computing august

Upload: muge-vene-machin

Post on 03-Jun-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Computing August

    1/15

    Hacking Exposed 7 Network Security Secrets & Solutions Seventh EditionAuthor: Stuart McClure, Joel Scambray, George KurtzISBN-13: 9780071780285

    Pub Date: AUGUST 2012

    Price:

    $ 60.00 AUD$ 80.00 NZD

    Edition: 7

    Previous ISBN: 9780071613743Subject: Computers - SecurityTrim Height: 24 cmTrim Width: 19 cmPages: 720

    Format: Softcover

    INTRODUCTION

    A complete update to the longest-selling, most successful computer security bookworldwide

    Features an all-new 5 Deployments approach that provides five key actions for everycountermeasure

    Two new chapters: Advanced Persistent Threats and Embedded Systems Hacking

    New content on SCADA protocols, Web 2.0, hardware, Ubuntu Linux, Windows Server 2010,Cisco, RFID, data theft, and more

    DESCRIPTION

    A fully updated edition of the worlds bestselling computer security book

    Hacking Exposed 7: Network Security Secrets and Solutionsis filled with all-new information on

    today's most devastating attacks and proven countermeasures. The book covers: advancedpersistent threats; infrastructure hacks; industrial automation and embedded devices; wirelesssecurity; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux;

    hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new 5 Deploymentsapproach for the first time that provides five key actions for every countermeasurefocused on five

    areas of expertise:

    1. Network Security2. Server Security3. Mobile Security4. Endpoint Security

    5. Web Security

    Page 1 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    2/15

    Hacking Exposed 7applies the authors internationally recognized and highly sought-after computersecurity methodologies, technical rigor, and from-the-trenches experience to making computertechnology usage and deployments safer and more secure for businesses and consumers. Ituncovers new, cutting-edge computer security issues.

    New to This Edition

    Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by

    hackers to inject malware into networks and establish botnets, and provides countermeasuresto defend against these increasingly prevalent threats

    NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving one best command that can be deployed to fight the greatest number of potentialattacks

    Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control

    remote devices and provides countermeasures to defend against these hacks

    New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, WindowsServer 2010, Cisco, RFID, data theft, and more

    Praise for Previous Editions

    If there was an Encyclopedia Britannicaof computer security, it would be Hacking Exposed. --MartyRoesch, creator of the Snort tool

    Informational gold. --Bruce Schneier, CTO, Counterpane Internet Security, Inc.Real security is proven by trying to break it, and few sources will show you how to do that betterthan Hacking Exposed --Thomas Ptacek, Researcher at Arbor Networks

    If this book doesn't scare and motivate you to take security seriously, nothing will. --AlephOne,Bugtraq Moderator

    The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy. - Simple Nomad, author of The Hack FAQ and Pandora

    A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, FifthEditiondelivers just that...and more. --Lance Spitzner, President and Founder of the HoneynetProject

    ABOUT THE AUTHOR

    Stuart McClure, CISSP, CNE, CCSE,is widely recognized for his extensive and in-depth knowledgeof security architectures, platforms, and products, He is one of the industrys leading authorities in

    information security today. A well-published and acclaimed security visionary, McClure authoredmany security books, including the most successful security book ever written, Hacking Exposed. Hewas founder, president, and CTO of Foundstone, ran the worldwide AVERT team at McAfee, and heldleadership positions at Ernst & Young, InfoWorld, and a number of government agencies.

    Joel Scambray, CISSP,is Managing Principal with Citigal as well as Co-Founder of Consciere LLC.He was previously chief strategy officer for Leviathan Security Group, an information securityconsultancy. He was a senior director at Microsoft Corporation, where he led Microsoft's onlineservices security efforts for three years before joining the Windows platform and services division tofocus on security technology architecture. Before joining Microsoft, Joel co-founded security software

    and services startup Foundstone, Inc., and helped lead it to acquisition by McAfee. He has spokenwidely on information security at forums including Black Hat, I-4, and The Asia Europe Meeting(ASEM). Joel is the co-author of all five editions of Hacking Exposedand lead author of Hacking

    Exposed: Windows, currently in its third edition, and Hacking Exposed: Web Applications, currentlyin its second edition.

