This book is a consolidated register of known risk/vulnerabilities in IT systems and infrastructure that are commonly deployed in today’s enterprise for delivery of technology driven services. Information risk assurance and cybersecurity practitioners can used this book to perform audit, risk/security/gap assessment of their most critical IT infrastructures and processes for remedial action.
This book is a do-it-yourself guide that provide Information Risk Assurance & Cybersecurity professionals a step by step details on how to perform audit or risk/security assessment of their payment card infrastructure & environment in line with PCIDSS requirement. Would-be Internal Security Assessor (ISA) and QSA can use this book to prepare for or assess their organization for PCIDSS compliance.
Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make necessary changes in old software in order to implement commonly accepted secure protocols such as SSL/TLS.
Booklet for developers and security professionals on how to implement code obfuscation, .NET strong name signing, and Authenticode code signing in order to protect applications deployment. The guide contains detailed description of different code signing implementation options from basic software to sophisticated hardware solution.
Also check out some similar keyword tags authors have used: