Follow us on Twitter »
Join us on Facebook »
AVG and CMO Council Logos
BPI Network Children Online College News
Online Scams - Don’t just click, it could be a trick
Cyber Safety Books

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners - Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time. Purchase Now

 

Cybersecurity: The Essential Body Of Knowledge Cybersecurity: The Essential Body Of Knowledge - This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization.  Purchase Now

 

IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data - IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. Purchase Now

 

Information Assurance: Security in the Information Environment (Computer Communications and Networks) Information Assurance: Security in the Information Environment (Computer Communications and Networks) - This updated edition will help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets. It contains major updates and three new chapters. The book uniquely bridges the gap between information security, information systems security and information warfare. It re-examines why organizations need to take information assurance seriously. Purchase Now

 

Information Security Policies and Procedures: A Practitioner's Reference, Second Edition Information Security Policies and Procedures: A Practitioner's Reference, Second Edition - This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. Purchase Now

 

Real People.
Real Scam Stories.
Real People. real StoriesI had just been fired from my job when I saw an ad on a local classified website that said "help wanted" for a job "processing online ads". The ad indicated that there were only a few positions available…

Read full story »
© 2018 CMO Council | Privacy Statement