    George Kurtz, CISSP, is former CEO of Foundstone, Inc., and current senior vice president andgeneral manager of McAfees Risk & Compliance Business Unit. He is an internationally recognizedsecurity expert, author, and entrepreneur, as well as a frequent speaker at most major industryconferences. George has more than 15 years of experience in the security space and has helped

    hundreds of large organizations and government agencies tackle the most demanding securityproblems.

    How to Do Everything MacBook AirAuthor: Jason RichISBN-13: 9780071802499

    Page 2 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    3/15

    Pub Date: AUGUST 2012Price:

    $ 29.95 AUD$ 37.00 NZD

    Edition: 1Previous ISBN:Subject: Computers - Operating Systems /Macintosh

    Trim Height: 24 cmTrim Width: 19 cmPages: 384Format: Softcover

    DESCRIPTION

    Get the most out of Apples updated, ultra-slim MacBook Air notebook

    How to Do Everything MacBook Airunveils all the new features and improved features such asinstant-on responsiveness, Multi-Touch trackpad, and all-flash storage. This practical guide showsyou how to surf the web, manage email, view and edit photos, manage contacts and a schedule,

    video conference, watch videos/TV shows and movies, listen to music, and play games. Youll alsoget full details on Mac OS X Mountain Lion and all the built-in applications. Learn how to transfer filesfrom a Windows PC or another Mac, sync MacBook Air with an iPad and/or iPhone, and use MacBookAir with iCloud.

    How To and Did You Know sidebars deliver guidance for dealing with tricky issues andadvanced queries

    Tips for extending the MacBook Airs battery life and external power source options

    Teaches how to run Windows and Windows software on a MacBook Air via Parallels or otherthird-party software

    Coverage of traveling with MacBook Air, including tips for charging and connecting to theInternet anywhere

    Covers it all!Mac OS X Operating System; Make the Switch From Windows To a Mac; Set Up The Software That

    Comes With MacBook Air; Install New Software Onto MacBook Air; Transfer Data & Files fromAnother Computer; Use Apples iCloud to Synch all Your Devices; Add Optional Peripherals &Accessories to Expand Performance; Create Documents, Spreadsheets, Digital Slide Presentations;Surf the Web on Your MacBook Air; Set Up Existing Email Accounts For MacBook Air; Bring the iLifeApps into Your Life; Get Organized with Calendar and Address Book Software; Find & Enjoy Music,

    Movies, TV Shows & More With iTunes; Play Games On Your MacBook Air; Travel with Your MacBookAir; Use FaceTime, Skype or VOIP Software to Communicate & Video Conference

    ABOUT THE AUTHOR

    Jason R. Richis the bestselling author of more than 48 books on a wide range of topics, including

    Page 3 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    4/15

  • 8/12/2019 Computing August

    5/15

    iPad QuickSteps, 2nd EditionAuthor: Joli BallewISBN-13: 9780071803717

    Pub Date: AUGUST

    2012Price:

    $ 23.95 AUD

    $ 30.00 NZD

    Edition: 2Previous ISBN:9780071774277Subject: Computers -Hardware / HandheldDevicesTrim Height: 21 cmTrim Width: 26 cm

    Pages: 208Format: Softcover

    DESCRIPTION

    Step-by-Step, Full-Color Graphics!

    Heres the fastest, easiest way to get up and running on your third-generation iPad. Color photosand screenshots on every page with clear instructions help you get started right away. Follow along

    and learn how to use the camera and video recorder, download content from the App Store, playmovies, video conference, read ebooks, send/receive e-mail, surf the web, and more.The unique, oblong layout of the QuickSteps series mimics your computer screen, displays graphicsand explanations side by side, and lays flat so you can easily refer to the book while working on youriPad.

