputational damage. Discover how malware analysis helps protect companies from such attacks. Continue Reading
-
How to efficiently measure customer loyalty
Most organizations don't measure customer loyalty often or thoroughly enough to improve CX. This book excerpt explores tips and suggestions to measure loyalty more efficiently. Continue Reading
-
How to prevent SQL injection with prepared statements
One of the top defenses against SQL injection is prepared statements. In this book excerpt, learn what prepared statements are and how to extend their defense. Continue Reading
-
How to maintain security with an understaffed security team
Unsurprisingly, many companies function without a complete security team. Security tasks often fall to others in the organization. Here's some advice for stand-in security members. Continue Reading
-
Data drives corporate social responsibility in tourism
Mohammed El Amine Abdelli explains the tourism industry's need for a corporate social responsibility framework in his book 'Sustainability, Big Data, and Corporate Social Responsibility.' Continue Reading
-
8 communication and collaboration books to read in 2022
Communication and collaboration tools are more important than ever as the workforce shifts to hybrid and remote work. Check out these books to learn more. Continue Reading
-
Defining requirements key to manage machine learning projects
Machine learning projects are likely to fail without proper planning. 'Managing Machine Learning Projects' provides guidance on how to plan by defining ML project requirements. Continue Reading
-
Consider ethical technology issues with data center growth
Authors Harry Lewis and Ken Ledeen discuss ethical issues organizations should consider when expanding data center, data collection and technological capabilities. Continue Reading
-
Equipment to include in a computer forensic toolkit
Computer forensic investigators require more than software to do their job. Learn what equipment constitutes a complete computer forensic toolkit. Continue Reading
-
Advice for beginner computer forensic investigators
For those interesting in becoming a computer forensics investigator, learn about the career and what to expect, as well as why digital evidence is the most volatile evidence. Continue Reading
-
8 cybersecurity books to read in 2023
Brush up on your cybersecurity skills by picking up one of these titles. Continue Reading
-
9 workplace diversity books to read in 2022
Learn to create and foster an inclusive culture for innovation and a sense of belonging for all employees. Continue Reading
-
Top 10 pen testing interview questions with answers
Are you pursuing a career in pen testing? Prepare with this list of 10 pen testing interview questions and answers created by three security experts. Continue Reading
-
Top IT security manager interview questions
Are you looking for a leadership role in cybersecurity? Three security experts offer their advice on how to answer the most common IT security manager interview questions. Continue Reading
-
How to reap the benefits of data integration, step by step
A new book lays out a strong case for data integration and guides readers in how to carry out this essential process. Continue Reading
-
Why Kali Linux is the go-to distribution for penetration testing
Discover why penetration testers prefer to use the Kali Linux distribution for offensive security, from collecting useful tools together to being usable from multiple devices. Continue Reading
-
How to configure and customize Kali Linux
Learning how to use Kali Linux for ethical hacking and penetration testing? Read step by step how to configure and customize the distribution. Continue Reading
-
Explore the pros and cons of Go for DevOps
Author and Docker engineer Teiva Harsanyi explains the benefits of Golang -- including why he sees it as the future of back-end development -- and how to avoid common pitfalls. Continue Reading
-
Sample CompTIA CASP+ practice questions with answers
Preparing for the CompTIA Advanced Security Practitioner certification or refreshing your knowledge to renew your cert? Use these CASP+ practice questions to test your smarts. Continue Reading
-
How to prepare for the CompTIA CASP+ exam
Are you pursuing the CompTIA Advanced Security Practitioner certification? The author of a CASP+ cert guide offers advice on how to prepare for the exam. Continue Reading
-
Techniques to get started with green networking
'Emerging Green Technologies' details how technology is a flexible tool organizations can use to make business operations more sustainable. Here's how to make your network green. Continue Reading
-
How energy-efficient networking supports sustainability
In this Q&A, 'Emerging Green Technologies' author Matthew N. O. Sadiku discusses the importance of going green and how to make networks energy-efficient to achieve this goal. Continue Reading
-
Funny JavaScript for programmers who love literature
Learn about the book 'If Hemingway Wrote JavaScript' by Angus Croll and how JavaScript gives programmers the ability to create interactive code. Continue Reading
-
Humorous AI is a riddle worth solving
Learn why Tony Veale -- author of the book 'Your Wit is my Command' -- believes comedic machines could change the world for the better. Continue Reading
-
DevNet authors discuss Cisco DEVCOR book, automation
