If the TSTC Library doesn't have the eBook, audiobook journal, or article you are looking for, you can make a recommendation by emailing us at asklibrary@tstc.edu or by completing the form below.
Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation.
In this practical and relevant book, Brown uses his experience as a proven science communicator to cover three levels of writing: fundamental craft considerations, such as narrative tension, structure, sentences, and audience; unique scientific considerations, such as conveying numbers and utilizing metaphors; and finally, social considerations, such as public speaking and writing inside and outside of silos.
This focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time.
A team of veteran IT professionals and educators delivers an up-to-date and easy-to-follow introduction to Amazon's industry-leading cloud technology and the introductory certification exam that demonstrates your understanding of it.
Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
Using real life examples in JavaScript, PHP, Java, Python, and many other programming languages, this cookbook provides proven recipes to help you scale and maintain large systems.
This book investigates Cyber Resilience in Critical Infrastructure by paying attention to recommending a national-level cyber resilience framework for all nations to use.
Whether you are a security analyst, senior analyst, or executive, this book will provide you with the necessary insights and strategies to ensure maximum performance and long-term success for your SOFC.
This book Is for management and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments.
This book describes the assessment, planning, monitoring, and resource allocation tasks each company must undertake for successful vulnerability management. And it enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations.
Information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.