Bookshelf
-
Examine the future of AI for IoT to achieve business success
Taking advantage of emerging trends, such as AI and IoT, is key to business success. Start by exploring the direction these two technologies will take according to experts. Continue Reading
-
What IT pros can expect from 5G core network architecture
5G is the first 'G' in the cloud, which means its network architecture can enable functions, services and capabilities past cellular generations couldn't. Here's what to expect. Continue Reading
-
Follow Google's lead with programming style guides
Code style guides shield developers from dangerous programming approaches and confusion. Here's how Google cultivates style guides, and why you should too. Continue Reading
-
Python exploratory data analysis and why it's important
Exploratory data analysis is a key step to building the best models to gain insight from your data. Read on to see how Python can be a useful tool in this process. Continue Reading
-
Why structural change in an organization is key
In her book 'Dynamic Reteaming,' Heidi Helfand dives into the importance of reteaming and provides strategies organizations can use to ensure it's done effectively in the workplace. Continue Reading
-
If software architects' soft skills fail, so does the business
Mark Richards and Neal Ford, authors of 'Fundamentals of Software Architecture,' share real-life examples of why architects must communicate well, and explain how to do it. Continue Reading
-
Important resources in a data scientist education
There are plenty of resources for data science learning for people entering the field all the way up to managers. Read on for key resources and an excerpt from a new book on data science skills. Continue Reading
-
How cyber warfare laws limit risk on a digital battleground
Retired Navy cryptologist implores enterprises to build key cyber warfare laws into their infosec strategy to improve survivability on the digital battleground in his new book. Continue Reading
-
The future of cyber warfare requires infosec's attention
The future of cyber warfare places enterprise security and survivability in the crosshairs. Learn more about cyber warfare threats and capabilities and how infosec can prepare. Continue Reading
-
Evolution of WLAN technology improves data rates, security
WLAN technology has evolved dramatically -- most notably, in terms of network speeds and security. Innovations in Wi-Fi 6 show that the WLAN evolution isn't slowing, either. Continue Reading
-
Surprising insight on the data governance process
Many enterprise data governance processes have been around for a while. Read on for ways a modern approach can be beneficial, and preview a new book that can update your strategy. Continue Reading
-
Why network configuration templates are useful in automation
If a network team automates network configuration templates, it can save time and eliminate redundant activities in order to focus more on data collection and analysis. Continue Reading
-
An automation-first approach enables network predictability
For an organization to prioritize network automation, it needs an automation-first approach. This strategy involves understanding automation workflows and enabling proper training. Continue Reading
-
Microsoft Teams meetings tutorial offers best practices
In this Microsoft Teams meetings tutorial, learn the features and functionalities of virtual meetings and live events, from customizing meeting requests to sharing content. Continue Reading
-
Why is innovative leadership essential in the workplace?
