Protecting security and privacy isn't easy - especially as we move toward smarter environments with more and more connected devices. But it is possible. Smart environments and the Internet of Things (IoT) may seem to be at odds with secure systems.
However, that isn't the case if you're ready for the challenge.
Being current and knowing how to put the latest techniques into practice takes a team approach, and we're here to help.
Solomon Consulting Inc. partners with your organization to stay current with the latest techniques from academia and industry to help protect your most valuable assets.
Does your organization need to develop a training program? We design, plan, and organize education and training offerings to groups of any size. Michael is committed to education and training and produces a wide array of educational materials.
Contact us today to get started!
Networking Fundamentals explores converging computer and communications technologies, such as transmission concepts, network hardware and software, protocols, and standards. It is also designed to serve the needs of those interested in understanding the field of computer networking and how it relates to other areas of Information Technology (IT). The material covered in this book provides the broad-based knowledge necessary to prepare students for further study in specialized networking fields, or may be used by those interested in an introduction to the field.
Today's networks are required to support an increasing array of real-time communication methods. Video chat, real-time messaging, and always-connected resources put demands on networks that were previously unimagined. The Second Edition of Fundamentals of Communications and Networking helps readers better understand today's networks and the way they support the evolving requirements of different types of organizations. It discusses the critical issues of designing a network that will meet an organization's performance needs and discusses how businesses use networks to solve business problems. Using numerous examples and exercises, this text incorporates hands-on activities to prepare readers to fully understand and design modern networks and their requirements.
More than 90 percent of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks against its well-publicized vulnerabilities. Revised and updated to keep pace with this ever changing field, Security Strategies in Windows Platforms and Applications, Second Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. Particular emphasis is placed on Windows XP, Vista, and 7 on the desktop, and Windows Server 2003 and 2008 versions. It highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security.
Revised and updated with the latest information from this fast-paced field, Fundamentals of Information System Security, Second Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Part 2 is adapted from the Official (ISC)2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. The book closes with a resource for readers who desire additional material on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security.
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security.
PMP Exam Cram, Fifth Edition, is the perfect study guide to help you pass the 2013 PMP Exam. It provides coverage and practice questions for every exam topic. The book contains an extensive set of preparation tools such as quizzes and Exam Alerts, while the CD-ROM provides real-time practice and feedback with a 200-question test engine.
The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure business and consumer privacy data. Using examples and exercises, this book incorporates hands-on activities to prepare readers to skillfully complete IT compliance auditing.
Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field.
Information systems and IT infrastructures are no longer void from governance and compliance given recent U.S.-based compliancy laws that were consummated during the early to mid-2000s. As a result of these laws, both public sector and private sector verticals must have proper security controls in place. Auditing IT Infrastructures for Compliance identifies and explains what each of these compliancy laws requires. It then goes on to discuss how to audit an IT infrastructure for compliance based on the laws and the need to protect and secure business and consumer privacy data. It closes with a resource for readers who desire more information on becoming skilled at IT auditing and IT compliance auditing.
Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today.
More than 90 percent of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks against its well-publicized vulnerabilities. Written by an industry expert, Security Strategies in Windows Platforms and Applications focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. Particular emphasis is placed on Windows XP, Vista, and 7 on the desktop, and Windows Server 2003 and 2008 versions. It highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security strategies and techniques.
PMP Exam Cram, Fourth Edition, is the perfect study guide to help you pass the 2009 PMP Exam. It provides coverage and practice questions for every exam topic. The book contains an extensive set of preparation tools such as quizzes and Exam Alerts, while the CD-ROM provides real-time practice and feedback with a 200-question test engine.
The PMP Exam Cram 2, Second Edition provides PMP exam candidates a condensed and focused study vehicle. Organized for optimal learning of criccal project management steps, it covers all objective areas presented by PMI. Candidates using the PMP Exam Cram 2, Second Edition will be able to easily decipher and effectively use PMI's PMBOK. You'll also find notes, tips and cautions to extend on PMP content, and it will explain the differences between traditional methods of project management and what PMI considers to be good project management techniques.
A comprehensive survey of the most current and critical information security practices,Information Security Illuminated is an excellent introduction to the fundamental concepts and applications for students and professionals alike. Key security concepts are discussed with clear, accessible language and reinforced by a large number of scenario-based exercises and practical review questions. Readers are then able to apply their knowledge through hands-on experience with computer security-related tools. Coverage begins with the basics of computer security (CIA and DAD triads, risk analysis, etc.), and moves quickly through to important, real-world topics such as access control methodologies, security principles and practices, business continuity planning and disaster recovery, firewalls, incident handling, and much more. In addition to providing the requisite material for a complete course in information security practices, the book can be used as a self-study guide for many of the basic security certifications.
The Security+ Exam Cram 2 Lab Manual gives you optimal time with hands-on exercises designed to complement and reinfocrce material you have read in the corresponding Exam Cram 2 book or learned in a classroom setting. You will perform tasks you have learned about in other references and that directly related to the exam objectives.
The CISSP(Certified Information Systems Security Professional) certification was developed to validate mastery of an international standard for information security. Topics covered in this exam guide include security architecture, access control systems, cryptography, operations and physical security, law, investigation and ethics. The CD-ROM features an advanced testing engine with hundreds of sample exam questions, electronic flashcards and the entire book in PDF format.
The Security+ certification is CompTIA's response to membership requests to develop a foundation-level certification for security workers. The IT industry is in agreement that there is a need to better train, staff, and empower those tasked with designing and implementing information security, and Security+ is an effort to meet this demand. The exam is under consideration by Microsoft as the baseline security certification for Microsoft's new security certification initiative.