eBooks

image

Endpoint Threat Detection, Response, and Prevention for Dummies

Traditional signature-based endpoint protection solutions struggle to protect against today’s advanced threats and zero-day attacks. Enterprises need to detect and respond based on real-time monitoring and a continuous recorded history to reduce the attack surface with leading default-deny prevention solutions. Download this free eBook to learn more.

image

Windows XP End-of-Life Handbook for Upgrade Latecomers

New eBook explains how you can keep your XP systems compliant and secure after end of life without upgrading or paying for out-of-band support.

image

Why the Endpoint Must be the New Security Focus

New eBook from Bloor Research Explains How Endpoint Technology is mandating a New, Holistic Approach to Cyber Security

image

New Generation Security For Advanced Threats

Why have targeted Advanced Threats succeeded so dramatically when most organizations have architected sophisticated defense-in-depth strategies?  Because most of the tools and strategies organizations possess were built for the last generation of security threats.

image

Close the Mac Security Gap in Your Enterprise

As Mac products grow in popularity in the enterprise, they are becoming increasingly attractive targets for cybercriminals. Advanced attackers are always looking for enterprise infrastructure vulnerabilities, and their knowledge of how to exploit Mac endpoints has grown. With this growth comes a new challenge for enterprise security teams.

image

Advanced Threat Watch: Looking Ahead

Download this eBook today to understand how security and IT professionals – and governments worldwide – are becoming increasingly aware of the dangers advanced threats pose to their endpoints, servers, domain controllers and virtual environments and are taking control by utilizing a trust-based approach to detect and stop advanced threats that evade traditional security tools.

image

Detecting and Stopping Advanced Attacks

Every enterprise has high-value information that is vital to its success. As cyber-attack techniques become more sophisticated your “digital gold” is increasingly vulnerable. Today’s cyber threats have changed in sophistication, in focus, and in their potential impact on your business.

image

The Next Threat to National Security and What to do About It

Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

image

Virus Research and Defense

This chapter is a collection of techniques that were deployed in antivirus software to protect against computer viruses. In particular, antivirus scanner techniques will be discussed, which have evolved with computer virus attacks during the last 15 years.

image

Active Directory Services Design

This updated edition of the best-selling 70-219 Exam Cram will help you pass one of the four core design exams in the MCSE 2000 certification program. This book isn’t intended to teach you new material or go over every detail like a large study guide does. Instead it assumes that you have a solid foundation of knowledge but could use a refresher on important concepts as well as a guide to exam topics and objectives. The book features test-taking strategies, time-saving study tips, and a special Cram Sheet that includes tips, acronyms, and memory joggers not available anywhere else. The Cram Sheet is especially useful for last-minute review on test day.

image

Protect Your Windows Network From Perimeter to Data

In this book, two senior members of Microsoft’s Security Business and Technology Unit present a complete “Defense in Depth” model for protecting any Windows network—no matter how large or complex. Drawing on their work with hundreds of enterprise customers, they systematically address all three elements of a successful security program: people, processes, and technology.

image

Windows Forensics and Incident Recovery

This book is a compilation of all the information currentlyavailable on this subject. It is for anyone who manages or administers Windowssystems (including home users) and needs to know how to react when theysuspect that an incident has occurred. It guides the reader throughinformation, tools, and techniques that are required to conduct incidentresponse or a live forensics audit activities. By providing the necessarybackground for understanding how incidents occur and how data can behidden on compromised systems, the reader will have a better understanding ofthe “whys” and “hows” of incident response and forensic audit activities. *It isimportant to note that regulatory issues are also pushing organizations towardbetter security and incident preparedness policies.

image

Inside Active Directory 2nd Edition - A System Administrator's Guide

This is an indispensable reference for anyone working with Active Directory. Network operating system novices will gain a solid understanding of Active Directory, while administrators experienced in NT, NetWare, or UNIX will learn how to utilize their current skills in Active Directory. Experienced Windows 2000/Windows Server 2003 professionals will pick up advanced techniques, and developers will benefit strongly from the architecture topics.

image

Work Book - Getting (and Staying) Ahead of Advanced Threats

This workbook is designed to help you stay ahead of advanced threats, control the costs of your current security environment, and identify opportunities for greater productivity.