    Use these handy guideposts:

    Shortcuts for accomplishing common tasks

    Need-to-know facts in concise narrative Helpful reminders or alternate ways of doing things

    Bonus information related to the topic being covered

    Errors and pitfalls to avoid

    ABOUT THE AUTHOR

    Joli Ballewis a technical writer, technology trainer, and self-proclaimed gadget guru. She is thebestselling author of more than 40 computer books, including How to Do Everything: iPad, How toDo Everything: BlackBerry Storm2, How to Do Everything: Netbook, and Degunking Windows 7.

    IBM DB2 Version 10Author: Paul ZikopoulosISBN-13: 9780071802956

    Pub Date: JUNE 2012

    Page 5 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    6/15

    Price:

    $ 24.95 AUD$ 33.00 NZD

    Edition: 1Previous ISBN:Subject:Trim Height: 23 cmTrim Width: 16 cm

    Pages: 240Format: Softcover

    DESCRIPTION

    Save Time and Money with DB2 10 for LUW

    Even travel through time and shrink data

    How would you like to compress even more data, store it in a cloud, and analyze it as though youare traveling through time without compromising security? In addition to these enhancements, youwill experience lower costs and faster performance with the latest release of DB2. Read this book tounderstand the power of DB2 10 and get started now!

    This book provides you with the comprehensive knowledge you need to get started with the latestDB2 release. Try some of the new features by downloading DB2 Express for free, which features Big

    Data and Cloud technology. Go to ibm.com/db2/express.

    CorelDRAW X6 The Official GuideAuthor: Gary David BoutonISBN-13: 9780071790079

    Pub Date: AUGUST 2012Price:

    $ 60.00 AUD$ 80.00 NZD

    Edition: 1Previous ISBN: 9780071745178

    Subject: Computers - Digital Media / GraphicsApplications

    Trim Height: 24 cmTrim Width: 19 cmPages: 880Format: Softcover

    Page 6 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    7/15

    DESCRIPTION

    The only official guide to CorelDRAWfully updated throughout to coverall the new features of the latest release

    CorelDRAW X The Official Guideis the one-stop tutorial/reference for learning how to creategorgeous graphics for a variety of print and web uses. Veteran graphic designer and author Gary

    Bouton shows you how to use the new product features, and shows off beautiful graphics andtechniques in this Corel-authorized guide. Packed with examples and techniques, this book delivers

    details no CorelDRAW user can afford to be without!Ideal for beginners through experts getting started on the new release, the book explains how toinstall the software, use the illustration and drawing tools, work with text, apply colors, fills, andoutlines, apply special effects, and work in 3D.CorelDRAW X The Official Guide

    Offers hundreds of tips, tricks, and shortcuts that show how to get the most out of productfeatures, not just what the features do

    Includes online access to 30+ video tutorials of hands-on instruction from the author, plusCorelDRAW native files, stock images for tutorials in Corel PHOTO-PAINT, custom typefacesdesigned by the author, and other useful starter pieces for learning CorelDRAW

    Includes a full-color insert demonstrating results of various filters and effects

    Provides a comprehensive CorelDRAW X reference as well as drawing tips and illustrationtechniques

    Discusses print and web use and potential issues

    Explains how to use PHOTO-PAINT, Corels image-editing tool

    ABOUT THE AUTHOR

    Gary David Boutonis an award-winning CorelDRAW illustrator and author of hundreds of expertdesign and drawing tutorials. He has used CorelDRAW professionally for more than 15 years and is

    the author of six books covering previous versions. A former Madison Avenue art director, Gary hasbeen a professional illustrator for 35 years and has written or co-written several other guides ondigital graphics, includingXara Xtreme 5: The Official Guideand Photoshop CS4 QuickSteps. He has

    served on Corels CorelDRAW feature review board and was a finalist in the Corel World Design

    Page 7 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    8/15

    contest.