Mark McClain, co-founder and CEO of SailPoint, discusses how he became an innovative leader in business today and how it helped create a collaborative environment in the workplace. Continue Reading
-
VPC security best practices and how to implement them in AWS
To best secure network access, AWS administrators need to create rules for network resources. Learn how to implement Amazon VPC security best practices in this book excerpt. Continue Reading
-
Overcome AWS security vulnerabilities with VPCs, IAM
Securing network access in AWS requires the right rules to be in place. Learn more about Virtual Private Clouds and how implementing them can prevent common cloud security attacks. Continue Reading
-
SailPoint CEO drives leadership values in the workplace
Sometimes, it's not just about the technology. In his book, Mark McClain dives into the importance of generating a people-centered culture where values are core to organizational success. Continue Reading
-
What matters most in an Agile organizational structure
Forcing an Agile approach onto team members causes more problems than it solves. 'Doing Agile Right' distills real-world experience into advice -- including when to delay change. Continue Reading
-
Learn Kubernetes step by step with this interactive book
SearchITOperations spoke with author Zach Arnold about what IT pros can expect from The Kubernetes Workshop, an interactive book that progressively builds readers' knowledge of container orchestration. Continue Reading
-
Benefits of a data catalog and why you need one
Data catalogs help across enterprises, from breaking down data silos to ensuring data privacy. A new book from Technics Publications explains the benefits of data catalogs. Continue Reading
-
Use these CCSK practice questions to prep for the exam
Virtualization and container security are key topics in the Certificate of Cloud Security Knowledge credential. Test your knowledge with these CCSK practice questions. Continue Reading
-
CCSK cert guide author's insights into cloud security credential
The author of a Certificate of Cloud Security Knowledge exam guide offers insights into certifications, top considerations for those pursuing the CCSK and more. Continue Reading
-
Creating agile conversations in digital transformation initiatives
Douglas Squirrel and Jeffrey Fredrick, authors of the book 'Agile Conversations,' dive into the significance of improved conversations while undergoing digital transformations. Continue Reading
-
Building customer relationships is central to loyalty
Raghu Kalé's book, Loyalty and Sacrifice, discusses what it means for businesses to build relationships and create true customer loyalty -- going beyond repeat sales. Continue Reading
-
Edge computing book introduces edge laws and techniques
In this book excerpt, discover the three laws of edge computing, as well as how to use edge computing techniques to solve common IT problems within organizations. Continue Reading
-
The what, why and how of the Spring Security architecture
Like any framework, Spring Security requires writing less code to implement the desired functionality. Learn how to implement the Spring Security architecture in this book excerpt. Continue Reading
-
Why developers need to know the Spring Security framework
The Spring Security framework is a reliable way for Java developers to secure applications. However, proper implementation is critical to prevent the most common vulnerabilities. Continue Reading
-
Network automation book shares recipes for success
In this network automation book excerpt, discover how automation frameworks NAPALM and Ansible can provide network teams with vendor-agnostic network management capabilities. Continue Reading
-
Network pros need NAPALM, Ansible network automation skills
Network pros need network automation skills in NAPALM and Ansible because the two modules together can enhance multivendor environments and streamline network management tasks. Continue Reading
-
Dive into the quantum computing qubit with IBM's Bob Sutor
The quantum computing industry is entering a new era. IBM's Bob Sutor discusses the technology's importance and how his latest book can help readers better understand the qubit. Continue Reading
-
How IT can build an agile business partnership
Gene Kim, award-winning researcher, author and founder of IT Revolution, discusses why IT leaders need to involve their colleagues in the journey towards an agile business. Continue Reading
-
CISA exam preparation requires learning ethics, standards, new vocab
The CISA certification is proof of an auditor's knowledge and skills. However, the exam isn't easy and requires some heavy learning -- especially when it comes to vocabulary. Continue Reading
-
CISA practice questions to prep for the exam