The authors of a Cisco DevNet Professional DEVCOR study guide provide insights about the growth of network automation, CI/CD and programmability. Continue Reading
-
A look inside the Cisco DevNet Professional study guide
Learn how network automation works with software development in this chapter excerpt from 'Cisco Certified DevNet Professional DEVCOR 350-901 Official Cert Guide.' Continue Reading
-
11 practice questions for Cisco DEVCOR 350-901 exam
Think you know network automation? Take this practice exam from Chapter 10 of 'Cisco Certified DevNet Professional DEVCOR 350-901 Official Cert Guide' to test your expertise. Continue Reading
-
6 workplace benefits of immersive learning with AR and VR
AR and VR have the potential to enhance workplace learning programs. Learn how both employees and organizations can benefit from immersive learning with AR and VR. Continue Reading
-
How to approach learning technologies in the workplace
Author Ria O'Donnell discusses the importance of continuing professional development and how to approach digital learning technologies in the workplace, including VR and AI. Continue Reading
-
Is ethical hacking legal? And more ethical hacking advice
Is ethical hacking legal? Learn about the legality of ethical hacking, why it's important, its benefits and what organizations should look for when hiring an ethical hacker. Continue Reading
-
Ethical hacking: How to conduct a Sticky Keys hack
Physical security is often overlooked by cybersecurity teams. Learn about physical cybersecurity attacks in step-by-step instruction on how to conduct a Windows Sticky Keys hack. Continue Reading
-
Importance of enterprise endpoint security during a pandemic
Enterprises often focus greatly on communications security and less on endpoint security. Review the importance of enterprise endpoint security and best practices to implement it. Continue Reading
-
Cybersecurity lessons learned from COVID-19 pandemic
Cybersecurity lessons companies learn from the COVID-19 pandemic include having work-from-home preparations and developing disaster recovery and business continuity plans. Continue Reading
-
The white-box model approach aims for interpretable AI
The white-box model approach to machine learning makes AI interpretable since algorithms are easy to understand. Ajay Thampi, author of 'Interpretable AI,' explains this approach. Continue Reading
-
Why API naming conventions matter, and how to master the art
Naming APIs can be a daunting process, since it requires a balance between simplicity and clarity. JJ Geewax, author of 'API Design Patterns,' has some advice for developers. Continue Reading
-
Tips to plan storage elements of artificial intelligence
Author and data engineer Chinmay Arankalle explores how organizations can manage storage for AI. Management and storage options include data lakes and high-performance storage. Continue Reading
-
Considerations to plan AI storage architecture for big data
This chapter from 'The Artificial Intelligence Infrastructure Workshop' examines how to plan for AI data storage. Plan for factors like volume and scale for long-term success. Continue Reading
-
How businesses navigate the world of metaverse shopping
'The Metaverse Handbook' highlights the unique opportunity offered to retailers and game developers to join forces and gamify the shopping experience. Continue Reading
-
Clearing up cybersecurity architecture confusion, challenges
There's no lack of cybersecurity frameworks, but there is a lack of resources to help small and midsize organizations build a cybersecurity architecture -- until now. Continue Reading
-
4 criteria to measure cybersecurity goal success
Measuring the success of cybersecurity goals is challenging because they are components of larger goals and often probabilistic rather than deterministic. Continue Reading
-
How to write a cybersecurity job posting
Is your organization struggling to find cybersecurity talent? Your job descriptions could be the problem. Learn how to write a good cybersecurity job posting. Continue Reading
-
How to define cyber-risk appetite as a security leader
In this excerpt from 'The CISO Evolution: Business Knowledge for Cybersecurity Executives,' learn how to define and communicate an enterprise's true cyber-risk appetite. Continue Reading
-
How to find your niche in cybersecurity
It's difficult to navigate a career in cybersecurity, especially with all the varying roles. A veteran CISO offers advice on how to find your niche in the security industry. Continue Reading
-
A 'CISO evolution' means connecting business value to security
As cybersecurity has changed, so has the CISO role. 'The CISO Evolution: Business Knowledge for Cybersecurity Executives' aims to help security leaders succeed in the C-suite. Continue Reading
-
Justice, equity, diversity and inclusion: Essentials for businesses
As the demographics in the modern workforce change, so, too, do the demands. Continue Reading
-
Podman: A worthy alternative to Docker for containers
Podman has long stood in Docker's shadow, but 'Podman in Action' author Daniel Walsh hopes to shine a light on Podman within the container market. Continue Reading
-
How to determine out-of-scope bug bounty assets
What happens when a security researcher discovers a bug in an out-of-scope asset? Learn how to handle bug bounty scope in this excerpt from 'Corporate Cybersecurity.' Continue Reading
-
An enterprise bug bounty program vs. VDP: Which is better?
