0% found this document useful (0 votes)
193 views125 pages

Saemm Bs Cybersecurity Syllabuses

The document outlines a comprehensive curriculum for cybersecurity education, covering various aspects such as project enabling processes, governance, risk management, and technical processes. It includes detailed sections on software implementation, network security, cryptography, and ethical hacking, emphasizing the importance of security policies and compliance. The content is structured into multiple parts, each addressing critical components necessary for developing a robust cybersecurity framework.

Uploaded by

Steffi Claro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
193 views125 pages

Saemm Bs Cybersecurity Syllabuses

The document outlines a comprehensive curriculum for cybersecurity education, covering various aspects such as project enabling processes, governance, risk management, and technical processes. It includes detailed sections on software implementation, network security, cryptography, and ethical hacking, emphasizing the importance of security policies and compliance. The content is structured into multiple parts, each addressing critical components necessary for developing a robust cybersecurity framework.

Uploaded by

Steffi Claro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 125

SAEMM BS CYBERSECURITY SYLLABUSES PART 4: ORGANIZATIONAL PROJECT ENABLING PROCESSES

INTRODUCTION TO PROJECT ENABLING PROCESSES


INTRODUCTION TO CYBERSECURITY GOVERNANCE AND OVERSIGHT OF ICT PROJECTS
STRATEGIC ALIGNMENT WITH CYBERSECURITY GOALS
TITLE OF THE BOOK: FOUNDATIONS AND FRAMEWORKS OF ESTABLISHING SECURITY POLICIES AND PROCEDURES
CYBERSECURITY: A COMPREHENSIVE GUIDE TO GOVERNANCE, LIFECYCLE, LEADERSHIP AND ROLES IN SECURE PROJECTS
AND SECURITY MATURITY MODELS SECURITY TRAINING AND AWARENESS
PART 1: INTRODUCTION TO CYBERSECURITY ENABLING INFRASTRUCTURE AND TECHNOLOGY
UNDERSTANDING CYBERSECURITY FUNDAMENTALS RISK MANAGEMENT ENABLEMENT
THE EVOLUTION OF CYBERSECURITY IN THE DIGITAL ERA MATURITY IN ORGANIZATIONAL PROJECT ENABLEMENT
KEY TERMINOLOGY AND CONCEPTS IN CYBERSECURITY EVALUATING ENABLING PROCESS SUCCESS
THREATS, VULNERABILITIES, AND RISKS OVERVIEW PART 5: PROJECT PROCESSES
THE ROLE OF CYBERSECURITY IN MODERN ORGANIZATIONS PLANNING FOR SECURE ICT PROJECTS
GLOBAL STANDARDS AND FRAMEWORKS IN CYBERSECURITY REQUIREMENTS ENGINEERING AND SECURITY
LEGAL, ETHICAL, AND REGULATORY ASPECTS SYSTEM ARCHITECTURE AND DESIGN PRINCIPLES
CYBERSECURITY IN VARIOUS SECTORS SECURE IMPLEMENTATION TECHNIQUES
THE HUMAN ELEMENT IN CYBERSECURITY VERIFICATION AND VALIDATION PROCESSES
TRENDS AND THE FUTURE OF CYBERSECURITY PROJECT RISK ASSESSMENT AND RESPONSE
PART 2: LIFECYCLE MANAGEMENT SECURE DEPLOYMENT STRATEGIES
OVERVIEW OF SYSTEM LIFECYCLE MANAGEMENT PROJECT CLOSURE AND SECURITY DOCUMENTATION
LIFECYCLE PHASES IN INFORMATION SYSTEMS MANAGING PROJECT SCOPE AND SECURITY GOALS
SECURE DESIGN IN THE LIFECYCLE LESSONS LEARNED AND SECURITY METRICS
RISK MANAGEMENT ACROSS THE LIFECYCLE PART 6: TECHNICAL PROCESSES
CHANGE AND CONFIGURATION CONTROL TECHNICAL REQUIREMENTS AND SECURITY CONSIDERATIONS
ASSET AND CONFIGURATION MANAGEMENT STRATEGIES SECURE DESIGN AND ARCHITECTURE BEST PRACTICES
LIFECYCLE DOCUMENTATION AND COMPLIANCE SYSTEM INTEGRATION AND SECURITY CHECKS
LIFECYCLE-BASED SECURITY TESTING DATA PROTECTION THROUGH TECHNICAL MEASURES
INTEGRATION OF SECURITY CONTROLS IN THE LIFECYCLE CRYPTOGRAPHIC TECHNIQUES AND APPLICATIONS
CONTINUOUS IMPROVEMENT IN LIFECYCLE SECURITY NETWORK AND INFRASTRUCTURE SECURITY
PART 3: THE AGREEMENT PROCESSES MONITORING AND INCIDENT DETECTION TECHNOLOGIES
UNDERSTANDING AGREEMENT PROCESSES IN PROJECTS TECHNICAL RISK MANAGEMENT
CONTRACTUAL AND REGULATORY FRAMEWORKS SYSTEM DECOMMISSIONING AND DATA SANITIZATION
PROCUREMENT AND SUPPLIER AGREEMENTS TECHNICAL COMPLIANCE WITH SECURITY STANDARDS
RISK ALLOCATION IN AGREEMENTS PART 7: SOFTWARE IMPLEMENTATION PROCESS GROUP
COMPLIANCE REQUIREMENTS IN CONTRACTS SECURE SOFTWARE DEVELOPMENT LIFECYCLE
ENSURING SECURITY IN AGREEMENTS PLANNING FOR SECURE IMPLEMENTATION
SERVICE LEVEL AGREEMENTS AND SECURITY EXPECTATIONS REQUIREMENT TRACEABILITY AND SECURE CODING
LEGAL LIABILITY AND CYBERSECURITY PROVISIONS SECURITY IN SOFTWARE ARCHITECTURE
MONITORING AGREEMENT COMPLIANCE STATIC AND DYNAMIC ANALYSIS TOOLS
CASE STUDIES IN SECURE AGREEMENT PROCESSES IMPLEMENTATION PHASE TESTING AND EVALUATION
INTEGRATION OF THIRD-PARTY SOFTWARE SECURELY
CODE REVIEW AND VULNERABILITY MANAGEMENT NETWORK SECURITY
SECURE BUILD AND DEPLOYMENT STRATEGIES
CONTINUOUS INTEGRATION AND SECURE DELIVERY TITLE OF THE BOOK: MASTERING NETWORK SECURITY: STRATEGIES,
PART 8: SOFTWARE SUPPORTING PROCESSES AND SOFTWARE REUSE TECHNOLOGIES, AND ARCHITECTURES FOR A SECURE DIGITAL WORLD
INTRODUCTION TO SUPPORTING SOFTWARE PROCESSES PART 1: NETWORK SECURITY OVERVIEW
DOCUMENTATION AND SECURE USER MANUALS INTRODUCTION TO NETWORK SECURITY PRINCIPLES
MAINTENANCE AND PATCH MANAGEMENT THE EVOLUTION OF NETWORK SECURITY PRACTICES
CONFIGURATION AND VERSION CONTROL KEY COMPONENTS OF A SECURE NETWORK
HELP DESK AND SUPPORT PROCESS SECURITY THREAT LANDSCAPE IN NETWORK ENVIRONMENTS
MANAGING SOFTWARE REUSE RISKS TYPES OF ATTACKS ON NETWORKS
REUSE OF COMPONENTS: LICENSING AND TRUST ROLES AND RESPONSIBILITIES IN NETWORK SECURITY
VERIFICATION OF REUSED SOFTWARE INTEGRITY OVERVIEW OF NETWORK SECURITY ARCHITECTURE
SECURE INTEGRATION OF LEGACY COMPONENTS NETWORK SECURITY IN ENTERPRISE ENVIRONMENTS
SUSTAINING SUPPORT FOR SECURE SOFTWARE CLOUD-BASED NETWORK SECURITY TRENDS
PART 9: STANDARD PROCESS MODELS TO SECURE INFORMATION AND IMPORTANCE OF DEFENSE-IN-DEPTH STRATEGIES
COMMUNICATIONS TECHNOLOGY PART 2: UNDERSTANDING VULNERABILITIES—THE NEED FOR SECURITY
IMPORTANCE OF STANDARD PROCESS MODELS IDENTIFYING NETWORK VULNERABILITIES
ISO/IEC 27001 AND RELATED FRAMEWORKS VULNERABILITY ASSESSMENT TOOLS AND TECHNIQUES
NIST CYBERSECURITY FRAMEWORK OVERVIEW COMMON NETWORK THREAT VECTORS
ITIL AND SECURITY INTEGRATION SOCIAL ENGINEERING AND HUMAN EXPLOITS
COBIT FOR GOVERNANCE AND SECURITY ALIGNMENT MISCONFIGURATIONS AND SECURITY FLAWS
INTEGRATION OF SECURITY INTO AGILE AND DEVOPS INSIDER THREATS AND ACCESS MISUSE
MODEL-DRIVEN SECURITY ENGINEERING REAL-WORLD EXPLOITS AND CASE STUDIES
EVALUATING AND SELECTING STANDARD MODELS IMPORTANCE OF PATCH MANAGEMENT
ADAPTING STANDARDS TO ORGANIZATION NEEDS ZERO-DAY VULNERABILITIES AND ADVANCED PERSISTENT THREATS
CASE EXAMPLES OF STANDARD PROCESS MODEL SUCCESS BUILDING A PROACTIVE SECURITY MINDSET
PART 10: SECURITY MATURITY MODELS AND ICT REGULATORY ALIGNMENT PART 3: UNDERSTANDING DEFENSES
THE SYSTEMS SECURITY ENGINEERING CAPABILITY MATURITY MODEL (ISO LAYERS OF NETWORK DEFENSE MECHANISMS
21827) NETWORK SEGMENTATION AND ISOLATION
PRINCIPLES OF SSE-CMM AND APPLICATION ACCESS CONTROL AND AUTHORIZATION MODELS
THE SOFTWARE ASSURANCE MATURITY MODEL EXPLAINED SECURITY BY OBSCURITY: MYTHS AND FACTS
IMPLEMENTING SAMM IN REAL ENVIRONMENTS SECURITY HARDENING TECHNIQUES
BUILDING SECURITY IN MATURITY MODEL OVERVIEW UNDERSTANDING RISK MANAGEMENT FRAMEWORKS
COMPARATIVE REVIEW OF SECURITY MATURITY MODELS IMPLEMENTING DEFENSE STRATEGIES ACROSS NETWORK LAYERS
ALIGNING ICT STRATEGY WITH LEGAL MANDATES INCIDENT RESPONSE AND MITIGATION TECHNIQUES
MEETING INDUSTRY-SPECIFIC COMPLIANCE NEEDS THREAT INTELLIGENCE INTEGRATION
AUDITING AND REPORTING FOR MATURITY AND COMPLIANCE DEFENSE STRATEGIES FOR MODERN HYBRID NETWORKS
ACHIEVING CONTINUOUS REGULATORY ALIGNMENT AND SECURITY PART 4: CRYPTOGRAPHY
EXCELLENCE HISTORY AND FOUNDATIONS OF CRYPTOGRAPHY
SYMMETRIC VS ASYMMETRIC ENCRYPTION WEB BROWSER SECURITY FEATURES AND RISKS
HASHING AND INTEGRITY PROTECTION SECURITY CONSIDERATIONS FOR APIS AND MICROSERVICES
DIGITAL SIGNATURES AND AUTHENTICATION PART 8: NETWORK DEVICES AND INFRASTRUCTURE SECURITY
CERTIFICATE AUTHORITIES AND TRUST MODELS ROUTER SECURITY FUNDAMENTALS