Ready to take the Certified Information Systems Auditor exam? Use these CISA practice questions to test your knowledge of the audit process job practice domain. Continue Reading
-
Discover key OpenStack deployment methods for networks
In this book excerpt, explore best practices for OpenStack deployment methods, and glean expert advice on how to achieve an efficient OpenStack network deployment. Continue Reading
-
Business culture is key in OpenStack network requirements
Network teams should expect a shift in their day-to-day routines if their organization embraces OpenStack. However, if the business culture is flexible, changes will be positive. Continue Reading
-
Understand the role of infrastructure as code in DevOps
Infrastructure as code plays a prominent role in enterprise DevOps shops. Use this chapter excerpt to understand why -- and to learn the basics of some common IaC tools. Continue Reading
-
Security testing web applications and systems in the modern enterprise
Security testing web apps with little budget and poor documentation is difficult. Ric Messier discusses building a security testing lab in the DevSecOps, cloud and automation age. Continue Reading
-
Software security testing and software stress testing basics
In this excerpt from Ric Messier's book, learn why software security testing and stress testing are critical components of an enterprise infosec program. Continue Reading
-
Try 10 practice questions for the CCNP, CCIE ENCOR 350-401
This practice quiz for CCNP and CCIE ENCOR 350-401 explores what readers must know about IP routing essentials -- including BGP and OSPF -- from the new certification guidebook. Continue Reading
-
How Cisco certification changes alter CCNP and CCIE tracks
Here's what to expect from the colossal Cisco certification changes to the CCNP and CCIE tracks that aim to increase material relevance and benefit network engineers' daily lives. Continue Reading
-
Prepare for CCNP, CCIE ENCOR 350-401 with this guide preview
Here's an excerpt from the new 'CCNP and CCIE ENCOR 350-401 Official Cert Guide' that provides the key IP routing essentials network engineers require for their job roles. Continue Reading
-
Learn 5 defensive programming techniques from experts
How do you become a good programmer? Accept that you have bad programming habits. The authors of 'The Pragmatic Programmer' share tips for defensive code creation. Continue Reading
-
A look inside 'CCNA 200-301 Official Cert Guide, Volume 2'
Network security is a crucial skills area for network engineers, and the CCNA 200-301 reflects this. Here's a chapter excerpt on network security from the new guide. Continue Reading
-
Traditional, emerging topics unite in the new CCNA exam
As of Feb. 24, all eyes are on the CCNA 200-301 exam -- Cisco's latest update to the CCNA track. Here's a look at what's on the exam and how it compares to previous CCNA exams. Continue Reading
-
Cryptography basics: Symmetric key encryption algorithms
Scrambling plaintext into ciphertext is essential to ensure data cannot be read or used by the wrong people. Learn the basics of symmetric key encryption algorithms here. Continue Reading
-
'Computer Security Fundamentals:' Quantum security to certifications
New topics, from security engineering to quantum computing, are covered in 'Computer Security Fundamentals,' but the book's author suggests readers review some basic topics, too. Continue Reading
-
CISM practice questions to prep for the exam
Risk management is at the core of being a security manager. Practice your risk management knowledge with these CISM practice questions. Continue Reading
-
The who, what, why -- and challenges -- of CISM certification
Think you're ready for the CISM certification exam? Peter Gregory, author of CISM: Certified Information Security Manager Practice Exams, has some pointers for you. Continue Reading
-
Data breach risk factors, response model, reporting and more
Dig into five data breach risk factors, and learn how the DRAMA data breach response model can help enterprises counter breaches in a timely and efficient manner. Continue Reading
-
The ins and outs of cyber insurance coverage
Cyber insurance coverage can help companies successfully navigate the aftereffects of a data breach. However, choosing a policy in the first place can be confusing. Continue Reading
-
How to build a neural network from the ground floor
Deep learning is powering the development of AI. To build your own neural network, start by understanding the basics: how neural networks learn, correlate and stack with data. Continue Reading
-
AWS SysOps certification exam guide outlines admin responsibility
In this book excerpt from "AWS Certified SysOps Administrator Associate All-in-One Exam Guide," review the best practices for OS and application security on AWS. Continue Reading
-
Benefits of using Azure Security Center for security assessments
