Tag: Securing

Securing Cloud Functions on Google Cloud


Free Download Securing Cloud Functions on Google Cloud
Released 7/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 1h 40m | Size: 186 MB
With the rising popularity of serverless computing, organizations face increasingly complex levels of risks. Cloud-based services such as Google Cloud Platform (GCP) have become essential in today’s business world, but how do you keep your data secure?

(more…)

Securing PHP Apps


Free Download Securing PHP Apps by Ben Edmunds
English | PDF (True) | 2016 | 64 Pages | ISBN : 1484221192 | 4.1 MB
Secure your PHP-based web applications with this compact handbook. You’ll get clear, practical and actionable details on how to secure various parts of your PHP web application. You’ll also find scenarios to handle and improve existing legacy issues.

(more…)

Invaluable Knowledge Securing Your Company’s Technical Expertise


Free Download William J. Rothwell, "Invaluable Knowledge: Securing Your Company’s Technical Expertise"
English | 2011 | ISBN: 081441639X | PDF | pages: 225 | 1.1 mb
As organizations face a loss of people due to retirement, resignation, or disability, leaders are paying more attention to their talent management strategies, from grooming internal successors to aggressively recruiting from their competitors. The need is most acute in technical and other ‘knowledge’ areas, where the loss of a particular skill set demands an equally focused response. "Invaluable Knowledge" clarifies the unique (and urgent) issues of attracting, developing, retaining, and transferring the knowledge of IT professionals, engineers, accountants, analysts, and other specialists. The book’s structure follows a typical talent cycle, from identifying recruitment challenges, to hiring and training top talent, to building career development initiatives, and finally, to laying the groundwork for the next generation. "Invaluable Knowledge" makes an indisputable case for the importance of this specific facet of talent management, and offers practical examples, repeatable processes,

(more…)

Piracy, Maritime Terrorism and Securing the Malacca Straits


Free Download Graham Gerard Ong-Webb, "Piracy, Maritime Terrorism and Securing the Malacca Straits"
English | 2006 | pages: 304 | ISBN: 981230391X, 9812304177 | PDF | 3,7 mb
Maritime piracy continues to persist as a significant phenomenon manifesting a range of social, historical, geo-political, security and economic issues. Today, the waters of Southeast Asia serve as the dominant region for the occurrence of piracy and the challenges it poses to regional security and Malacca Straits security. As a second installment within the Series on Maritime Issues and Piracy in Asia by the International Institute of Asian Studies, Leiden University, and the Institute of Southeast Asian Studies, the authors of this volume add fresh perspectives to the ongoing debate about piracy, the threat of maritime terrorism, and the challenge of securing the Malacca Straits today.

(more…)

Securing Sierra Leone, 1997-2013 Defence, Diplomacy and Development in Action


Free Download Peter Albrecht, Paul Jackson, "Securing Sierra Leone, 1997-2013: Defence, Diplomacy and Development in Action"
English | 2017 | ISBN: 1138180416, 1138892297 | EPUB | pages: 185 | 1.2 mb
Between 1991 and 2002, Sierra Leone was wracked by a devastating civil war and the complete collapse of state institutions. Since then, however, the UK’s contribution to post-war reconstruction has been widely held up as an example of successful stabilisation and state-building – particularly of the country’s security and justice institutions.

(more…)

Securing the IoT Security Risks


Free Download Securing the IoT Security Risks
Released 5/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 1h 13m | Size: 157 MB
The Internet of Things (IoT) connects people, infrastructure, and things. Businesses and consumers recognize the value of integrating IoT products and systems into their infrastructure, and manufacturers continue to develop devices to join the Internet of Things. However, many devices are insecure, which can result in an attack with devastating consequences. Malicious actors can leverage IoT vulnerabilities to launch attacks, such as infecting devices with malware, creating an IoT botnet, and denying sleep.

(more…)

Securing Software as a Service (SaaS)


Duration: 54m | Video: 1280×720 30fps | Audio: AAC, 48 kHz, 2ch | Size: 220 MB
Genre: eLearning | Language: English
Software as a service (SaaS) makes up the majority of all cloud consumption, but guidance for cloud security commonly focuses on IaaS. This course is designed to help organizations implement security measures to mitigate the cybersecurity risks specifically introduced by the use of SaaS applications, which often contain extremely sensitive information.
Join instructor and cybersecurity expert Jerich Beason to learn all about the SaaS threat landscape, the security controls lifecycle, options for security tooling, and more. Whether you’re a cybersecurity professional working on a high-level IT team, or a career changer building up new skills, this course equips you with the technical know-how to start protecting your part of the SaaS app shared responsibility model.

(more…)