KEY MANAGEMENT AND EXCHANGE PROTOCOLS CONFIGURING ROUTERS FOR MAXIMUM SECURITY
CRYPTOGRAPHIC PROTOCOLS IN NETWORK SECURITY ROLE OF SWITCHES IN NETWORK SEGMENTATION
USE OF CRYPTOGRAPHY IN SECURE COMMUNICATIONS FIREWALL TYPES AND CONFIGURATIONS
CHALLENGES IN IMPLEMENTING CRYPTOGRAPHIC SYSTEMS PACKET FILTERING VS STATEFUL INSPECTION
EMERGING TRENDS IN POST-QUANTUM CRYPTOGRAPHY FIREWALL RULES AND BEST PRACTICES
PART 5: SECURITY POLICIES INTRUSION DETECTION SYSTEM CONCEPTS
DEVELOPING EFFECTIVE SECURITY POLICIES INTRUSION PREVENTION SYSTEMS AND USE CASES
TYPES OF NETWORK SECURITY POLICIES INTEGRATION OF IDS/IPS WITH SIEM SOLUTIONS
POLICY ENFORCEMENT TECHNIQUES CONTINUOUS MONITORING OF NETWORK INFRASTRUCTURE
ROLE-BASED ACCESS AND CONTROL POLICIES PART 9: SECURE CONNECTIVITY AND REMOTE ACCESS
ACCEPTABLE USE AND BYOD POLICIES REMOTE ACCESS RISKS AND CHALLENGES
POLICY AUDITS AND REVISIONS AUTHENTICATION FOR REMOTE ACCESS USERS
LEGAL AND COMPLIANCE IMPLICATIONS SECURE REMOTE DESKTOP PROTOCOLS
EMPLOYEE AWARENESS AND POLICY TRAINING IMPLEMENTING AND MANAGING VPNS
GOVERNANCE MODELS IN NETWORK SECURITY TYPES OF VPN TECHNOLOGIES
METRICS FOR POLICY EFFECTIVENESS VPN ENCRYPTION AND AUTHENTICATION
PART 6: SECURE DESIGN PUBLIC KEY INFRASTRUCTURE FUNDAMENTALS
PRINCIPLES OF SECURE NETWORK ARCHITECTURE CERTIFICATE MANAGEMENT AND REVOCATION
DESIGNING FOR RESILIENCE AND REDUNDANCY USE OF PKI IN ENTERPRISE ENVIRONMENTS
INCORPORATING SECURITY EARLY IN DESIGN ENHANCING TRUST WITH HARDWARE-BASED SECURITY
ZERO TRUST NETWORK DESIGN PART 10: WIRELESS SECURITY, LOGGING, AND AUDITING
SECURE DESIGN PATTERNS AND FRAMEWORKS INTRODUCTION TO WIRELESS NETWORK THREATS
ARCHITECTURAL FLAWS AND REDESIGN TACTICS WIRELESS ENCRYPTION STANDARDS AND PROTOCOLS
DESIGNING SECURE REMOTE AND CLOUD ACCESS ROGUE ACCESS POINTS AND WIRELESS INTRUSIONS
ROLE OF SECURITY IN SOFTWARE-DEFINED NETWORKING WIRELESS NETWORK MONITORING TOOLS
DESIGNING FOR SCALABILITY AND SECURITY WIRELESS ACCESS CONTROL MEASURES
CASE STUDIES IN SECURE INFRASTRUCTURE DESIGN IMPORTANCE OF LOGGING IN NETWORK SECURITY
PART 7: WEB SECURITY CENTRALIZED VS DISTRIBUTED LOGGING
COMMON WEB-BASED THREATS AND VULNERABILITIES AUDITING TECHNIQUES FOR NETWORK EVENTS
SECURING WEB SERVERS AND APPLICATIONS LOG ANALYSIS AND THREAT HUNTING
SECURE WEB COMMUNICATION PROTOCOLS BUILDING A LOGGING AND AUDITING STRATEGY FOR COMPLIANCE
WEB APPLICATION FIREWALLS AND THEIR ROLE
PROTECTION AGAINST SQL INJECTION AND XSS CRYPTOGRAPHY
CERTIFICATE MANAGEMENT FOR SECURE WEB ACCESS
SECURE SOCKETS LAYER AND TLS BEST PRACTICES TITLE OF THE BOOK: PRINCIPLES AND FOUNDATIONS OF CRYPTOGRAPHY:
AUTHENTICATION MECHANISMS FOR WEB SERVICES FROM CLASSICAL CIPHERS TO PROVABLE SECURITY
PART 1: MATHEMATICAL FOUNDATIONS OF CRYPTOGRAPHY APPLICATIONS OF INFORMATION THEORETIC SECURITY
INTRODUCTION TO MODULAR ARITHMETIC AND APPLICATIONS QUANTUM IMPLICATIONS ON INFORMATION SECURITY
GROUPS AND THEIR ROLE IN CRYPTOGRAPHY REDUNDANCY AND ERROR-CORRECTING CODES
EXPLORING FINITE FIELDS IN CRYPTOGRAPHIC SYSTEMS COMBINING THEORY WITH PRACTICAL MODELS
PROBABILITY THEORY IN CRYPTOGRAPHIC CONTEXT PART 5: SYMMETRIC CRYPTOGRAPHY
NUMBER THEORY ESSENTIALS FOR CRYPTOGRAPHY OVERVIEW OF SYMMETRIC ENCRYPTION
ALGEBRAIC STRUCTURES IN CRYPTOSYSTEMS BLOCK CIPHER DESIGN AND ARCHITECTURE
POLYNOMIAL ARITHMETIC IN FINITE FIELDS STREAM CIPHERS AND FEEDBACK MODES
THE ROLE OF INVERSES AND ORDERS IN GROUPS ADVANCED ENCRYPTION STANDARD (AES)
DISCRETE STRUCTURES AND MATHEMATICAL PROOF TECHNIQUES DATA ENCRYPTION STANDARD (DES) AND HISTORY
CRYPTOGRAPHIC USE OF RANDOMNESS AND DISTRIBUTIONS CIPHER BLOCK CHAINING AND OTHER MODES
PART 2: ELLIPTIC CURVE CRYPTOGRAPHY PADDING SCHEMES AND SECURITY IMPLICATIONS
BASICS OF ELLIPTIC CURVES OVER FINITE FIELDS LIGHTWEIGHT AND EMBEDDED CIPHERS
GROUP LAW ON ELLIPTIC CURVES CRYPTANALYSIS OF SYMMETRIC CIPHERS
SCALAR MULTIPLICATION TECHNIQUES FUTURE DIRECTIONS IN SYMMETRIC ENCRYPTION
APPLICATIONS OF ELLIPTIC CURVES IN CRYPTOGRAPHY PART 6: KEY MANAGEMENT AND PUBLIC KEY BASICS
ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM SYMMETRIC KEY DISTRIBUTION METHODS
SECURITY OF ELLIPTIC CURVE CRYPTOSYSTEMS NEED FOR SECURE KEY MANAGEMENT
ELLIPTIC CURVE DIFFIE-HELLMAN KEY EXCHANGE INTRODUCTION TO PUBLIC KEY ENCRYPTION
CURVE SELECTION AND STANDARDS RSA ALGORITHM: DESIGN AND FUNCTIONALITY
ATTACKS AGAINST ELLIPTIC CURVE SYSTEMS ELGAMAL ENCRYPTION AND VARIANTS
ADVANCED TOPICS IN ELLIPTIC CURVE CRYPTOGRAPHY HYBRID ENCRYPTION SYSTEMS
PART 3: HISTORICAL CIPHERS AND CLASSICAL TECHNIQUES SECURE KEY EXCHANGE METHODS
INTRODUCTION TO HISTORICAL CRYPTOGRAPHY DIGITAL SIGNATURES: CONCEPTS AND USES
THE CAESAR CIPHER AND SUBSTITUTION TECHNIQUES HASH FUNCTIONS AND MESSAGE INTEGRITY
TRANSPOSITION CIPHERS AND THEIR ANALYSIS COMBINING HASHING WITH SIGNATURES
THE ENIGMA MACHINE AND ITS LEGACY PART 7: PRIMES, FACTORING, AND DISCRETE LOGARITHMS
FREQUENCY ANALYSIS AND CRYPTANALYSIS PRIMALITY TESTING ALGORITHMS
POLYALPHABETIC CIPHERS AND VIGENÈRE TECHNIQUES FERMAT, MILLER-RABIN, AND AKS TESTS
HILL CIPHER AND MATRIX ENCRYPTION INTEGER FACTORIZATION METHODS
PLAYFAIR AND OTHER MANUAL CIPHERS RSA AND DEPENDENCE ON FACTORING
EVOLUTION FROM CLASSICAL TO MODERN CRYPTOGRAPHY UNDERSTANDING THE DISCRETE LOGARITHM PROBLEM
LESSONS LEARNED FROM HISTORICAL CRYPTANALYSIS APPLICATIONS IN CRYPTOGRAPHIC PROTOCOLS
PART 4: INFORMATION THEORETIC SECURITY ALGORITHMS FOR SOLVING DISCRETE LOGS
CONCEPT OF PERFECT SECRECY HARDNESS ASSUMPTIONS IN CRYPTOGRAPHY
SHANNON'S THEORY AND ONE-TIME PAD QUANTUM COMPUTING AND SHOR’S ALGORITHM
LIMITATIONS OF INFORMATION THEORETIC APPROACHES COMPARATIVE ANALYSIS OF HARD PROBLEMS
ENTROPY AND KEY LENGTH REQUIREMENTS PART 8: INFRASTRUCTURE AND IMPLEMENTATION
SECURE COMMUNICATION CHANNELS KEY EXCHANGE PROTOCOLS IN PRACTICE
SECRECY CAPACITY AND WIRETAP CHANNELS SIGNATURE SCHEMES AND ALGORITHMS
IMPLEMENTATION CHALLENGES IN CRYPTOGRAPHY PHASES OF ETHICAL HACKING ENGAGEMENT
SIDE-CHANNEL AND TIMING ATTACKS PENETRATION TESTING VS VULNERABILITY ASSESSMENT
PUBLIC KEY INFRASTRUCTURE OVERVIEW HACKING METHODOLOGIES AND FRAMEWORKS
CERTIFICATE AUTHORITIES AND TRUST MODELS UNDERSTANDING HACKING TOOLS AND PLATFORMS
REVOCATION MECHANISMS AND OCSP ETHICAL HACKING CERTIFICATIONS AND CAREER PATHS
INTEROPERABILITY AND STANDARDIZATION SETTING UP A LEGAL LAB ENVIRONMENT
HARDWARE AND SOFTWARE INTEGRATION PART 2: UNDERSTANDING TCP/IP AND NETWORK BASICS
SECURE CODING AND CRYPTOGRAPHIC LIBRARIES INTRODUCTION TO TCP/IP CONCEPTS
PART 9: ATTACKS AND SECURITY DEFINITIONS IP ADDRESSING AND SUBNETTING ESSENTIALS
OVERVIEW OF ATTACKS ON CRYPTOGRAPHIC SYSTEMS UNDERSTANDING PORTS AND PROTOCOLS
CHOSEN PLAINTEXT AND CIPHERTEXT ATTACKS TCP HANDSHAKE AND COMMUNICATION FLOW
ADAPTIVE AND REPLAY ATTACK STRATEGIES PACKET STRUCTURE AND ANALYSIS
ATTACKS ON RSA AND ELGAMAL NETWORK DEVICES AND TOPOLOGIES
FORMAL DEFINITIONS OF CRYPTOGRAPHIC SECURITY NETWORK COMMUNICATION MODELS (OSI/DOD)
IND-CPA AND IND-CCA SECURITY MODELS PACKET CAPTURE AND ANALYSIS TOOLS
SEMANTIC SECURITY AND ITS IMPORTANCE IDENTIFYING NETWORK TRAFFIC PATTERNS
RELATIONSHIPS BETWEEN SECURITY NOTIONS USING TCP/IP KNOWLEDGE FOR EXPLOITATION
ATTACKER MODELS AND CAPABILITIES PART 3: COMPUTER AND NETWORK ATTACKS
DESIGN PRINCIPLES TO RESIST KNOWN ATTACKS OVERVIEW OF COMMON NETWORK ATTACKS
PART 10: THEORETICAL MODELS AND PROVABLE SECURITY DENIAL OF SERVICE AND DISTRIBUTED DOS
INTRODUCTION TO COMPLEXITY THEORY IN CRYPTOGRAPHY MALWARE TYPES AND DELIVERY METHODS
REDUCTIONS AND SECURITY PROOFS MAN-IN-THE-MIDDLE ATTACKS
RANDOM ORACLE MODEL: BENEFITS AND CRITICISMS SPOOFING AND SNIFFING TECHNIQUES
PROVING SECURITY IN THE RANDOM ORACLE MODEL SESSION HIJACKING AND REPLAY ATTACKS
CONSTRUCTING PROOFS WITHOUT RANDOM ORACLES DNS AND ARP POISONING
SIMULATION-BASED DEFINITIONS AND TECHNIQUES ADVANCED PERSISTENT THREATS
CONCRETE VS ASYMPTOTIC SECURITY REAL-WORLD CASE STUDIES OF NETWORK BREACHES
PROVABLE SECURITY IN PRACTICE BUILDING ATTACK TREES AND THREAT MODELS