Creating a bug bounty or vulnerability disclosure program? Learn which option might prove more useful, and get tips on getting a program off the ground. Continue Reading
-
The link between employee experience and customer experience
A customer's experience with an organization is only as good as an employee's experience. Business leaders should know that empathy is key to employee and customer success. Continue Reading
-
Effective hybrid meetings require training, equity, best practices
Authors Karin M. Reed and Joseph A. Allen discuss the need for proper training and best practices to support inclusive and effective hybrid meetings. Continue Reading
-
Hybrid meeting best practices emphasize engagement
In this book excerpt from 'Suddenly Hybrid,' learn about some hybrid meeting best practices that support engagement, regardless of where attendees are located. Continue Reading
-
How ransomware kill chains help detect attacks
Reconstructing cyber attacks is a key step in incident response. Learn how ransomware kill chains can help security teams detect and mitigate the consequences of an attack. Continue Reading
-
How to improve cyber attack detection using social media
Social media has cybersecurity pros and cons. One benefit is that it can help improve cyber attack detection. These four real-world examples show how. Continue Reading
-
How to design architecture for enterprise wireless security
Learn about a five-phase design methodology that will help your company plan for and create an enterprise wireless security architecture. Continue Reading
-
Implementing wireless security in the enterprise
Learn how to properly secure your enterprise wireless network while considering UX, zero trust and commonly overlooked architectural mistakes. Continue Reading
-
Whip up recipes with 'Elasticsearch 8.x Cookbook'
Elasticsearch is a powerful and potentially complicated tool. With 'Elasticsearch 8.x Cookbook,' users can split exercises into manageable bites. Continue Reading
-
Case study: Why it's difficult to attribute nation-state attacks
If two attacks look similar, don't assume they're from the same attacker. It's difficult to attribute nation-state attacks, as evidenced by the notorious 2016 Odinaff malware. Continue Reading
-
Tips for using a threat profile to prevent nation-state attacks
Is your organization concerned about state-sponsored attacks? Threat profiling can help prevent nation-state attacks. Get advice on how to create an effective threat profile. Continue Reading
-
Rethinking asynchronous communication in remote work
Remote work carries different expectations for communication. Learn how to shift to asynchronous communication to create more equitable collaboration among remote employees. Continue Reading
-
Remote work effectiveness requires adjusting expectations
Author James Stanier discusses the lessons from 'Effective Remote Work' in adapting to asynchronous communication and preparing for the hybrid workplace. Continue Reading
-
How to conduct Linux privilege escalations
Learn how to conduct Linux kernel exploitation with Metasploit and manually, as well as how to identify vulnerabilities on Linux using enumeration scripts. Continue Reading
-
Why companies should focus on preventing privilege escalation
If attackers can elevate privileges once inside a system, their access can be unlimited. Discover common privilege escalation techniques and how to mitigate them. Continue Reading
-
An introduction to binary diffing for ethical hackers
Binary diffing is a useful tool in the ethical hacker's arsenal. This excerpt teaches aspiring penetration testers and red teamers how to get started. Continue Reading
-
Unethical vulnerability disclosures 'a disgrace to our field'
The cybersecurity field needs more people who use their powers for good, the lead author of Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition says. Continue Reading
-
Sound business process architecture requires key traits
Business processes require a coherent enterprise-level architecture. In this excerpt from his new book, Roger Burlton identifies key traits business processes should share. Continue Reading
-
Stochastic processes have various real-world uses
The breadth of stochastic point process applications now includes cellular networks, sensor networks and data science education. Data scientist Vincent Granville explains how. Continue Reading
-
Stochastic point processes and their practical value
Data scientists learn and utilize stochastic point processes for myriad pragmatic uses. Data scientist Vincent Granville explains this in his new book. Continue Reading
-
How to implement OpenID Connect for single-page applications
The OpenID Connect authentication protocol can be used to secure a variety of applications. This excerpt teaches developers how it works with single-page applications. Continue Reading
-
How to use OpenID Connect for authentication
OpenID Connect has become a trusted protocol to connect with identity providers. Explore how to use it for IAM, common threats to be aware of and how to connect to multiple IdPs. Continue Reading
-
The importance of HR's role in cybersecurity
HR teams must keep security top of mind when hiring and onboarding employees and enforcing data privacy policies. Get advice on the procedures and mechanisms to do so. Continue Reading
-
Why CISOs need to understand the business
While CISOs need technical skills, business skills help them push their team's agenda and get the support and funding they need to protect their company. Continue Reading
-
The role of NVMe network storage for the future
This chapter excerpt from 'Building a Future-Proof Cloud Infrastructure' examines the role networking and storage protocols, like NVMe, could have in the remote storage market. Continue Reading
-
New approaches create opportunity to turn data into value
Bill Schmarzo, a data science industry thought leader, discusses how organizations can reframe their view of data using economic concepts to turn data into value. Continue Reading