    JavaScript The Complete Reference 3rd EditionAuthor: Thomas Powell, Fritz SchneiderISBN-13: 9780071741200

    Pub Date: JULY 2012Price:

    $ 60.00 AUD$ 80.00 NZD

    Edition: 3Previous ISBN: 9780072253573Subject: Computers - Programming Languages /JavascriptTrim Height: 24 cmTrim Width: 19 cm

    Pages: 960Format: Softcover

    INTRODUCTION

    Updated for latest changes to JavaScript up to version 1.9, with coverage of HTML5 andAjax

    Previous edition sold more than 10,000 copies

    JavaScript powers the most commonly used online applications

    DESCRIPTION

    This fully updated definitive JavaScript guide covers the latest featuresincluding its uses in Ajax and HTML5-based Web applications

    avaScript: The Complete Reference, Third Editionis completely revised to cover the newest changes

    to JavaScript up to version 1.9, the latest browser-specific features for Internet Explorer, Firefox,and Chrome, as well popular JavaScript frameworks like jQuery. All examples presented focus on theemergence of HTML5 and its various APIs including canvas, storage, and more.

    This comprehensive guide shows you how to build dynamic, cross-browser Web sites andapplications using JavaScript. Youll learn not only the syntax of language, but its related object

    models, and combine this knowledge to develop practical applications.avaScript: The Complete Reference, Third Edition

    Covers the newest versions of JavaScript, DOM, and Ajax (XMLHttpRequest) specifications Updated for latest browsers and specifications including HTML5

    Includes the newest features of JavaScript

    Addresses modern JavaScript coding techniques popularized since the previous edition

    Page 8 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    9/15

    Comprehensive coverage:Introduction to JavaScript; JavaScript Core Features; Data Types & Variables; Operators,Expressions & Statements; Functions; Objects; Array, Date, Math; Regular Expressions; JavaScriptObject Models; The Standard DOM; Event Handling; CNT, Windows & Frames; Handling Documents;

    Form Handling; DHTML and Beyond; Canvas; JavaScript UIs; Browser Detection; Cookies &Persistence; JS & Embedded Objects; Ajax and Remote JS; JavaScript and XML; Browser Specific JS;JavaScript Security; JavaScript Practices

    ABOUT THE AUTHOR

    Thomas Powell, lecturer for the University of California, San Diego, is the author of HTML & CSS:The Complete ReferenceandAjax: The Complete Reference. He is president and founder of PINT, aWeb site design and development firm.

    Fritz Schneideris a software engineer at Google where he works on both front- and back-endsystems. His previous experience includes social search service Aardvark and an earlier stint atGoogle where he founded Google's Firefox and Safe Browsing teams. Fritz is an experienced teacherof Web technologies and coauthor of How to Do Everything with Google.

    Reverse Deception Organized Cyber Threat Counter-ExploitationAuthor: Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones, Jeff JonesISBN-13: 9780071772495

    Pub Date: AUGUST 2012Price:

    $ 46.95 AUD$ 65.00 NZD

    Edition: 1Previous ISBN:Subject: Computers - SecurityTrim Height: 24 cmTrim Width: 19 cm

    Pages: 400Format: Softcover

    INTRODUCTION

    First book on understanding and fighting advanced persistent threats

    Shows how to identify APTs, categorize them according to risk level, and prioritize their actions

    Includes case studies from the authors FBI, DOD, NSA, and private sector work

    Explains how to implement deception and disinformation techniques against a variety ofincoming threats aimed at enticing adversaries out into the open

    DESCRIPTION

    A complete guide to understanding and fighting advanced persistent

    Page 9 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    10/15

    threatstoday's most destructive risk to enterprise security

    Reverse Deception: Organized Cyber Threat Counter-Exploitationexplains how to identify advancedpersistent threats (APTs), categorize them according to risk level, and prioritize your actionsaccordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, andDOD).

    APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network,undetected. In this one-of-a-kind book, the authors explain how to getand stayahead of today's

    well-organized and extremely persistent brand of network enemies. The book describes thecharacteristics of malware and botnets, how they can morph, evade detection, and spin off decoysthat live in-network, while appearing to have been cleaned up and debugged. This detailed guidethen reveals how to detect the appearance of malicious code, decode the types of enemies theyoriginate from, and finally, how to extricate malcode and deflect its future entry into networks.

    Reverse Deception: Organized Cyber Threat Counter-Exploitationfeatures:

    Full coverage of the #1 feared type of network attack today, the APT

    Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons

    of the types of countermeasures permissible by law in the U.S. and Asia versus less strictcountries in Europe, the Middle East, and Africa

    Enthralling case studies and true stories from the authors' FBI, DOD, NSA, and private sector

    work

    Foreword by Fred Feer, a security professional with 40 years experience with the U.S. Armycounterintelligence, CIA, RAND, and independent consulting

    Complete coverage of key aspects of deception, counter-deception, behavioral profiling, andsecurity within the cyber realm

    Cat-and-mouse strategies from the best in the gameexplains how to implement deception

    and disinformation techniques against a variety of incoming threats aimed at enticingadversaries out into the open

    A fresh perspective on innovative, field-tested ideas for successfully countering current digitalthreatsplus expected characteristics of the next threats to come

    Legal explanations of capabilities, limitations, and requirements for assisting law enforcementinvestigations

    Coverage includes:Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; TheMissions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft;Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators;Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation

    Tactics

    ABOUT THE AUTHOR

    Sean M. Bodmer, CISSP, CEH, is a senior threat intelligence analyst at Damballa, Inc., acrimeware detection, security provider, and research firm consulting to Fortune 500 and 1,000

    companies. He analyzes and tracks thousands of strings of network activity each week, scanning formalicious activity and focuses on attribution of each criminal and campaign. Sean is a frequentspeaker on network security concepts and practices, including at DoD conferences, and has beeninvited to speak and train cyber counterintelligence courses around the world. He's the co-author ofHacking Exposed: Malware & Rootkits.

    Max Kilger, Ph.D.,is specialist in profiling and behavioral analysis of the black hat community andhackers. He is a founding member of the Honeynet Project, is currently on their board of directors,and serves as their chief membership officer and chief profiler. Dr. Kilger is a frequent national andinternational speaker to the intelligence community, military, federal law enforcement, and

    information security forums. He received his doctorate from Stanford University in Social Psychologyin 1993.

    Page 10 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    11/15

    Gregory Carpenter, CISM,Jade Jones, JD,Jeffrey R. Jones, CISSP, GCIH, and C|EH (Washington, D.C.)has more than 20 years ofexperience as a government intelligence and cyber threat analyst. He has held several positionswithin the Department of Defense, most recently focusing on the the US Army's vulnerabilities and

    capabilities in cyberspace. Jeff holds a B.S. in Computer Science (Texas A&M - Corpus Christi) andan M.S. in Computer Science with an emphasis in Information Security (James Madison University).He has published articles on cyber threats and espionage in the National Intelligence Journal andvarious trade publications.

    Security Automation Essentials: Streamlined Enterprise SecurityManagement & Monitoring with SCAPAuthor: Greg Witte, Melanie Cook, Matt Kerr, Shane ShafferISBN-13: 9780071772518

    Pub Date: JULY 2012Price:

    $ 70.00 AUD$ 95.00 NZD

    Edition: 1Previous ISBN:

    Subject: Computers - SecurityTrim Height: 24 cm

    Trim Width: 19 cmPages: 464Format: Softcover

    INTRODUCTION

    The first book on the market to explain information security automation technologies

    Covers SCAP (Security Content Automation Protocol) technologies, which help automate andstreamline network security practices

    Includes case studies and bonus content online from the authorsrenowned IT securityexperts

    Large and growing marketas of 2008, the U.S. government purchases only SCAP-compliantproducts and services

    DESCRIPTION

    The definitive guide to information security automation technologies

    Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring withSCAPprovides IT security managers in both government agencies and private organizations with full

    details on the capabilities of SCAP (Security Content Automation Protocol) technologies. SCAP

    Page 11 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    12/15

    reduces dozens of individual security-related tasks (checking that patches are up to date) to simple,streamlined, and automated tasks that produce standardized results. It aids in the integration andease of use of multiple, non-interoperable products and platforms.This book is written by a team of subject matter experts from G2, a leading computer securitycompany working closely with the SCAP standards agency (NIST), government clients, including the

    Department of Defense, NSA, Drug Enforcement Administration, and FDA, and private clients such asAmerican Express, Monster.com, and Black & Decker. The book delivers a complete and accessibleoverview of SCAP, including enumerations of common platforms, vulnerabilities, and configurations.SCAP's open-standard, SML-based language is discussed, along with the Open Vulnerability andAssessment Language (OVAL), and how it communicates.

    Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring withSCAP

    Features thorough, accessible explanations for security professionals of all levels about whatSCAP is and what it can do to automate and streamline network security practices

    Helps you immediately take advantage of SCAP support in existing products, and includes tipsfor purchasing new security products and services that can interoperate with existingenterprise systems

    Includes case studies of SCAP streamlining in practice Supplemented by an author website with up-to-date resources and announcements on the

    latest developments in the field

    Provides a solid foundation for studying particular SCAP components in more detail andcustomizing/programming SCAP content and tools

    Coverage includes:

    What Is SCAP; SCAP Languages; SCAP Enumerations; SCAP Vulnerability Measurement; Putting thePieces Together; Using SCAP In Your Enterprise; Emerging SCAP Technologies

    The Computer Incident Response Planning Handbook: Executable Plansfor Protecting Information at RiskAuthor: N.K. McCarthyISBN-13: 9780071790390

    Pub Date: AUGUST 2012

    Price:

    $ 70.00 AUD$ 95.00 NZD

    Edition: 1

    Previous ISBN:Subject: Computers - Security

    Trim Height: 24 cmTrim Width: 19 cmPages: 528

    Format: Softcover

    Page 12 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    13/15

    INTRODUCTION

    The only CIRP book based on successful, real-world incident response plans

    Provides ready-to-implement incident response plans with guidelines for ongoing due diligence

    Explains how to develop data breach and malware outbreak CIRPs

    Plans in the book have survived numerous audits and the rigors of repeated execution

    DESCRIPTION

    Based on proven, rock-solid computer incident response plans

    The Computer Incident Response Planning Handbookis derived from real-world incident responseplans that work and have survived audits and repeated execution during data breaches and due

    diligence. The book provides an overview of attack and breach types, strategies for assessing anorganization, types of plans, and case examples. Tips for keeping data contained, reputationsdefended, and recognizing and handling the magnitude of any given threat are included.

    The Computer Incident Response Planning Handbook

    Contains ready-to-implement incident response plans with guidelines for ongoing duediligence, all based on actual, working, and tested CIRPs

    Prepares you to immediately build a CIRP for any organization, and keep that plan maintained

    Explains all the essentials involved in developing both data breach and malware outbreakCIRPs derived from tested incident response plans that have survived the rigors of repeatedexecution

    Clearly explains how to minimize the risk of post-event litigation, brand impact, fines andpenaltiesand how to protect shareholder value

    Supports corporate compliance with industry standards and requirements like PCI, HIPAA,

    SOX, CA SB-1386 All plans derived from the book are technology-agnostic

    Provides supplementary reading to professionals studying for the CERT Certified ComputerSecurity Incident Handler exam or the SANS/GIAC Certified Incident Handler exam (GCIH)

    In-depth coverage:

    The Latest Cyber Attacks and How They Are Business Killers; The Nebulous Standard of Cyber DueDiligence &. The New Era of Information Risk; Introduction to Planning & Crisis; A Plan is PreparationManifested; Getting More Out of Your Plans; Developing a Data Breach CIRP Incident Preparation,Plan Execution, and Post-incident Planning; Developing a Malware Outbreak CIRP IncidentPreparation, Plan Execution, and Post-incident Planning; References