CHALLENGES IN BRIDGING THEORY AND IMPLEMENTATION PART 4: FOOTPRINTING AND SOCIAL ENGINEERING
THE FUTURE OF CRYPTOGRAPHIC RESEARCH AND ASSURANCE WHAT IS FOOTPRINTING? GOALS AND METHODS
PASSIVE VS ACTIVE RECONNAISSANCE
ETHICAL HACKING TOOLS FOR INFORMATION GATHERING
WHOIS AND DNS INTERROGATION
TITLE OF THE BOOK: MASTERING ETHICAL HACKING: TECHNIQUES, TOOLS, SEARCH ENGINE AND METADATA FOOTPRINTING
AND TACTICS FOR CYBERSECURITY EXPERTS EMAIL TRACKING AND RECON TECHNIQUES
PART 1: FOUNDATIONS OF ETHICAL HACKING UNDERSTANDING SOCIAL ENGINEERING TACTICS
INTRODUCTION TO ETHICAL HACKING PSYCHOLOGICAL PRINCIPLES OF DECEPTION
ROLES AND RESPONSIBILITIES OF AN ETHICAL HACKER SOCIAL ENGINEERING VIA EMAIL, PHONE, AND SOCIAL MEDIA
LEGAL AND ETHICAL CONSIDERATIONS REAL-WORLD EXPLOITS USING SOCIAL ENGINEERING
TYPES OF HACKERS AND HACKER MOTIVATION PART 5: PORT SCANNING AND ENUMERATION
FUNDAMENTALS OF PORT SCANNING INSECURE DIRECT OBJECT REFERENCES
TYPES OF PORT SCANS AND WHEN TO USE THEM WEB APPLICATION FIREWALLS AND BYPASS TECHNIQUES
INTERPRETING PORT SCAN RESULTS CASE STUDIES OF MAJOR WEB APPLICATION BREACHES
STEALTH AND EVASION TECHNIQUES IN SCANNING PART 9: WIRELESS, CRYPTOGRAPHY, AND NETWORK DEFENSE
USING NMAP AND ADVANCED SCAN OPTIONS INTRODUCTION TO WIRELESS NETWORK SECURITY
BANNER GRABBING AND SERVICE DETECTION WIRELESS STANDARDS AND ENCRYPTION PROTOCOLS
INTRODUCTION TO ENUMERATION TECHNIQUES WI-FI CRACKING AND DEAUTHENTICATION ATTACKS
ENUMERATING NETWORK SHARES AND SERVICES WIRELESS SNIFFING TOOLS AND TECHNIQUES
ENUMERATING USERS AND GROUPS BASICS OF CRYPTOGRAPHY FOR ETHICAL HACKERS
EXPLOITING ENUMERATED DATA FOR ACCESS SYMMETRIC AND ASYMMETRIC ENCRYPTION OVERVIEW
PART 6: PROGRAMMING AND SCRIPTING FOR SECURITY CRACKING PASSWORDS AND HASHES
WHY PROGRAMMING SKILLS MATTER FOR HACKERS OVERVIEW OF NETWORK PROTECTION SYSTEMS
BASICS OF PYTHON FOR SECURITY PROFESSIONALS FIREWALLS, IDS/IPS, AND HONEYPOTS
AUTOMATING RECONNAISSANCE WITH SCRIPTS IMPLEMENTING AND TESTING DEFENSIVE SYSTEMS
WRITING EXPLOITS AND PAYLOADS PART 10: FINAL PROJECT AND BEYOND
WEB SCRAPING AND DATA EXTRACTION STRUCTURING A PENETRATION TEST ENGAGEMENT
NETWORK SCRIPTING AND AUTOMATION DEFINING THE SCOPE AND RULES OF ENGAGEMENT
USING SHELL SCRIPTING FOR PENTESTING TASKS THREAT MODELING AND RISK ASSESSMENT
DEBUGGING AND CODE ANALYSIS CONDUCTING RECONNAISSANCE AND SCANNING
SECURE CODING PRACTICES AND VULNERABILITIES GAINING ACCESS AND MAINTAINING PERSISTENCE
TOOLS AND IDES FOR SECURITY CODING COVERING TRACKS AND AVOIDING DETECTION
PART 7: OPERATING SYSTEM VULNERABILITIES REPORTING FINDINGS AND RECOMMENDATIONS
ANATOMY OF OPERATING SYSTEM VULNERABILITIES PRESENTING RESULTS TO STAKEHOLDERS
DESKTOP OPERATING SYSTEMS: THREAT LANDSCAPE ETHICAL HACKING PROJECT CASE STUDY
SERVER OPERATING SYSTEMS: TARGETED EXPLOITS FUTURE TRENDS AND CHALLENGES IN ETHICAL HACKING
OS PRIVILEGE ESCALATION TECHNIQUES
PATCH MANAGEMENT AND OS HARDENING COLLEGE ENGLISH GRAMMAR
WINDOWS SECURITY FEATURES AND BYPASSES
LINUX EXPLOITS AND KERNEL VULNERABILITIES TITLE OF THE BOOK: MASTERING COLLEGE ENGLISH GRAMMAR:
EXPLOIT DEVELOPMENT FOR OS TARGETS STRUCTURE, STYLE, AND SYNTAX FOR ACADEMIC SUCCESS
ROOTKITS AND BACKDOOR IMPLEMENTATION PART 1: SENTENCE BUILDING FOUNDATIONS
PERSISTENCE MECHANISMS IN OS ENVIRONMENTS UNDERSTANDING SENTENCES WITH ONE SUBJECT AND ONE VERB
PART 8: EMBEDDED SYSTEMS AND WEB APPLICATION ATTACKS WRITING WITH MULTIPLE SUBJECTS AND VERBS
UNDERSTANDING EMBEDDED OPERATING SYSTEMS IDENTIFYING OBJECTS OF PREPOSITIONS VERSUS SUBJECTS
THREATS TO IOT AND EMBEDDED DEVICES USING MAIN VERBS AND HELPING VERBS ACCURATELY
EXPLOITING FIRMWARE AND DEVICE LOGIC DISTINGUISHING SINGULAR AND PLURAL SUBJECTS AND VERBS
REVERSE ENGINEERING EMBEDDED SOFTWARE CLARIFYING INDEFINITE PRONOUNS AS SUBJECTS
FUNDAMENTALS OF WEB APPLICATIONS EXPLORING SUBJECTS UNDERSTOOD IN A SPECIAL SENSE
CROSS-SITE SCRIPTING AND SQL INJECTION JOINING SUBJECTS WITH CONJUNCTIONS
SESSION MANAGEMENT ATTACKS CONSTRUCTING MEANINGFUL COMPOUND SENTENCES
WRITING EFFECTIVE COMPLEX SENTENCES RECOGNIZING AND FIXING FAULTY COMPARISONS
PART 2: AVOIDING SENTENCE ERRORS KEEPING SUBJECT-VERB-OBJECT ORDER CLEAR
RECOGNIZING AND AVOIDING RUN-ON SENTENCES AVOIDING OVERUSE OF PASSIVE VOICE
CORRECTING COMMA SPLICES IN ACADEMIC WRITING USING TRANSITIONAL WORDS AND PHRASES
FIXING SENTENCE FRAGMENTS AND INCOMPLETE THOUGHTS REWRITING SENTENCES FOR COHERENCE
USING PARENTHETICAL EXPRESSIONS CORRECTLY PART 6: BUILDING EFFECTIVE PARAGRAPHS
ENHANCING CLARITY WITH APPOSITIVES INTRODUCTION TO WRITING EFFECTIVE PARAGRAPHS
DISTINGUISHING RESTRICTIVE AND NONRESTRICTIVE CLAUSES UNDERSTANDING TOPIC SENTENCES AND FOCUS
COMMA PLACEMENT IN INTRODUCTORY PHRASES SUPPORTING IDEAS WITH EVIDENCE AND EXAMPLES
PUNCTUATION RULES FOR SERIES, DATES, AND ADDRESSES USING COHERENCE DEVICES IN PARAGRAPHS
COMBINING SENTENCES FOR BETTER FLOW WRITING UNITY IN ACADEMIC PARAGRAPHS
BALANCING SENTENCE LENGTH AND STRUCTURE AVOIDING REPETITION AND REDUNDANCY
PART 3: PRONOUN USAGE AND AGREEMENT ORGANIZING IDEAS LOGICALLY
UNDERSTANDING SUBJECT, OBJECT, AND POSSESSIVE PRONOUNS PARAGRAPH LENGTH AND STRUCTURE
USING PRONOUNS IN COMPARISONS APPROPRIATELY CREATING TRANSITIONS BETWEEN PARAGRAPHS
CLARIFYING PRONOUNS ENDING IN -SELF OR -SELVES PARAGRAPH PRACTICE AND PEER REVIEW
MATCHING PRONOUNS WITH THEIR ANTECEDENTS PART 7: ADVANCED SENTENCE TECHNIQUES
AVOIDING AMBIGUOUS PRONOUN REFERENCES PRACTICING PARALLEL STRUCTURE IN LISTS AND PHRASES
MAINTAINING PRONOUN CONSISTENCY ENHANCING STYLE WITH BALANCED SENTENCES
ORDER OF PRONOUNS IN COMPOUND CONSTRUCTIONS AVOIDING WORDINESS AND REDUNDANT PHRASES
AVOIDING PRONOUN CASE ERRORS EMPHASIZING IDEAS WITH SENTENCE VARIETY
SPELLING AND USING POSSESSIVE PRONOUNS PROPERLY COMBINING SENTENCES FOR STYLE AND EMPHASIS
ADVANCED PRONOUN USE IN FORMAL WRITING USING ELLIPSIS AND SUBORDINATION FOR FLOW
PART 4: MASTERING CAPITALIZATION AND PUNCTUATION EMPHASIZING THROUGH COORDINATION
RULES OF CAPITALIZATION IN SENTENCES AND TITLES AVOIDING CLICHÉS AND INFORMAL PHRASING
CAPITALIZATION IN PROPER NOUNS AND ACADEMIC TERMS DEVELOPING A FORMAL ACADEMIC TONE
USING COMMAS FOR CLARITY AND FLOW STRENGTHENING WRITING WITH STRONG VERBS
THE FUNCTIONS OF SEMICOLONS AND COLONS PART 8: GRAMMAR ACCURACY AND VERB MASTERY
EFFECTIVE USE OF QUOTATION MARKS UNDERSTANDING REGULAR AND IRREGULAR VERBS
APOSTROPHES FOR POSSESSION AND CONTRACTION MASTERING COMMON IRREGULAR VERB FORMS
DASHES AND PARENTHESES IN FORMAL WRITING USING VERBS IN PRESENT, PAST, AND FUTURE TENSES
USING PERIODS, QUESTION MARKS, AND EXCLAMATION POINTS MAINTAINING CONSISTENT VERB TENSE IN ESSAYS
COMMA USAGE IN RESTRICTIVE ELEMENTS RECOGNIZING AND FIXING VERB TENSE SHIFTS
REVIEW OF COMMON PUNCTUATION ERRORS SUBJECT-VERB AGREEMENT IN COMPLEX SENTENCES
PART 5: SENTENCE CLARITY AND STRUCTURE AVOIDING ERRORS WITH COLLECTIVE NOUNS
IDENTIFYING AND CORRECTING MISPLACED MODIFIERS USING MODAL VERBS IN ACADEMIC WRITING
AVOIDING DANGLING MODIFIERS IN ACADEMIC WRITING VERBALS: GERUNDS, PARTICIPLES, AND INFINITIVES
MAINTAINING LOGICAL SENTENCE FLOW PHRASAL VERBS IN FORMAL WRITING CONTEXTS
USING CONSISTENT VERB TENSE FOR CLARITY PART 9: GRAMMAR REVIEW AND REFINEMENT
SIMPLIFYING COMPLEX SENTENCES REVIEWING COMMON GRAMMAR PITFALLS
REFINING SENTENCE STRUCTURE THROUGH EDITING DIYALEKTO: REHIYONAL NA PAGKAKAIBA NG WIKA
USING GRAMMAR TOOLS AND RESOURCES EFFECTIVELY ETNOLEK: WIKA NG MGA KATUTUBO
SELF-EDITING FOR GRAMMAR AND MECHANICS CREOLE AT PIDGIN
PEER FEEDBACK ON GRAMMAR AND CLARITY KAHALAGAHAN NG MULTILINGGUWALISMO
PROOFREADING STRATEGIES FOR COLLEGE PAPERS PAGKAKAIBA-IBA SA PAGBIGKAS AT PAGBAYBAY
GRAMMAR CHECKLISTS FOR ACADEMIC WRITING WIKA SA TEKNOLOHIYA AT MIDYA
UNDERSTANDING STYLE GUIDES (APA, MLA) PAGGALANG SA BARYASYON NG WIKA
PREPARING FOR GRAMMAR IN EXAMS AND TESTS BAHAGI 3: REHISTRO AT DOMEYN PANGWIKA
PRACTICAL GRAMMAR EXERCISES FOR REVIEW ANO ANG REHISTRO NG WIKA?