Author Yuri Diogenes discusses how Azure Security Center helps admins achieve full cloud visibility, conduct security assessments and prevent potential breaches. Continue Reading
-
Use Azure Security Center to conduct a security posture assessment
In this excerpt from Chapter 4 of Microsoft Azure Security Center, the authors outline how to use the software to determine and improve your enterprise's cloud security posture. Continue Reading
-
Mark Schwartz dives into risk management in War and Peace and IT
Get an inside look into Mark Schwartz's new book, War and Peace and IT, with a chapter excerpt on risk and opportunity, as well as a Q&A with the author. Continue Reading
-
Learn how to master network traffic analysis with Python
In this book excerpt, explore key components of network security and network traffic analysis with Python scripting from Packt Publishing author José Manuel Ortega. Continue Reading
-
How Python addresses security, network traffic analysis concerns
Python can benefit key areas of an organization's network, including network security and traffic analysis. Glean critical expert advice from an author of various Python textbooks. Continue Reading
-
On a penetration tester career path, flexibility and curiosity are key
Becoming a pen tester takes more than passing an exam. Learn the qualities ethical hackers should embrace to achieve success on their penetration tester career path. Continue Reading
-
CompTIA PenTest+ practice test questions to assess your knowledge
Think you're ready to take the CompTIA PenTest+ certification exam? Test your skill set with some of the sample multiple-choice questions you may be facing. Continue Reading
-
Acquire best practices with this system administration handbook
Often, books published about IT are obsolete the moment they hit the shelves: modern technology moves too fast for physical publishing. However, this particular volume aims for longevity. Continue Reading
-
Gene Kim explores DevOps transformation in 'The Unicorn Project'
This chapter excerpt from Gene Kim's 'The Unicorn Project' touches on one of the book's core themes: Roadblocks occur when developers, ops and business leaders are misaligned. Continue Reading
-
To secure DevOps, break culture and tooling barriers
The importance of secure DevOps initiatives can't be denied, but building security into DevOps isn't easy. Explore what needs to change and how those changes can be achieved. Continue Reading
-
The 3 pillars of a DevSecOps model
In this excerpt from Chapter 1 of Securing DevOps: Security in the Cloud, author Julien Vehent describes three principles critical to the DevSecOps model. Continue Reading
-
Try a CCNA 200-301 practice quiz from the official cert guide
This practice quiz provides a sneak peek into the new 'CCNA 200-301 Official Cert Guide, Volume 1,' which reflects Cisco's CCNA certification and exam redesigns. Continue Reading
-
Prepare for the CCNA 200-301 exam with this guide preview
Here's a sneak peek at what to expect from Cisco's redesigned CCNA exam directly from 'CCNA 200-301 Official Cert Guide, Volume 1' by author Wendell Odom. Continue Reading
-
Cisco author says new CCNA exam undergoes largest change ever
Cisco said goodbye to most CCNA tracks, and hello to a consolidated exam. Here's what you need to know about the new CCNA, from the author of every official CCNA guidebook. Continue Reading
-
Book excerpt: Communication structures of an organization
The following is an excerpt from 'Team Topologies: Organizing Business and Technology Teams for Fast Flow,' by Matthew Skelton and Manuel Pais, as well as a Q&A with the authors. Continue Reading
-
Book excerpt: Building blocks of an IIoT security architecture
The following is an excerpt from 'Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries' by author Sravani Bhattacharjee and published by Packt. Continue Reading
-
Security in Network Functions Virtualization
In this excerpt of chapter 4 of Security in Network Functions Virtualization, authors Zonghua Zhang and Ahmed Meddahi discuss Identity and Access Management in NFV. Continue Reading
-
Port Cybersecurity
In this excerpt from chapter 3 of Port Cybersecurity, author Nineta Polemi discusses Security of Ports' Critical Information Infrastructures. Continue Reading
-
Seeking the Truth from Mobile Evidence
In this excerpt from chapter 19 of Seeking the Truth from Mobile Evidence, author John Bair discusses Android user enabled security in terms of passwords and gestures. Continue Reading
-
Book excerpt: Use IoT to win in the outcome economy
The following is an excerpt from 'IoT Inc: How Your Company Can Use the Internet of Things to Win in the Outcome Economy' by author Bruce Sinclair and published by McGraw-Hill. Continue Reading
-
Thor's OS Xodus
In this excerpt from chapter one of Thor's OS Xodus, author Timothy "Thor" Mullen discusses OS X, privacy, and online safety. Continue Reading
-
Security Controls Evaluation, Testing, and Assessment Handbook
In this excerpt from chapter 11 of Security Controls Evaluation, Testing, and Assessment Handbook, author Leighton Johnson discusses access control. Continue Reading
-
The Basics of Cyber Safety
In this excerpt from chapter four of The Basics of Cyber Safety, authors John Sammons and Michael Cross discuss basic email security. Continue Reading
-
Protecting Patient Information
In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data breaches in healthcare. Continue Reading
-
Mobile Security and Privacy
In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity in terms of mathematics. Continue Reading
-
Federal Cloud Computing
In this excerpt from chapter three of Federal Cloud Computing, author Matthew Metheny discusses open source software and its use in the U.S. federal government. Continue Reading
-
Advanced Persistent Security
In this excerpt from chapter seven of Advanced Persistent Security, authors Araceli Treu Gomes and Ira Winkler discuss the different threats facing organizations. Continue Reading
-
Handbook of System Safety and Security
In this excerpt from chapter 10 of Handbook of System Safety and Security, editor Edward Griffor discusses cloud and mobile cloud architecture and security. Continue Reading
-
Industrial Network Security
In this excerpt from chapter 3 of Industrial Network Security, authors Eric D. Knapp and Joel Langill discuss the history and trends of industrial cybersecurity. Continue Reading
-
Hacking Web Intelligence
In this excerpt from chapter 8 of Hacking Web Intelligence, authors Sudhanshu Chauhan and Nutan Panda discuss how to be anonymous on the internet using proxy. Continue Reading
-
DNS Security: Defending the Domain Name System
In this excerpt from chapter two of DNS Security: Defending the Domain Name System, authors Allan Liska and Geoffrey Stowe discuss why DNS security is important. Continue Reading
-
Google Earth Forensics: Using Google Earth Geo-Location in Digital Forensic Investigations
In this excerpt from chapter five of Google Earth Forensics, authors Michael Harrington and Michael Cross discuss the process of digital forensics. Continue Reading
-
Automated Security Analysis of Android and iOS Applications
In this excerpt of Automated Security Analysis of Android and iOS Applications with Mobile Security Framework, authors Ajin Abraham and Henry Dalziel discuss mobile application penetration testing. Continue Reading
-
Information Governance and Security: Protecting and Managing Your Company's Proprietary
In this excerpt of Information Governance and Security, authors John G. Iannarelli and Michael O'Shaughnessy offer tips for establishing guidelines for all departments or sectors of a business. Continue Reading
-
Integrated Security Systems Design
In this excerpt of Integrated Security Systems Design, author Thomas L. Norman explains the tools of security system design, the place of electronics in the process, how to establish electronic security program objectives and the types of design efforts. Continue Reading
-
Securing VoIP: Keeping Your VoIP Networks Safe
In this excerpt of Securing VoIP: Keeping your VoIP Network Safe, author Regis (Bud) Bates outlines different approaches to VoIP security and offers best practices to ensure infrastructure security is intact. Continue Reading
-
Detecting and Combating Malicious Email
In this excerpt of Detecting and Combating Malicious Email, authors Julie JCH Ryan and Cade Kamachi discuss the elements of an email structure and touch on how attackers can use these elements to trick unwitting victims. Continue Reading
-
Designing and Building Security Operations center
In this excerpt of Designing and Building Security Operations Center, author David Nathans reviews the infrastructure needed to support a SOC and maintain SOC security. Continue Reading
-
Information security book excerpts and reviews
Visit the Information Security Bookshelf for book reviews and free chapter downloads. Continue Reading
-
Cyber Reconnaissance, Surveillance and Defense
In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Continue Reading
-
Targeted Cyber Attacks
In this excerpt of Targeted Cyber Attacks, authors Aditya Sood and Richard Enbody outline the cyberattack model and different vectors used to attack targets. Continue Reading
-
The Basics of Information Security
In this excerpt of The Basics of Information Security, author Jason Andress outlines methods for improving operating systems security. Continue Reading
-
Introduction to Information Security: A Strategic-Based Approach
In this excerpt of Introduction to Information Security: A Strategic-Based Approach, authors Timothy J. Shimeall and Jonathan M. Spring discuss the importance of intrusion detection and prevention. Continue Reading