    ABOUT THE AUTHOR

    N.K. McCarthypreviously managed the Information Security Operations / Threat & VulnerabilityManagement for a Fortune 50 Corporation for several years. His international staff performed round-the-clock security event monitoring and response. His responsibilities included: security patchremediation, vulnerability scans, and remediation, penetration testing, system configuration

    monitoring and remediation, maintaining the various Computer Incident Response Plans (CIRP), andan active threat portfolio for key business functions, users, application platforms and persistentvulnerabilities.With a career in over 20 plus years in IT, Mr. McCarthy has held a wide range of roles within ITincluding systems programming, IT consultant, technical management, and IT sales. He recently

    retired after 30 plus years as a Marine Corps reservist obtaining the rank of Lieutenant Colonel. Hislast reserve assignment of five years was with the U.S. Cyber Command. After 9/11, Lt. Col.

    McCarthy was mobolized and spent almost four years on active duty as an Information WarfareOfficer working at the U.S. Strategic Command, the Pentagon, and the National Security Agency(NSA). Mr. McCarthy also has 17 years of experience as a volunteer reserve police officer. In this

    capacity he was able to attend U.S. DOJ (Law Enforcement Only) training in computer forensics and

    Page 13 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    14/15

    advanced Internet investigations. He was also certified by FEMA for its Incident Command System(ICS) and the National Incident Management System (NIMS). Mr. McCarthy is currently on the Boardof Directors of the San Francisco Bay Area and Silicon Valley chapter of the FBI's Infragard program.Mr. McCarthy has a B.S. degree in Computer Science, an M.B.A. and a CISSP. He is also the CEO ofan SDVOB S-corporation with established and developing business in California and Nevada.

    Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs,4th Edition (Exams 220-801 & 220-802)Author: Michael MeyersISBN-13: 9780071795913

    Pub Date: AUGUST 2012

    Price:

    $ 90.00 AUD$ 120.00 NZD

    Edition: 4

    Previous ISBN: 9780071713801Subject: Computers - Certification Guides / A+

    Trim Height: cmTrim Width: cmPages: 1071

    Format: Softcover with CDROM

    INTRODUCTION

    Full-color text updated for the 2012 CompTIA A+ exams

    CompTIA approved and CAPP authorized

    Student CD-ROM includes four practice exams, an Introduction to A+ video by Mike Meyers,LearnKey video presentation featuring Meyers, and tools and utilities to use in labs or on the

    job Online Learning Center with chapter quizzes for students and instructors guide, syllabus,

    PowerPoint slides, and test bank Q&A for instructors.

    DESCRIPTION

    The bestselling full-color computer repair textbookfully updated for the2012 revision to CompTIA A+ certification exams 220-801 and 220-802

    Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs, Fourth Editionis the mosteffective classroom-based test preparation package available for schools, praised by many for its

    conversational style and real-world applicability. The full-color textbook design is well illustrated withphotographs and diagrams, and has an interactive design. Chapter learning objectives cover the2012 CompTIA A+ exam objectives, and a map with page references is included.

    The book features sidebar questions, critical skill-building activities, step-by-step instruction, and

    Page 14 of 15TIP SHEET FOR - 9780071780285

    5/14/2012ftp://sg01dbs004/tipsheets/39332/tipsheets.html

  • 8/12/2019 Computing August

    15/15

    end-of-chapter review and assessment. The student CD-ROM provides a self-assessment engine withfour complete practice exams, an Introduction to A+ video by Mike Meyers, and tools and utilitiesfor students to use in labs or on the job.Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs, Fourth Editionis CompTIAApproved: chapter objectives align with CompTIA Approved Quality Content (CAQC) standards.

    McGraw-Hill is a CompTIA Authorized Partner Program (CAPP) Gold Partner.

    ABOUT THE AUTHOR

    Mike Meyers, CompTIA A+, CompTIA Network+, CompTIA Security+, MCP, is the industrys leadingauthority on CompTIA A+ certification and the bestselling author of seven editions of CompTIA A+Certification All-in-One Exam Guide. He is the president of founder of Total Seminars, LLC, a majorprovider of PC and network repair seminars for thousands of organizations throughout the world, anda member of CompTIA.

    Page 15 of 15TIP SHEET FOR - 9780071780285