PART 10: APPLICATION OF GRAMMAR IN ACADEMIC WRITING IBA’T IBANG REHISTRO: PORMAL AT DI-PORMAL
APPLYING GRAMMAR IN ESSAY WRITING WIKA SA EDUKASYON
GRAMMAR IN RESEARCH WRITING AND CITATIONS WIKA SA NEGOSYO
STRUCTURING SENTENCES IN ARGUMENTATIVE ESSAYS WIKA SA BATAS
GRAMMAR IN NARRATIVE AND DESCRIPTIVE WRITING WIKA SA MIDYA
FORMAL GRAMMAR IN PRESENTATIONS AND REPORTS WIKA SA SIMBAHAN
GRAMMAR IN SUMMARIES AND PARAPHRASING WIKA SA AGHAM AT TEKNOLOHIYA
ADAPTING GRAMMAR FOR VARIOUS ACADEMIC GENRES SITWASYONG PANGWIKA SA IBA’T IBANG LARANGAN
INTEGRATING SOURCES WITH GRAMMATICAL ACCURACY WIKA BILANG REPLEKSYON NG KONTEKSTO
WRITING WITH CLARITY, PRECISION, AND STYLE BAHAGI 4: KASAYSAYAN NG MGA WIKA SA PILIPINAS
GRAMMAR AS A FOUNDATION FOR ACADEMIC SUCCESS PANAHON NG KATUTUBO AT WIKANG PANREHIYON
PANAHON NG KASTILA AT PAG-USBONG NG WIKANG ESPANYOL
SINING NG KOMUNIKASYON PANAHON NG AMERIKANO AT WIKANG INGLES
PANAHON NG HAPON AT WIKANG NIPONGGO
PAMAGAT NG AKLAT: SINING NG KOMUNIKASYON: PAG-UNAWA SA WIKA PANAHON NG PAGPAPALAYA: WIKANG PAMBANSA
AT KULTURA SA MAKABAGONG PANAHON WIKANG FILIPINO: KASAYSAYAN AT PAGPAPAYABONG
BAHAGI 1: ANG WIKA SA PANLIPUNANG KONTEKSTO BATAS SA WIKA: KONSTITUSYON AT KAUTUSAN
KONSEPTO NG WIKA: DEPINISYON, KATANGIAN, AT KAHALAGAHAN KAHALAGAHAN NG WIKANG PAMBANSA
PAPEL NG WIKA SA LIPUNAN AT KULTURA PAGKILOS TUNGO SA MULTILINGGUWALISMO
TEORYA NG PINAGMULAN NG WIKA WIKA AT NASYONALISMO
WIKA BILANG KASANGKAPAN NG KOMUNIKASYON BAHAGI 5: KALIKASAN AT ESTRUKTURA NG WIKA
WIKA AT PANANAW SA DAIGDIG KATANGIAN NG WIKA: DINAMIKO AT BUHAY
PAGKAKAIBA NG WIKA, DIYALEKTO, AT IDYOLEK PONOLOHIYA: TUNOG NG WIKA
WIKA BILANG SIMBOLO NG IDENTIDAD MORPOLOHIYA: PAGBUO NG SALITA
WIKA SA KONTEKSTONG PILIPINO SINTAKSIS: PAGKAKASUNOD-SUNOD NG SALITA
EPEKTO NG GLOBALISASYON SA WIKA SEMANTIKA: KAHULUGAN NG SALITA
PAGSUSURI SA GAMIT NG WIKA SA LIPUNANG FILIPINO PRAGMATIKS: GAMIT NG WIKA SA SITWASYON
BAHAGI 2: BARAYTI AT BARYASYON NG WIKA PAGKAKAIBA NG LITERAL AT DI-LITERAL NA WIKA
PAGKILALA SA BARAYTI NG WIKA IDYOMA AT TAYUTAY
SOSYOLEK: WIKA SA IBA’T IBANG ANTAS NG LIPUNAN WIKA SA LARANGAN NG PANITIKAN
IDYOLEK: PANSARILING PARAAN NG PAGSASALITA WIKA AT ESTRUKTURANG PANRETORIKA
BAHAGI 6: ANG KOMUNIKASYON KOMUNIKASYONG DI-BERBAL SA PAGSASALITA
KAHULUGAN NG KOMUNIKASYON PANAYAM AT FORUM
PROSESO NG KOMUNIKASYON PAGSASANAY SA PAMPUBLIKONG PAGSASALITA
BERBAL AT DI-BERBAL NA KOMUNIKASYON PAGSASALITA SA VIRTUAL NA PLATAPORMA
MODELO NG KOMUNIKASYON BAHAGI 10: PAGBASA AT PAGSULAT SA AKADEMIKONG KONTEKSTO
URI NG KOMUNIKASYON: INTRAPERSONAL, INTERPERSONAL PAG-UNAWA SA LAYUNIN NG PAGBASA
KOMUNIKASYONG PAMPUBLIKO AT PANG-ORGANISASYON TEKNIK SA MAPANURING PAGBASA
KOMUNIKASYON SA TEKNOLOHIYA PAGTUKOY NG IMPORMASYON SA TEKSTO
EPEKTO NG KULTURA SA KOMUNIKASYON PAGPAPALAWAK NG TALASALITAAN
HADLANG SA EPEKTIBONG KOMUNIKASYON PAGSULAT BILANG KASANAYANG PANGKOMUNIKATIBO
MABISANG PARAAN NG KOMUNIKASYON HAKBANG SA MASINING NA PAGSULAT
BAHAGI 7: DISKURSO AT UGNAYAN NG MGA KAISIPAN URI NG AKADEMIKONG SULATIN
PAG-UNAWA SA DISKURSO PANANALIKSIK AT DOKUMENTASYON
MGA URI NG DISKURSO: PASALITA AT PASULAT REPLEKTIBONG PAGSULAT
KOHESYONG GRAMATIKAL SINING NG PAGBASA AT PAGSULAT SA MAKABAGONG PANAHON
KAUGNAYANG LOHIKAL NG MGA KAISIPAN
PAGPILI NG ESTILO AT REHISTRO PHILIPPINE HISTORY
DISKURSO SA AKADEMIKONG LARANGAN
DISKURSO SA MEDIA AT MIDYUM TITLE OF THE BOOK: PHILIPPINE HISTORY: FROM ORIGINS TO REVOLUTION
DISKURSO SA PULITIKA AT RELIHIYON AND BEYOND
INTERAKTIBONG DISKURSO PART 1: ORIGINS AND THE PRE-COLONIAL PHILIPPINES
PAGSUSURI SA ISTRUKTURA NG DISKURSO THE PHILIPPINE ARCHIPELAGO: GEOGRAPHY AND NATURAL SETTING
BAHAGI 8: PAKIKINIG BILANG KAKAYAHANG PANGKOMUNIKATIBO PEOPLES OF THE ISLANDS: MIGRATION AND EARLY SETTLEMENTS
KAHALAGAHAN NG PAKIKINIG PREHISTORIC PHILIPPINES: TOOLS, DWELLINGS, AND SOCIETIES
URI NG PAKIKINIG EARLY CUSTOMS AND PRACTICES OF INDIGENOUS FILIPINOS
AKTIBONG PAKIKINIG POLITICAL SYSTEMS AND LEADERSHIP BEFORE CONQUEST
PAKIKINIG SA TALUMPATI AT PAGTALAKAY TRADE, COMMERCE, AND FOREIGN CONTACTS IN EARLY SOCIETIES
PAKIKINIG SA RADYO AT MIDYA PRE-COLONIAL BELIEFS AND RELIGIOUS PRACTICES
HADLANG SA EPEKTIBONG PAKIKINIG LANGUAGE, LITERATURE, AND ORAL TRADITIONS
PAGSUSURI SA NARINIG ART, MUSIC, AND CULTURAL EXPRESSIONS
ESTRATEHIYA SA MASINING NA PAKIKINIG SOCIAL ORGANIZATION AND DAILY LIFE IN PRE-COLONIAL TIMES
PAGSASANAY SA KRITIKAL NA PAKIKINIG PART 2: SPANISH CONQUEST AND THE ROOTS OF COLONIAL RULE
PAKIKINIG BILANG GAMIT SA PANANALIKSIK THE ARRIVAL OF THE SPANIARDS IN THE PHILIPPINES
BAHAGI 9: PAGSASALITA AT PAGTATANGHAL SPANISH EXPLORATION AND THE ESTABLISHMENT OF SETTLEMENTS
KASANAYAN SA PAGSASALITA CONVERSION TO CHRISTIANITY AND THE ROLE OF THE CHURCH
PAGPAPAHAYAG NG SARILING OPINYON THE ENCOMIENDA SYSTEM AND ECONOMIC EXPLOITATION
TONO, HIMIG, AT AKSIYON SA PAGSASALITA RESISTANCE MOVEMENTS IN THE EARLY COLONIAL PERIOD
DAYALOGO AT PANAYAM INSTITUTIONAL STRUCTURES UNDER SPANISH RULE
TALUMPATI: URI AT BAHAGI LOCAL GOVERNANCE AND THE PRINCIPALIA CLASS
DEBATENG AKADEMIKO ROLE OF EDUCATION AND RELIGIOUS ORDERS
THE GALLEON TRADE AND ITS IMPACTS SOCIAL AND POLITICAL REFORMS UNDER U.S. RULE
CULTURAL SYNCRETISM: FUSION OF FILIPINO AND SPANISH INFLUENCES RISE OF FILIPINO POLITICIANS AND POLITICAL PARTIES
PART 3: THE FORMATION OF FILIPINO IDENTITY ECONOMIC POLICIES AND AMERICAN BUSINESS INTERESTS
INDIO TO FILIPINO: EMERGENCE OF NATIONAL CONSCIOUSNESS THE JONES LAW AND PROMISE OF INDEPENDENCE
THE ROLE OF THE ILUSTRADOS IN AWAKENING THE NATION TRANSITION TO SELF-GOVERNMENT
PROPAGANDA MOVEMENT: A CALL FOR REFORMS THE TYDINGS-MCDUFFIE ACT AND THE COMMONWEALTH
LA SOLIDARIDAD AND REFORMIST WRITINGS PART 7: WORLD WAR II AND THE JAPANESE OCCUPATION
JOSE RIZAL AND THE REFORMIST STRUGGLE PHILIPPINE PREPARATIONS FOR FULL INDEPENDENCE
MARCELO H. DEL PILAR AND GRACIANO LOPEZ JAENA JAPANESE INVASION AND THE FALL OF BATAAN
THE IMPACT OF NOLI ME TANGERE AND EL FILIBUSTERISMO THE DEATH MARCH AND OCCUPATION POLICIES
SPANISH REACTION AND THE EXECUTION OF GOMBURZA PUPPET GOVERNMENT AND COLLABORATION
SEEDS OF REVOLUTION: PUBLIC SENTIMENT RISING GUERRILLA RESISTANCE AGAINST THE JAPANESE
YOUTH MOVEMENTS AND THE BIRTH OF NATIONALISM THE ROLE OF THE HUKBALAHAP AND CIVILIAN MOVEMENTS
PART 4: REVOLUTION AND NATIONAL AWAKENING THE RETURN OF ALLIED FORCES AND GENERAL MACARTHUR
ANDRES BONIFACIO AND THE KATIPUNAN DESTRUCTION AND LIBERATION OF MANILA
GOALS, MEMBERSHIP, AND STRATEGIES OF THE KATIPUNAN EFFECTS OF THE WAR ON FILIPINO SOCIETY
DISCOVERY OF THE KATIPUNAN AND THE CRY OF PUGAD LAWIN TRANSITION TO INDEPENDENCE AFTER LIBERATION
FIRST PHASE OF THE PHILIPPINE REVOLUTION PART 8: THE NEW REPUBLIC AND POST-WAR RECONSTRUCTION
SPLITS WITHIN THE KATIPUNAN AND LEADERSHIP STRUGGLES ESTABLISHMENT OF THE THIRD PHILIPPINE REPUBLIC
AGUINALDO’S ASCENDANCY AND THE TEJEROS CONVENTION POSTWAR PROBLEMS: ECONOMY AND INFRASTRUCTURE
SECOND PHASE OF THE REVOLUTION AND BIAK-NA-BATO REBUILDING THE NATION AND INTERNATIONAL RELATIONS
THE PACT OF BIAK-NA-BATO AND EXILE IN HONG KONG EARLY PRESIDENTS AND POLICIES
THE RETURN OF AGUINALDO AND THE RESURGENCE OF REVOLT RISE OF THE HUKBALAHAP INSURGENCY
THE DECLARATION OF INDEPENDENCE IN KAWIT, CAVITE LAND REFORM AND PEASANT MOVEMENTS
PART 5: THE BIRTH OF THE FIRST REPUBLIC AND FOREIGN CONFLICT COLD WAR CONTEXT AND MILITARY ALLIANCES
ESTABLISHMENT OF THE MALOLOS REPUBLIC THE ROLE OF THE UNITED NATIONS AND FOREIGN AID
DRAFTING OF THE MALOLOS CONSTITUTION GROWING URBANIZATION AND ECONOMIC SHIFTS
ACHIEVEMENTS AND CHALLENGES OF THE FIRST PHILIPPINE REPUBLIC THE STRUGGLE FOR GENUINE INDEPENDENCE
THE ROLE OF APOLINARIO MABINI AND PEDRO PATERNO PART 9: POLITICAL CRISIS AND AUTHORITARIAN RULE
AMERICAN ARRIVAL AND RISING TENSIONS POLITICAL INSTABILITY IN THE 1960S
START OF THE FILIPINO-AMERICAN WAR RISE OF FERDINAND MARCOS AND HIS FIRST TERM
MAJOR BATTLES AND RESISTANCE AGAINST AMERICAN FORCES DECLARATION OF MARTIAL LAW
CAPTURE OF AGUINALDO AND DECLINE OF THE REPUBLIC HUMAN RIGHTS VIOLATIONS AND MILITARY SUPPRESSION
CIVILIAN RESISTANCE AND GUERRILLA MOVEMENTS CRONY CAPITALISM AND ECONOMIC COLLAPSE
END OF THE MALOLOS REPUBLIC AND U.S. MILITARY RULE RESISTANCE MOVEMENTS: ACTIVISTS, JOURNALISTS, AND CLERGY
PART 6: AMERICAN COLONIAL PERIOD AND THE QUEST FOR INDEPENDENCE ROLE OF THE MEDIA AND THE UNDERGROUND PRESS
PUBLIC EDUCATION AND THE THOMASITES INTERNATIONAL PRESSURE AND DOMESTIC DISCONTENT
LAND REFORMS AND THE FRIAR LANDS ASSASSINATION OF NINOY AQUINO
PHILIPPINE COMMISSION AND CIVIL GOVERNANCE SEEDS OF THE PEOPLE POWER REVOLUTION
ESTABLISHMENT OF THE PHILIPPINE ASSEMBLY PART 10: RESTORING DEMOCRACY AND CONTEMPORARY HISTORY
EDSA PEOPLE POWER AND THE FALL OF THE MARCOS REGIME EVALUATING AND INTERPRETING FUNCTIONS
CORAZON AQUINO AND THE RETURN OF DEMOCRATIC INSTITUTIONS TYPES OF FUNCTIONS: LINEAR, QUADRATIC, ABSOLUTE VALUE
1987 CONSTITUTION AND POLITICAL REFORMS INCREASING, DECREASING, AND CONSTANT FUNCTIONS
CHALLENGES OF GOVERNANCE AND REBUILDING TRUST ONE-TO-ONE AND INVERSE FUNCTIONS
NATURAL DISASTERS AND GOVERNMENT RESPONSES COMPOSITION OF FUNCTIONS
ECONOMIC GROWTH AND GLOBALIZATION FUNCTION TRANSFORMATIONS AND SYMMETRY
PEACE EFFORTS AND MINDANAO CONFLICT OPERATIONS WITH FUNCTIONS
EVOLVING PHILIPPINE FOREIGN POLICY REAL-WORLD MODELING WITH FUNCTIONS
DIGITAL REVOLUTION AND ITS IMPACT ON SOCIETY PART 4: POLYNOMIAL AND RATIONAL FUNCTIONS
REFLECTIONS ON THE PAST, HOPES FOR THE FUTURE POLYNOMIAL FUNCTIONS AND THEIR GRAPHS
END BEHAVIOR AND LEADING COEFFICIENT TEST
COLLEGE ALGEBRA FACTORING AND SOLVING POLYNOMIAL EQUATIONS
ZEROS AND MULTIPLICITY OF POLYNOMIAL FUNCTIONS
TITLE OF THE BOOK: COLLEGE ALGEBRA: A COMPREHENSIVE GUIDE TO THE REMAINDER AND FACTOR THEOREMS
CONCEPTS, FUNCTIONS, AND APPLICATIONS LONG DIVISION AND SYNTHETIC DIVISION
PART 1: FOUNDATIONS AND PREREQUISITES RATIONAL FUNCTIONS AND ASYMPTOTES
BASIC ARITHMETIC AND NUMBER SETS GRAPHING RATIONAL FUNCTIONS
PROPERTIES OF REAL NUMBERS SOLVING RATIONAL EQUATIONS
ORDER OF OPERATIONS AND THE PEMDAS RULE APPLICATIONS OF POLYNOMIAL AND RATIONAL MODELS
SIMPLIFYING ALGEBRAIC EXPRESSIONS PART 5: EXPONENTIAL AND LOGARITHMIC FUNCTIONS
SOLVING LINEAR EQUATIONS IN ONE VARIABLE INTRODUCTION TO EXPONENTIAL FUNCTIONS
SOLVING INEQUALITIES AND GRAPHING SOLUTIONS GRAPHS OF EXPONENTIAL GROWTH AND DECAY
ABSOLUTE VALUE EQUATIONS AND INEQUALITIES PROPERTIES OF EXPONENTS
WORD PROBLEMS AND MATHEMATICAL MODELING LOGARITHMIC FUNCTIONS AND THEIR PROPERTIES
OPERATIONS WITH POLYNOMIALS GRAPHING LOGARITHMIC FUNCTIONS
FACTORING TECHNIQUES AND APPLICATIONS LAWS OF LOGARITHMS
PART 2: EQUATIONS AND GRAPHS SOLVING EXPONENTIAL EQUATIONS
GRAPHING LINEAR EQUATIONS ON THE COORDINATE PLANE SOLVING LOGARITHMIC EQUATIONS
FINDING THE SLOPE OF A LINE APPLICATIONS OF EXPONENTIAL AND LOGARITHMIC MODELS
POINT-SLOPE AND SLOPE-INTERCEPT FORMS COMPOUND INTEREST AND NATURAL LOGARITHMS
PARALLEL AND PERPENDICULAR LINES PART 6: SYSTEMS OF EQUATIONS AND INEQUALITIES
GRAPHING INEQUALITIES IN TWO VARIABLES SOLVING SYSTEMS BY GRAPHING
DISTANCE AND MIDPOINT FORMULAS SOLVING SYSTEMS BY SUBSTITUTION
IDENTIFYING GRAPHS FROM EQUATIONS SOLVING SYSTEMS BY ELIMINATION
TRANSFORMATIONS OF GRAPHS APPLICATIONS OF SYSTEMS OF EQUATIONS
GRAPHING PIECEWISE-DEFINED FUNCTIONS SYSTEMS OF LINEAR INEQUALITIES IN TWO VARIABLES
REAL-WORLD APPLICATIONS OF LINEAR GRAPHS GRAPHING SYSTEMS OF INEQUALITIES
PART 3: FUNCTIONS AND THEIR PROPERTIES SYSTEMS OF EQUATIONS IN THREE VARIABLES
INTRODUCTION TO FUNCTIONS AND FUNCTION NOTATION MATRIX REPRESENTATION OF SYSTEMS
DOMAIN AND RANGE OF FUNCTIONS CONSISTENT AND INCONSISTENT SYSTEMS
REAL-LIFE MODELING WITH SYSTEMS INDEPENDENT AND DEPENDENT EVENTS
PART 7: MATRICES AND DETERMINANTS CONDITIONAL PROBABILITY
INTRODUCTION TO MATRICES AND NOTATION EXPECTED VALUE AND FAIR GAMES
MATRIX ADDITION AND SCALAR MULTIPLICATION PROBABILITY DISTRIBUTIONS AND APPLICATIONS
MATRIX MULTIPLICATION RULES AND APPLICATIONS USING ALGEBRA IN REAL-WORLD PROBABILITY PROBLEMS
THE IDENTITY AND INVERSE MATRICES
USING INVERSE MATRICES TO SOLVE SYSTEMS NATIONAL SERVICE TRAINING PROGRAM 1 – CWTS
INTRODUCTION TO DETERMINANTS
DETERMINANTS OF 2X2 AND 3X3 MATRICES TITLE OF THE BOOK: EMPOWERING THE NATION THROUGH CIVIC WELFARE:
CRAMER'S RULE FOR SOLVING SYSTEMS A COMPREHENSIVE GUIDE TO NATIONAL SERVICE TRAINING PROGRAM 1 –
PROPERTIES AND APPLICATIONS OF DETERMINANTS CWTS
MATRIX APPLICATIONS IN REAL-LIFE PROBLEMS PART 1: FOUNDATIONS OF NATIONAL SERVICE AND CIVIC DUTY
PART 8: CONIC SECTIONS AND GEOMETRY APPLICATIONS UNDERSTANDING THE NATIONAL SERVICE TRAINING PROGRAM LAW
THE PARABOLA: STANDARD AND GENERAL FORM THE IMPLEMENTING RULES AND REGULATIONS OF NSTP
GRAPHING PARABOLAS AND FINDING VERTICES CORE OBJECTIVES AND GUIDING PRINCIPLES OF CWTS
THE CIRCLE: EQUATION AND PROPERTIES HISTORICAL BACKGROUND OF CIVIC WELFARE PROGRAMS IN THE
GRAPHING CIRCLES AND FINDING CENTERS PHILIPPINES
THE ELLIPSE: STANDARD FORM AND GRAPHS THE ROLE OF YOUTH IN NATION BUILDING
PROPERTIES AND APPLICATIONS OF ELLIPSES THE PHILIPPINE CONSTITUTION AND CIVIC RESPONSIBILITY
THE HYPERBOLA: GRAPHS AND FEATURES NATIONAL SYMBOLS AND THEIR RELEVANCE TO NATIONHOOD
ASYMPTOTES AND THE GEOMETRY OF HYPERBOLAS CIVIC ENGAGEMENT AND VOLUNTEERISM
TRANSLATING AND ROTATING CONIC SECTIONS GOVERNMENT INSTITUTIONS SUPPORTING NSTP AND CWTS
APPLICATIONS OF CONIC SECTIONS IN SCIENCE INTRODUCTION TO COMMUNITY IMMERSION
PART 9: SEQUENCES AND SERIES PART 2: NATIONAL IDENTITY, VALUES, AND GOVERNANCE
INTRODUCTION TO SEQUENCES AND NOTATION THE VALUE OF VALUES EDUCATION IN NATION BUILDING
ARITHMETIC SEQUENCES AND FINDING TERMS CORE FILIPINO VALUES AND ETHICAL FOUNDATIONS
ARITHMETIC SERIES AND SUMMATION NOTATION PATRIOTISM AND RESPONSIBLE CITIZENSHIP
GEOMETRIC SEQUENCES AND SERIES HUMAN RIGHTS AND CIVIL LIBERTIES
INFINITE GEOMETRIC SERIES TRANSPARENCY, ACCOUNTABILITY, AND GOOD GOVERNANCE
APPLICATIONS OF SEQUENCES IN BUSINESS UNDERSTANDING THE STRUCTURE OF THE PHILIPPINE GOVERNMENT
RECURSIVE FORMULAS AND PATTERNS THE JUSTICE SYSTEM AND LEGAL FRAMEWORK
THE BINOMIAL THEOREM THE ROLE OF MEDIA AND INFORMATION IN CITIZENSHIP
MATHEMATICAL INDUCTION RESPECT FOR CULTURAL AND RELIGIOUS DIVERSITY
EXPLORING PATTERNS IN NATURE AND MATH PARTICIPATION IN LOCAL AND BARANGAY DEVELOPMENT
PART 10: COUNTING AND PROBABILITY PART 3: PUBLIC SAFETY, LAW, AND ORDER
BASIC COUNTING PRINCIPLES CRIME PREVENTION STRATEGIES AND PERSONAL SECURITY
THE FUNDAMENTAL COUNTING RULE UNDERSTANDING COMMUNITY POLICING
PERMUTATIONS: ARRANGING OBJECTS YOUTH OFFENSES AND THE JUVENILE JUSTICE SYSTEM
COMBINATIONS: CHOOSING WITHOUT ORDER ANTI-VIOLENCE AND ANTI-BULLYING ADVOCACY
PROBABILITY RULES AND BASIC CONCEPTS CYBERCRIME AWARENESS AND DIGITAL SAFETY
INTRODUCTION TO ANTI-TERRORISM AWARENESS BASIC LIFE SUPPORT TECHNIQUES
TRAFFIC RULES AND PEDESTRIAN SAFETY MANAGING WOUNDS, BLEEDING, AND SHOCK
BARANGAY PEACEKEEPING AND PUBLIC ORDER FRACTURES, BURNS, AND EMERGENCY RESPONSE
CRISIS INTERVENTION AND MEDIATION SKILLS CPR AND RESCUE BREATHING
ROLE OF CWTS IN PROMOTING SAFE COMMUNITIES FIRST AID KITS AND EMERGENCY TOOLS
PART 4: DISASTER PREPAREDNESS AND RISK REDUCTION EMERGENCY HOTLINE AWARENESS
INTRODUCTION TO CALAMITY AND DISASTER PREPAREDNESS SAFETY IN SCHOOLS AND PUBLIC SPACES
NATURAL VS. MAN-MADE DISASTERS FIRST AID FOR CHILDREN AND ELDERLY
EARLY WARNING SYSTEMS AND COMMUNITY ALERTS SIMULATION DRILLS AND PREPAREDNESS EXERCISES
SURVIVING A DISASTER: BASIC PRECAUTIONARY MEASURES PART 8: FAMILY AND COMMUNITY WELFARE
EARTHQUAKE READINESS BEFORE, DURING, AND AFTER INTRODUCTION TO FAMILY PLANNING AND REPRODUCTIVE HEALTH
FIRE SAFETY AND EMERGENCY EVACUATION UNDERSTANDING RESPONSIBLE PARENTHOOD
FLOOD AND TYPHOON SAFETY GUIDELINES GENDER EQUALITY AND RESPECT FOR ALL
UNDERSTANDING LANDSLIDE RISKS AND RESPONSE BUILDING HEALTHY FAMILY RELATIONSHIPS
RESPONDING TO DROUGHT AND WATER SCARCITY PREVENTION OF DOMESTIC VIOLENCE
BASIC PRINCIPLES OF RISK REDUCTION AND MITIGATION PARENTING SKILLS FOR STRONGER COMMUNITIES
PART 5: ENVIRONMENTAL SUSTAINABILITY AND CLIMATE ACTION SENIOR CITIZEN AND PWD SUPPORT SERVICES
ENVIRONMENTAL EDUCATION AND AWARENESS CHILD PROTECTION AND WELFARE
WASTE MANAGEMENT AND ECOLOGICAL SOLID WASTE ACT YOUTH EMPOWERMENT AND MENTORSHIP
REFORESTATION AND TREE PLANTING PROJECTS COMMUNITY DEVELOPMENT THROUGH VOLUNTEERISM
CLEAN AIR AND CLEAN WATER INITIATIVES PART 9: LIVELIHOOD, SKILLS DEVELOPMENT, AND ENTREPRENEURSHIP
CLIMATE CHANGE: CAUSES AND EFFECTS INTRODUCTION TO ENTREPRENEURSHIP FOR THE YOUTH
PARTICIPATING IN LOCAL ENVIRONMENTAL CAMPAIGNS BUSINESS PLANNING AND FEASIBILITY STUDIES
ROLE OF THE YOUTH IN ENVIRONMENTAL PROTECTION FINANCIAL LITERACY AND BUDGETING
SUSTAINABLE LIFESTYLE AND GREEN PRACTICES MARKETING AND PRODUCT DEVELOPMENT
COASTAL AND MARINE CONSERVATION COOPERATIVE BUILDING AND MICROENTERPRISE
BIODIVERSITY AND NATURAL RESOURCE PRESERVATION DIGITAL ENTREPRENEURSHIP AND ONLINE OPPORTUNITIES
PART 6: HEALTH AWARENESS AND DISEASE PREVENTION LIVELIHOOD PROJECTS FOR COMMUNITY IMPACT
HEALTH EDUCATION AND COMMUNITY HEALTH SKILLS TRAINING AND TESDA CERTIFICATION
UNDERSTANDING COMMON CONTAGIOUS DISEASES AGRIBUSINESS AND SUSTAINABLE FARMING
COVID-19 AND PANDEMIC AWARENESS EMPOWERING WOMEN AND YOUTH THROUGH ENTERPRISE
MENTAL HEALTH AND EMOTIONAL WELL-BEING PART 10: LEADERSHIP, CITIZENSHIP, AND NATION BUILDING
PERSONAL HYGIENE AND SANITATION UNDERSTANDING LEADERSHIP AND FOLLOWERSHIP
NUTRITION AND PHYSICAL FITNESS ESSENTIAL SKILLS OF EFFECTIVE YOUTH LEADERS
PREVENTING LIFESTYLE DISEASES VALUES-BASED LEADERSHIP MODELS
ALCOHOLISM: CAUSES, EFFECTS, AND PREVENTION CONFLICT RESOLUTION AND TEAM BUILDING
THE HAZARDS OF SMOKING AND VAPING NATIONALISM AND SERVICE TO THE COUNTRY
DRUG ABUSE EDUCATION AND PREVENTION PROJECT PLANNING AND MANAGEMENT IN CWTS
PART 7: FIRST AID, EMERGENCY CARE, AND SAFETY PROMOTING SOCIAL RESPONSIBILITY THROUGH NSTP
INTRODUCTION TO FIRST AID AND ITS IMPORTANCE ORGANIZING RECREATIONAL AND OUTREACH ACTIVITIES
EVALUATING COMMUNITY PROJECTS AND OUTCOMES PROMOTING RESPECT AND SOCIAL HARMONY
FINAL REFLECTIONS ON THE NSTP JOURNEY AND LIFELONG SERVICE PART 4: LEADERSHIP AND SOCIAL RESPONSIBILITY
THE YOUTH AND NATION-BUILDING
NATIONAL SERVICE TRAINING PROGRAM 1 – LTS LEADERSHIP QUALITIES AND CIVIC INITIATIVE
PROBLEM-SOLVING AND DECISION-MAKING
TITLE OF THE BOOK: EMPOWERING THROUGH EDUCATION: A PUBLIC SPEAKING AND COMMUNICATION FOR LEADERS
COMPREHENSIVE GUIDE TO NATIONAL SERVICE TRAINING PROGRAM 1 – THE POWER OF INFLUENCE AND MOTIVATION
LTS (LITERACY TRAINING SERVICE) ETHICAL LEADERSHIP IN EDUCATION
PART 1: FOUNDATIONS OF THE LITERACY TRAINING SERVICE TEAMWORK AND COLLABORATIVE SERVICE
UNDERSTANDING THE NSTP FRAMEWORK COMMUNITY MAPPING AND NEEDS ASSESSMENT
THE LEGAL BASIS: REPUBLIC ACT 9163 MENTORING YOUNGER VOLUNTEERS
IMPLEMENTING RULES AND REGULATIONS OF NSTP BUILDING LEGACIES OF LEADERSHIP
NSTP COMPONENTS: CWTS, LTS, AND ROTC PART 5: PERSONALITY DEVELOPMENT AND COMMUNICATION SKILLS
THE SPIRIT OF VOLUNTEERISM IN LITERACY WORK BUILDING CONFIDENCE AND SELF-ESTEEM
THE ROLE OF EDUCATION IN NATIONAL DEVELOPMENT EFFECTIVE COMMUNICATION TECHNIQUES
THE FUNCTION OF LTS IN NATION BUILDING VERBAL AND NON-VERBAL COMMUNICATION
ROLES AND RESPONSIBILITIES OF LTS STUDENTS LISTENING AND FEEDBACK SKILLS
OVERVIEW OF COMMUNITY SERVICE IN EDUCATION CONFLICT RESOLUTION AND EMOTIONAL INTELLIGENCE
COMMUNITY IMMERSION AND LEARNING GOALS TIME AND STRESS MANAGEMENT
PART 2: THE PHILIPPINE CONSTITUTION AND CITIZENSHIP PERSONALITY STRENGTHS AND WEAKNESSES
INTRODUCTION TO THE PHILIPPINE CONSTITUTION DEVELOPING PROFESSIONALISM AND CONDUCT
THE BILL OF RIGHTS AND CIVIL LIBERTIES FACILITATING GROUP DISCUSSIONS
DUTIES AND OBLIGATIONS OF FILIPINO CITIZENS PROMOTING INCLUSIVITY IN COMMUNICATION
UNDERSTANDING DEMOCRATIC GOVERNANCE PART 6: LITERACY: TOOLS FOR EMPOWERMENT
RIGHTS OF CHILDREN AND ACCESS TO EDUCATION LITERACY DEFINED: CONCEPTS AND IMPORTANCE
GENDER EQUALITY AND INCLUSIVE EDUCATION UNDERSTANDING ILLITERACY AND ITS EFFECTS
NATIONALISM AND PARTICIPATORY CITIZENSHIP TEACHING READING TO EARLY LEARNERS
YOUTH AS AGENTS OF CONSTITUTIONAL AWARENESS READING COMPREHENSION STRATEGIES
EDUCATING LEARNERS ON RIGHTS AND DUTIES VOCABULARY DEVELOPMENT ACTIVITIES
PROMOTING CONSTITUTIONAL LITERACY DEVELOPING CRITICAL THINKING THROUGH READING
PART 3: FILIPINO IDENTITY AND CORE VALUES STORYTELLING AS A LITERACY TOOL
SELF-AWARENESS IN THE CONTEXT OF SERVICE PROMOTING INDEPENDENT READING
EMBRACING FILIPINO VALUES: PAKIKIPAGKAPWA AND BAYANIHAN ADULT LITERACY: METHODS AND APPROACHES
UNDERSTANDING CULTURAL SENSITIVITY IN TEACHING ASSESSING READING LEVELS AND NEEDS
ROLE OF PERSONAL INTEGRITY IN SERVICE PART 7: NUMERACY: BUILDING MATHEMATICAL THINKING
NURTURING POSITIVE ATTITUDES IN THE COMMUNITY NUMERACY IN EVERYDAY LIFE
NATIONAL PRIDE AND CULTURAL AWARENESS TEACHING BASIC MATH CONCEPTS
SERVICE-ORIENTED CHARACTER BUILDING COUNTING AND NUMBER RECOGNITION
VALUES INTEGRATION IN LITERACY SESSIONS ADDITION AND SUBTRACTION TECHNIQUES
BUILDING EMPATHY WITH LEARNERS MULTIPLICATION AND DIVISION METHODS
FRACTIONS AND MEASUREMENT
WORD PROBLEMS AND LOGICAL REASONING TITLE OF THE BOOK: DEFENDERS OF THE NATION: A COMPREHENSIVE GUIDE
MAKING MATH FUN THROUGH GAMES TO NATIONAL SERVICE TRAINING PROGRAM 1 – ROTC
TEACHING NUMERACY TO DIVERSE LEARNERS PART 1: FOUNDATIONS OF THE ROTC PROGRAM
NUMERACY ASSESSMENT AND REMEDIATION HISTORY AND PURPOSE OF THE NSTP
PART 8: TEACHING STRATEGIES AND LEARNER ENGAGEMENT IMPLEMENTING RULES AND REGULATIONS OF NSTP
UNDERSTANDING THE NEEDS OF LEARNERS OVERVIEW OF ROTC AS A COMPONENT OF NSTP
CREATING LESSON PLANS FOR LITERACY SESSIONS LEGAL FRAMEWORK OF THE ROTC PROGRAM
CLASSROOM MANAGEMENT TECHNIQUES THE PHILIPPINE CONSTITUTION: CIVIC RESPONSIBILITY AND DEFENSE
ENGAGING LEARNERS THROUGH INTERACTIVE METHODS BASIC MILITARY TRAINING OBJECTIVES
MULTI-SENSORY TEACHING APPROACHES ORIENTATION ON NATIONAL DEFENSE AND PATRIOTISM
DIFFERENTIATING INSTRUCTION BASED ON ABILITY THE ROLE OF ROTC IN NATIONAL DEVELOPMENT
ADAPTING LESSONS TO LOCAL CULTURE OVERVIEW OF LEADERSHIP AND SERVICE
USE OF EDUCATIONAL TECHNOLOGY ROTC’S RELEVANCE IN MODERN SOCIETY
MONITORING AND EVALUATION OF LEARNING PART 2: UNDERSTANDING THE MILITARY STRUCTURE
CREATING SAFE AND POSITIVE LEARNING SPACES INTRODUCTION TO MILITARY ORGANIZATION
PART 9: THE TEACHER'S ROLE AND ETHICAL PRACTICE HIERARCHY AND RANK SYSTEM IN THE AFP
THE TEACHER AS ROLE MODEL ROLES AND RESPONSIBILITIES OF ROTC CADETS
PROFESSIONAL ETHICS IN TEACHING CHAIN OF COMMAND AND COMMUNICATION PROTOCOLS
CHALLENGES FACED BY LITERACY VOLUNTEERS MILITARY TERMINOLOGIES AND SYMBOLS
BUILDING RELATIONSHIPS WITH LEARNERS IMPORTANCE OF MILITARY DISCIPLINE
CONFIDENTIALITY AND RESPECT IN EDUCATION ORGANIZATIONAL UNITS OF THE AFP
THE IMPORTANCE OF REFLECTION IN TEACHING DUTIES OF OFFICERS AND ENLISTED PERSONNEL
PRACTICING CULTURAL HUMILITY IN DIVERSE COMMUNITIES ROTC ADMINISTRATIVE OPERATIONS
AVOIDING BIAS AND STEREOTYPING COORDINATION BETWEEN ROTC UNITS AND CIVIL SECTORS
LIFELONG LEARNING AND CONTINUING DEVELOPMENT PART 3: MILITARY COURTESY AND DISCIPLINE
ADVOCATING FOR EDUCATIONAL ACCESS AND JUSTICE FORMS OF MILITARY COURTESY
PART 10: COMMUNITY INTEGRATION AND LEGACY BUILDING SALUTING AND ADDRESSING OFFICERS
UNDERSTANDING COMMUNITY-BASED EDUCATION UNIFORM AND GROOMING STANDARDS
PLANNING AND IMPLEMENTING LITERACY PROJECTS CODE OF CONDUCT AND ETHICAL EXPECTATIONS
COORDINATING WITH SCHOOLS AND LGUS ROTC CEREMONIES AND TRADITIONS
DOCUMENTING PROGRESS AND IMPACT DISCIPLINE AND ACCOUNTABILITY
SUSTAINABILITY AND EXIT STRATEGIES PENALTIES AND DISCIPLINARY MEASURES
SHARING BEST PRACTICES IN LITERACY SERVICE RESPECT FOR AUTHORITY AND COMRADESHIP
BUILDING NETWORKS FOR LITERACY ADVOCACY CULTIVATING A MILITARY MINDSET
FINAL LITERACY SERVICE OUTPUT PRESENTATIONS DRILL AND CEREMONY BASICS
REFLECTIVE JOURNALS AND GROUP EVALUATIONS PART 4: MILITARY OPERATIONS AND JUSTICE
THE LASTING IMPACT OF LTS ON PERSONAL AND NATIONAL GROWTH DUTIES OF THE INTERIOR GUARD
SENTRY RESPONSIBILITIES AND GENERAL ORDERS
NATIONAL SERVICE TRAINING PROGRAM 1 – ROTC GUARD MOUNTING AND RELIEF PROCEDURES
PREPARING MILITARY CORRESPONDENCE PART 8: DISASTER AND EMERGENCY RESPONSE
STRUCTURE OF A MILITARY LETTER TYPES OF NATURAL AND MAN-MADE DISASTERS
REPORTS AND OPERATIONAL DOCUMENTS DISASTER RISK REDUCTION AND MANAGEMENT (DRRM)
INTRODUCTION TO MILITARY JUSTICE SYSTEM DISASTER RELIEF AND RESCUE PROTOCOLS
THE ARTICLES OF WAR FLOOD, EARTHQUAKE, AND TYPHOON RESPONSE
COURT-MARTIAL PROCEDURES SEARCH AND RESCUE TECHNIQUES
LEGAL RIGHTS OF MILITARY PERSONNEL FIREFIGHTING BASICS
PART 5: HUMAN RIGHTS AND NATIONAL SECURITY EVACUATION PROCEDURES
PRINCIPLES OF HUMAN RIGHTS IN THE MILITARY SANITATION AND WASTE MANAGEMENT
BALANCING SECURITY AND CIVIL LIBERTIES HEALTH EDUCATION AND DISEASE PREVENTION
INTRODUCTION TO MILITARY INTELLIGENCE COMMUNITY HEALTH AND NUTRITION
INTELLIGENCE GATHERING TECHNIQUES PART 9: TACTICAL SKILLS AND COMBAT PREPAREDNESS
THREAT ANALYSIS AND RISK ASSESSMENT PRINCIPLES OF FIRST AID
UNDERSTANDING NATIONAL SECURITY THREATS CPR AND EMERGENCY CARE TECHNIQUES
TERRORISM AND COUNTER-TERRORISM STRATEGIES INTRODUCTION TO FIREARMS AND SAFETY RULES
ANTI-INSURGENCY EFFORTS IN THE PHILIPPINES U.S. RIFLE 5.56 MM M16A1: FEATURES AND FUNCTIONS
CYBER THREATS AND MODERN WARFARE MAINTENANCE AND HANDLING OF M16A1
CIVIL-MILITARY RELATIONS AND HUMANITARIAN LAWS RIFLE 7.62 MM M14 AND M14A1 OVERVIEW
PART 6: NATIONAL AND CIVIL MILITARY OPERATIONS PARTS AND CLEANING OF M14 SERIES
UNDERSTANDING NUCLEAR HAZARDS INTRODUCTION TO HAND GRENADES
HANDLING BIOLOGICAL THREATS THROWING TECHNIQUES AND SAFETY
RESPONDING TO CHEMICAL ATTACKS PERSONAL COMBAT READINESS
PERSONAL PROTECTIVE EQUIPMENT AND DECONTAMINATION PART 10: MOBILITY, MARKSMANSHIP, AND MAPPING
REVISED CIVIL MILITARY OPERATIONS (CMO) PROGRAM INDIVIDUAL MOVEMENT TECHNIQUES (IMTS)
CMO ACTIVITIES IN PEACEKEEPING TACTICAL MOVEMENT IN URBAN AND RURAL SETTINGS
VALUES EDUCATION IN MILITARY SERVICE CAMOUFLAGE AND CONCEALMENT METHODS
PROMOTING NATIONALISM THROUGH CMO HAND AND ARM SIGNAL SYSTEMS
COMMUNITY DEVELOPMENT PROJECTS BASIC MILITARY FORMATIONS AND DRILLS
INTEGRATING CIVILIAN SECTORS IN DEFENSE MARCHING TECHNIQUES AND COMMANDS
PART 7: CITIZENSHIP AND CIVIC ENGAGEMENT ELEMENTARY MAP READING AND LAND NAVIGATION
UNDERSTANDING GOOD CITIZENSHIP UNDERSTANDING GRID COORDINATES
PATRIOTISM AND PUBLIC SERVICE USING A COMPASS AND NAVIGATING TERRAIN
THE AFP’S ROLE IN COMMUNITY BUILDING PREPARATORY MARKSMANSHIP TRAINING AND EVALUATION
INTRODUCTION TO AFP COMMUNITY PROGRAMS
CIVIC ACTION AND ENVIRONMENTAL PROJECTS GENERAL CHEMISTRY
AFP’S ROLE IN YOUTH DEVELOPMENT
DRUG PREVENTION AND ADVOCACY TITLE OF THE BOOK: FOUNDATIONS AND FRONTIERS: A COMPREHENSIVE
PEACE EDUCATION AND CONFLICT RESOLUTION GUIDE TO GENERAL CHEMISTRY
LEADERSHIP DEVELOPMENT IN ROTC PART 1: INTRODUCTION TO CHEMISTRY AND MEASUREMENT
BRIDGING CIVILIANS AND SOLDIERS THE ROLE OF CHEMISTRY IN SCIENCE AND SOCIETY
UNITS OF MEASUREMENT AND SI SYSTEM PERIODIC TRENDS IN ATOMIC PROPERTIES
SCIENTIFIC NOTATION AND SIGNIFICANT FIGURES EFFECTIVE NUCLEAR CHARGE AND SHIELDING
ACCURACY, PRECISION, AND ERROR ANALYSIS PART 5: CHEMICAL BONDING AND MOLECULAR GEOMETRY
DIMENSIONAL ANALYSIS TECHNIQUES FORMATION OF IONIC BONDS
PROPERTIES AND CLASSIFICATION OF MATTER COVALENT BONDS AND LEWIS STRUCTURES
STATES AND CHANGES OF MATTER POLAR AND NONPOLAR MOLECULES
METHODS OF SEPARATION OF MIXTURES RESONANCE STRUCTURES AND FORMAL CHARGES
INTRODUCTION TO THE PERIODIC TABLE VSEPR THEORY AND MOLECULAR SHAPES
SCIENTIFIC METHOD AND EXPERIMENTAL DESIGN HYBRIDIZATION AND MOLECULAR ORBITALS
PART 2: ATOMS, MOLECULES, AND CHEMICAL CALCULATIONS SIGMA AND PI BONDING
ATOMIC THEORY AND DISCOVERY OF SUBATOMIC PARTICLES BOND POLARITY AND DIPOLE MOMENTS
ISOTOPES AND ATOMIC MASS INTERMOLECULAR FORCES: TYPES AND EFFECTS
MOLECULES AND CHEMICAL FORMULAS STRUCTURE-PROPERTY RELATIONSHIPS
IONIC AND MOLECULAR COMPOUNDS PART 6: STATES OF MATTER AND SOLUTIONS
NOMENCLATURE OF CHEMICAL COMPOUNDS PROPERTIES OF LIQUIDS AND SOLIDS
THE MOLE CONCEPT TYPES OF CRYSTALLINE SOLIDS
PERCENT COMPOSITION AND EMPIRICAL FORMULAS PHASE CHANGES AND DIAGRAMS
BALANCING CHEMICAL EQUATIONS VAPOR PRESSURE AND BOILING POINT
STOICHIOMETRY AND REACTION YIELD NATURE OF SOLUTIONS AND SOLUBILITY
LIMITING REACTANTS AND EXCESS REAGENTS CONCENTRATION UNITS: MOLARITY, MOLALITY, ETC.
PART 3: REACTIONS AND THE STATES OF MATTER COLLIGATIVE PROPERTIES
TYPES OF CHEMICAL REACTIONS FACTORS AFFECTING SOLUBILITY
AQUEOUS SOLUTIONS AND SOLUBILITY RULES COLLOIDS AND SUSPENSIONS
NET IONIC EQUATIONS SEPARATION TECHNIQUES FOR MIXTURES
PRECIPITATION, ACID-BASE, AND REDOX REACTIONS PART 7: KINETICS AND CHEMICAL EQUILIBRIUM
PROPERTIES OF GASES AND GAS LAWS REACTION RATES AND RATE LAWS
IDEAL GAS LAW AND ITS APPLICATIONS DETERMINING RATE CONSTANTS
DALTON’S AND GRAHAM’S LAWS INTEGRATED RATE LAWS
GAS STOICHIOMETRY FACTORS INFLUENCING REACTION RATES
REAL GASES AND DEVIATIONS ACTIVATION ENERGY AND CATALYSIS
MIXTURES OF GASES AND PARTIAL PRESSURE REVERSIBLE REACTIONS AND DYNAMIC EQUILIBRIUM
PART 4: ENERGY AND THE NATURE OF THE ATOM THE EQUILIBRIUM CONSTANT (K)
THERMOCHEMICAL EQUATIONS LE CHATELIER’S PRINCIPLE
HEAT CAPACITY AND CALORIMETRY CALCULATIONS WITH EQUILIBRIUM CONSTANTS
ENTHALPY CHANGES AND HESS'S LAW HOMOGENEOUS AND HETEROGENEOUS EQUILIBRIA
BOND ENTHALPY AND ENERGY CALCULATIONS PART 8: ACIDS, BASES, AND SOLUBILITY EQUILIBRIA
ELECTROMAGNETIC RADIATION AND ATOMIC SPECTRA PROPERTIES OF ACIDS AND BASES
THE BOHR MODEL OF THE ATOM BRONSTED-LOWRY AND LEWIS THEORIES
QUANTUM MECHANICAL MODEL AND ORBITALS STRONG AND WEAK ACIDS AND BASES
QUANTUM NUMBERS AND ELECTRON CONFIGURATION PH, POH, AND CALCULATIONS
BUFFERS AND BUFFER CAPACITY SAFETY FIRST: AVOIDING INJURY DURING TRAINING
TITRATION CURVES AND INDICATORS MAXIMIZING PROGRESS AND RETENTION
SOLUBILITY PRODUCT CONSTANT (KSP) FUNDAMENTALS OF SELF-DEFENSE AND AWARENESS
COMMON ION EFFECT ENTERING COMPETITIONS WITH CONFIDENCE AND CONTROL
COMPLEX ION FORMATION PART 2: BUILDING A STRONG FOUNDATION
SELECTIVE PRECIPITATION THE MIND-BODY-SPIRIT CONNECTION
PART 9: THERMODYNAMICS AND ELECTROCHEMISTRY THE ROLE OF BREATHING AND MEDITATION
LAWS OF THERMODYNAMICS DISCIPLINE, FOCUS, AND RESPECT
ENTHALPY, ENTROPY, AND FREE ENERGY ETIQUETTE IN THE MARTIAL ARTS DOJO
SPONTANEITY OF REACTIONS DEVELOPING MENTAL TOUGHNESS
COUPLED REACTIONS AND BIOENERGETICS PRACTICING MARTIAL ARTS IN DAILY LIFE
INTRODUCTION TO ELECTROCHEMISTRY VISUALIZATION TECHNIQUES FOR TRAINING
GALVANIC AND ELECTROLYTIC CELLS OVERCOMING PLATEAUS AND STAYING MOTIVATED
CELL POTENTIALS AND NERNST EQUATION GOAL SETTING FOR LONG-TERM MASTERY
ELECTROLYSIS AND FARADAY’S LAWS RECOVERY AND REST FOR MARTIAL ARTISTS
CORROSION AND ELECTROPLATING PART 3: SELF-DEFENSE AND PRACTICAL APPLICATION
APPLICATIONS OF ELECTROCHEMICAL CELLS SITUATIONAL AWARENESS AND DE-ESCALATION
PART 10: ADVANCED TOPICS IN CHEMISTRY DEFENSIVE STANCES AND POSITIONING
NUCLEAR CHEMISTRY AND RADIOACTIVITY BLOCKS, PARRIES, AND COUNTERS
TYPES OF RADIATION AND DECAY ESCAPES FROM HOLDS AND GRABS
NUCLEAR REACTIONS AND STABILITY STRIKING BASICS: PUNCHES, KICKS, AND ELBOWS
APPLICATIONS OF NUCLEAR CHEMISTRY GROUND DEFENSE AND GRAPPLING AWARENESS
PROPERTIES OF MAIN-GROUP ELEMENTS DEFENDING AGAINST ARMED ATTACKS
TRENDS IN REACTIVITY AND COMPOUNDS ADAPTING MARTIAL ARTS TO REAL-WORLD SITUATIONS
COORDINATION COMPOUNDS AND LIGANDS LAWS AND ETHICS OF SELF-DEFENSE
TRANSITION METAL CHEMISTRY WOMEN'S SELF-DEFENSE STRATEGIES
FUNCTIONAL GROUPS IN ORGANIC COMPOUNDS PART 4: TRADITIONAL AND MODERN TRAINING TECHNIQUES
POLYMERS: NATURAL AND SYNTHETIC SHADOWBOXING AND SOLO DRILLS
PARTNER DRILLS AND SPARRING ETIQUETTE
FUNDAMENTALS OF MARTIAL ARTS CONDITIONING FOR MARTIAL ARTISTS
STRENGTH AND FLEXIBILITY TRAINING
TITLE OF THE BOOK: MASTERING THE WAY: A COMPLETE GUIDE TO THE CARDIO AND ENDURANCE BUILDING
FUNDAMENTALS OF MARTIAL ARTS USING FOCUS PADS AND HEAVY BAGS
PART 1: THE MARTIAL ARTS JOURNEY BEGINS THE ROLE OF KATA AND FORMS
UNDERSTANDING MARTIAL ARTS: MORE THAN A BARROOM BRAWL TRAINING WITH RESISTANCE AND WEIGHTS
EXPLORING MARTIAL ARTS CULTURE AND TRADITIONS CROSS-TRAINING WITH OTHER DISCIPLINES
CHOOSING THE RIGHT MARTIAL ART FOR YOU CREATING A PERSONAL PRACTICE ROUTINE
EVALUATING SCHOOLS AND INSTRUCTORS PART 5: THE ART OF WEAPONS TRAINING
SETTING GOALS AND UNDERSTANDING RANKING SYSTEMS THE PHILOSOPHY BEHIND WEAPONS TRAINING
ESSENTIAL GEAR: UNIFORMS, SHOES, AND EQUIPMENT STAFF (BO) TECHNIQUES AND DRILLS
NUNCHAKU BASICS AND CONTROL SUPPORTING MARTIAL ARTS IN THE COMMUNITY
SWORD FORMS: KATANA AND BOKKEN PART 9: BECOMING A LEADER AND INSTRUCTOR
THE USE OF SAI AND TONFA TEN RULES FOR THE MARTIAL ARTS CLASSROOM
ESCRIMA AND STICK FIGHTING FUNDAMENTALS THE RESPONSIBILITIES OF A SENSEI
KNIFE DEFENSE AND SAFETY HOW TO MOTIVATE AND INSPIRE STUDENTS
CHAIN AND ROPE WEAPONS BUILDING A CURRICULUM
IMPROVISED WEAPONS IN SELF-DEFENSE ASSESSING PROGRESS AND PROVIDING FEEDBACK
COMBINING WEAPONS AND EMPTY-HAND TECHNIQUES THE ART OF TEACHING BEGINNERS
PART 6: THE STYLES AND SYSTEMS OF MARTIAL ARTS HANDLING CONFLICT AND MISBEHAVIOR IN CLASS
KARATE: PRINCIPLES AND PRACTICE TEACHING ADVANCED TECHNIQUES SAFELY
KUNG FU: STYLES AND ANIMAL FORMS CREATING AN INCLUSIVE ENVIRONMENT
TAE KWON DO: SPEED, POWER, AND KICKS TEN QUALITIES A GOOD INSTRUCTOR MUST HAVE
JUDO: THROWS, LOCKS, AND GROUND CONTROL PART 10: INSPIRATION, ENTERTAINMENT, AND MASTERY
AIKIDO: REDIRECTION AND FLOW TEN TIPS FROM THE MASTER
HAPKIDO: JOINT LOCKS AND CIRCULAR MOTION TEN COOL MARTIAL ARTS MOVIES TO WATCH
MUAY THAI: THE ART OF EIGHT LIMBS KEEPING PASSION ALIVE AFTER BLACK BELT
JEET KUNE DO: BRUCE LEE’S LEGACY HOSTING MARTIAL ARTS EVENTS
T'AI CHI CHUAN: MOVEMENT AND MEDITATION PUBLISHING YOUR MARTIAL ARTS JOURNEY
ECLECTIC AND HYBRID MARTIAL ARTS SYSTEMS TRAINING ABROAD AND MARTIAL ARTS TRAVEL
PART 7: MARTIAL ARTS IN EVERYDAY LIFE STAYING FIT AS A LIFELONG MARTIAL ARTIST
APPLYING MARTIAL DISCIPLINE TO DAILY CHALLENGES EXPLORING PHILOSOPHIES FROM THE EAST
MARTIAL ARTS AND EMOTIONAL CONTROL LESSONS FROM MARTIAL ARTS LEGENDS
CONFLICT RESOLUTION THROUGH AWARENESS THE PATH FORWARD: CONTINUOUS GROWTH AND MASTERY
TEACHING CHILDREN THROUGH MARTIAL PRINCIPLES
MARTIAL ARTS AND LEADERSHIP DEVELOPMENT GENERAL SOCIOLOGY
TIME MANAGEMENT FOR MARTIAL ARTISTS
BUILDING CONFIDENCE THROUGH TRAINING TITLE OF THE BOOK: EXPLORING SOCIETY: A COMPREHENSIVE GUIDE TO
RESPECT AND HUMILITY IN ACTION GENERAL SOCIOLOGY
INSPIRING OTHERS THROUGH EXAMPLE PART 1: FOUNDATIONS OF SOCIOLOGICAL UNDERSTANDING
PRACTICING GRATITUDE AND PATIENCE THE SOCIOLOGICAL PERSPECTIVE: SEEING THE GENERAL IN THE PARTICULAR
PART 8: THE MARTIAL ARTS COMMUNITY AND CULTURE THE IMPORTANCE OF SOCIOLOGICAL IMAGINATION
THE DOJO AS A LEARNING ENVIRONMENT MAJOR THEORETICAL PARADIGMS IN SOCIOLOGY
BUILDING CAMARADERIE AND TRUST FUNCTIONALISM, CONFLICT THEORY, AND SYMBOLIC INTERACTIONISM
RESPECTING TRADITIONS ACROSS STYLES THE ROLE OF SOCIOLOGY IN CONTEMPORARY SOCIETY
CROSS-TRAINING AND VISITING OTHER SCHOOLS HISTORICAL EVOLUTION OF SOCIOLOGICAL THOUGHT
THE ROLE OF TOURNAMENTS AND EXHIBITIONS UNDERSTANDING SOCIETY AS A SYSTEM
MARTIAL ARTS AND CULTURAL HERITAGE SOCIOLOGY AND COMMON SENSE
BALANCING TRADITION WITH INNOVATION SOCIOLOGY AND OTHER SOCIAL SCIENCES
VOLUNTEERING AND GIVING BACK ETHICAL CONSIDERATIONS IN SOCIOLOGICAL INQUIRY
CREATING A POSITIVE MARTIAL ARTS LEGACY PART 2: INVESTIGATING SOCIETY SCIENTIFICALLY
SOCIOLOGICAL RESEARCH METHODS: AN OVERVIEW BUREAUCRACY AND RATIONALIZATION
QUANTITATIVE AND QUALITATIVE APPROACHES THE IMPACT OF DIGITAL INTERACTION
STEPS IN CONDUCTING SOCIOLOGICAL RESEARCH SOCIAL NETWORKS AND SOCIAL CAPITAL
THE ROLE OF HYPOTHESES AND VARIABLES PART 6: GROUPS, DEVIANCE, AND INEQUALITY
SAMPLING AND SURVEY DESIGN PRIMARY AND SECONDARY GROUPS
CASE STUDIES AND FIELD RESEARCH GROUP DYNAMICS AND LEADERSHIP STYLES
EXPERIMENTAL METHODS IN SOCIOLOGY FORMAL ORGANIZATIONS AND BUREAUCRACIES
CONTENT ANALYSIS AND SECONDARY DATA GROUPTHINK AND CONFORMITY
DATA INTERPRETATION AND PRESENTATION DEVIANCE AND SOCIAL CONTROL
LIMITATIONS AND CHALLENGES OF SOCIOLOGICAL RESEARCH THEORIES OF DEVIANCE: BIOLOGICAL, PSYCHOLOGICAL, SOCIOLOGICAL
PART 3: CULTURE AND SOCIAL LEARNING CRIME AND THE CRIMINAL JUSTICE SYSTEM
DEFINING CULTURE: MATERIAL AND NONMATERIAL STRATIFICATION IN THE PHILIPPINES
CULTURAL NORMS, VALUES, AND BELIEFS THE ROOTS OF SOCIAL INEQUALITY
SYMBOLS AND LANGUAGE IN CULTURE GLOBAL STRATIFICATION AND ECONOMIC DISPARITY
CULTURAL DIVERSITY AND UNIVERSALS PART 7: SOCIAL IDENTITIES AND SOCIAL DIFFERENCES
ETHNOCENTRISM AND CULTURAL RELATIVISM RACE AND ETHNICITY: DEFINITIONS AND PERSPECTIVES
SUBCULTURES AND COUNTERCULTURES RACIAL AND ETHNIC INEQUALITY
TECHNOLOGY AND CULTURAL CHANGE PATTERNS OF INTERGROUP RELATIONS
GLOBALIZATION AND CULTURAL EXCHANGE PREJUDICE AND DISCRIMINATION
THE ROLE OF MASS MEDIA IN CULTURE UNDERSTANDING SEX, GENDER, AND SEXUALITY
CULTURE IN THE DIGITAL AGE GENDER STRATIFICATION AND FEMINIST THEORY
PART 4: BECOMING HUMAN: SOCIALIZATION AND IDENTITY THE LGBTQ+ MOVEMENT AND SOCIAL INCLUSION
THE NATURE VS. NURTURE DEBATE AGING AND SOCIETY
AGENTS OF SOCIALIZATION: FAMILY, PEERS, AND MEDIA AGE-BASED INEQUALITY AND STEREOTYPES
SOCIALIZATION ACROSS THE LIFE COURSE SOCIAL POLICIES AFFECTING THE ELDERLY
THEORIES OF SOCIALIZATION: FREUD TO MEAD PART 8: INSTITUTIONS AND SOCIAL SYSTEMS
THE DEVELOPMENT OF THE SELF THE ECONOMY AND WORK: HISTORICAL AND MODERN VIEWS
GENDER SOCIALIZATION CAPITALISM, SOCIALISM, AND MIXED ECONOMIES
RESOCIALIZATION AND TOTAL INSTITUTIONS LABOR MARKETS AND GLOBAL EMPLOYMENT TRENDS
SOCIALIZATION IN MULTICULTURAL SETTINGS POLITICS AND POWER IN SOCIETY
SOCIAL ROLES AND IDENTITY FORMATION POLITICAL SYSTEMS AROUND THE WORLD
CHALLENGES IN MODERN SOCIALIZATION CITIZENSHIP AND POLITICAL PARTICIPATION
PART 5: STRUCTURE AND INTERACTION IN SOCIETY FAMILY STRUCTURES AND VARIATIONS
ELEMENTS OF SOCIAL STRUCTURE MARRIAGE, PARENTING, AND KINSHIP
STATUS AND ROLE IN EVERYDAY LIFE CHALLENGES FACING MODERN FAMILIES
SOCIAL INSTITUTIONS AND THEIR FUNCTIONS EDUCATION: FUNCTIONS AND INEQUALITIES
THE NATURE OF SOCIAL INTERACTION PART 9: BELIEF SYSTEMS AND HEALTH
DRAMATURGICAL ANALYSIS AND IMPRESSION MANAGEMENT RELIGION AND ITS SOCIOLOGICAL SIGNIFICANCE
THE SOCIAL CONSTRUCTION OF REALITY TYPES OF RELIGIOUS ORGANIZATIONS
TYPES OF SOCIETIES THROUGH HISTORY RELIGION IN GLOBAL CONTEXT
SECULARIZATION AND FUNDAMENTALISM DEVELOPING A READINESS FRAMEWORK
SOCIOLOGY OF HEALTH AND ILLNESS TRAINING AND AWARENESS PROGRAMS
HEALTH CARE SYSTEMS AND ACCESSIBILITY ASSESSING CURRENT SECURITY POSTURE
MENTAL HEALTH AND STIGMA READINESS METRICS AND BENCHMARKS
DISABILITY AND SOCIETY READINESS AUDITS AND EVALUATIONS
ENVIRONMENTAL AND PUBLIC HEALTH ISSUES CASE STUDIES ON ORGANIZATIONAL PREPAREDNESS
MEDICALIZATION AND THE ROLE OF DOCTORS PART 3: CONTINGENCY PLANNING AND STRATEGY DEVELOPMENT
PART 10: SOCIETY IN TRANSITION INTRODUCTION TO CONTINGENCY PLANNING
POPULATION GROWTH AND DEMOGRAPHIC CHANGES BUSINESS IMPACT ANALYSIS
MIGRATION AND URBANIZATION DEVELOPING CONTINGENCY PLANS
URBAN LIFE AND CITY DEVELOPMENT STRATEGIES FOR DISASTER RECOVERY
ENVIRONMENTAL CHALLENGES AND SUSTAINABILITY BUSINESS CONTINUITY PLANNING ESSENTIALS
COLLECTIVE BEHAVIOR AND CROWD DYNAMICS ALIGNING IR, DR, AND BC EFFORTS
SOCIAL MOVEMENTS: ORIGINS AND IMPACT BACKUP AND REDUNDANCY TECHNIQUES
TECHNOLOGY AND SOCIAL CHANGE RECOVERY SITE STRATEGIES
GLOBALIZATION AND CULTURAL TRANSFORMATION MAINTAINING CONTINGENCY DOCUMENTATION
RESISTANCE TO CHANGE AND SOCIAL BACKLASH COMPLIANCE AND CERTIFICATION IN CONTINGENCY PLANNING
SOCIOLOGY AND THE FUTURE OF SOCIETY PART 4: PLANNING AN EFFECTIVE INCIDENT RESPONSE PROGRAM
ELEMENTS OF AN INCIDENT RESPONSE PLAN
INCIDENT RESPONSE IR PLAN DEVELOPMENT AND LIFECYCLE
DEFINING SCOPE AND OBJECTIVES
TITLE OF THE BOOK: INCIDENT RESPONSE MASTERY: A COMPLETE GUIDE TO LEGAL AND REGULATORY COMPLIANCE IN IR PLANNING
ORGANIZATIONAL RESILIENCE AND CYBERSECURITY INTEGRATION WITH ORGANIZATIONAL PROCESSES
PART 1: FOUNDATIONS OF INFORMATION SECURITY AND RISK COMMUNICATION PLANS IN IR
MANAGEMENT MAINTAINING AND UPDATING IR PLANS
DEFINING INFORMATION SECURITY AND RISK DEVELOPING PLAYBOOKS FOR IR SCENARIOS
PRINCIPLES OF THE CIA TRIAD TRAINING AND SIMULATION EXERCISES
TYPES OF SECURITY THREATS AND VULNERABILITIES EVALUATING IR PLAN EFFECTIVENESS
RISK ASSESSMENT METHODOLOGIES PART 5: ESTABLISHING AND MANAGING THE CSIRT
RISK MANAGEMENT FRAMEWORKS INTRODUCTION TO CSIRT (COMPUTER SECURITY INCIDENT RESPONSE
LEGAL AND REGULATORY REQUIREMENTS TEAM)
ETHICS IN INFORMATION SECURITY CSIRT MODELS AND STRUCTURES
ASSET IDENTIFICATION AND CLASSIFICATION RECRUITING AND TRAINING THE CSIRT
THREAT MODELING AND ANALYSIS ROLES AND RESPONSIBILITIES OF CSIRT MEMBERS
BUILDING A RISK MANAGEMENT CULTURE ESTABLISHING CSIRT POLICIES AND PROCEDURES
PART 2: READINESS PLANNING AND ORGANIZATIONAL STRATEGY TOOLS AND TECHNOLOGIES FOR CSIRT
UNDERSTANDING ORGANIZATIONAL READINESS COORDINATION WITH INTERNAL DEPARTMENTS
ALIGNING SECURITY GOALS WITH BUSINESS OBJECTIVES EXTERNAL COLLABORATION AND INFORMATION SHARING
KEY POLICIES AND PROCEDURES FOR READINESS MANAGING CSIRT OPERATIONS
ROLES AND RESPONSIBILITIES IN INCIDENT RESPONSE METRICS FOR CSIRT PERFORMANCE
PART 6: INCIDENT DETECTION AND THREAT IDENTIFICATION FORENSIC INVESTIGATION TOOLS AND TECHNIQUES
INTRODUCTION TO INCIDENT DETECTION MAINTAINING OPERATIONAL CONTINUITY
INDICATORS OF COMPROMISE (IOCS) THIRD-PARTY AND SUPPLY CHAIN CONSIDERATIONS
BEHAVIOR-BASED DETECTION REVIEWING THE IR LIFECYCLE
LOG ANALYSIS AND CORRELATION PART 10: CRISIS MANAGEMENT, DISASTER RECOVERY, AND BUSINESS
NETWORK TRAFFIC MONITORING CONTINUITY
HOST-BASED DETECTION TECHNIQUES PRINCIPLES OF CRISIS MANAGEMENT
USE OF THREAT INTELLIGENCE BUILDING A CRISIS RESPONSE TEAM
LEVERAGING AI AND MACHINE LEARNING INTEGRATING DR AND BC PLANS
INCIDENT REPORTING MECHANISMS COMMUNICATION DURING A CRISIS
FALSE POSITIVES AND PRIORITIZATION LEADERSHIP IN CRISIS SITUATIONS
PART 7: DETECTION SYSTEMS AND SUPPORTING TECHNOLOGIES TESTING DISASTER RECOVERY PLANS
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) UPDATING AND MAINTAINING BC PLANS
INTRUSION DETECTION SYSTEMS (IDS) POST-CRISIS ANALYSIS AND IMPROVEMENT
INTRUSION PREVENTION SYSTEMS (IPS) RESILIENCE PLANNING FOR THE FUTURE
ENDPOINT DETECTION AND RESPONSE (EDR) REAL-WORLD CASE STUDIES IN IR, DR, AND BC
NETWORK DETECTION AND RESPONSE (NDR)
ANTIVIRUS AND ANTI-MALWARE TOOLS MALWARE ANALYSIS
HONEYPOTS AND DECEPTION TECHNOLOGIES
THREAT HUNTING TOOLS TITLE OF THE BOOK: MALWARE ANALYSIS: A COMPREHENSIVE GUIDE TO
INTEGRATION OF DETECTION SYSTEMS DISSECTION AND DEFENSE
EVALUATING DETECTION SYSTEM EFFECTIVENESS PART 1: INTRODUCTION TO MALWARE ANALYSIS AND STATIC TECHNIQUES
PART 8: RESPONDING TO INCIDENTS AND MANAGING CONTAINMENT UNDERSTANDING MALWARE AND ITS IMPACT
INCIDENT RESPONSE STRATEGY OVERVIEW OVERVIEW OF MALWARE ANALYSIS TECHNIQUES
CONTAINMENT APPROACHES (SHORT-TERM AND LONG-TERM) SETTING UP A SAFE ANALYSIS ENVIRONMENT
COMMUNICATION DURING AN INCIDENT FILE TYPE IDENTIFICATION AND METADATA EXTRACTION
LEGAL AND REGULATORY CONSIDERATIONS IN RESPONSE STRINGS ANALYSIS AND INDICATORS OF COMPROMISE
COORDINATION WITH STAKEHOLDERS PE HEADER EXAMINATION AND FILE STRUCTURE
USE OF FORENSICS IN INCIDENT RESPONSE HASHING AND SIGNATURE COMPARISON
MITIGATION TECHNIQUES BASIC STATIC TOOLS OVERVIEW
INCIDENT CLASSIFICATION AND ESCALATION LIMITATIONS OF STATIC ANALYSIS
ROOT CAUSE ANALYSIS CASE STUDY: STATIC ANALYSIS OF A REAL MALWARE SAMPLE
DOCUMENTATION AND EVIDENCE HANDLING PART 2: VIRTUAL MACHINES AND DYNAMIC ANALYSIS SETUP
PART 9: RECOVERY, MAINTENANCE, AND INVESTIGATION INTRODUCTION TO MALWARE ANALYSIS IN VIRTUAL MACHINES
TRANSITIONING FROM CONTAINMENT TO RECOVERY VM TOOLS AND BEST PRACTICES
SYSTEM RESTORATION AND VALIDATION SNAPSHOTS AND SYSTEM ISOLATION
TESTING AND VERIFYING RECOVERY NETWORKING IN A VM LAB ENVIRONMENT
LESSONS LEARNED SESSIONS USING SANDBOXES FOR INITIAL TRIAGE
DOCUMENTATION AND REPORTING INSTALLING AND CONFIGURING CUCKOO SANDBOX
UPDATING POLICIES AND PROCEDURES MONITORING TOOLS FOR DYNAMIC BEHAVIOR
AUTOMATED ANALYSIS WITH REMNUX AND FLARE-VM SETTING AND MANAGING WATCHPOINTS
SECURE HANDLING OF MALWARE SAMPLES MEMORY AND REGISTER INSPECTION
LAB EXERCISES FOR VIRTUAL MACHINE-BASED ANALYSIS PATCHING BINARIES ON THE FLY
PART 3: EXPLORING BASIC DYNAMIC ANALYSIS WORKING WITH WINDBG AND KERNEL DEBUGGING
FUNDAMENTALS OF DYNAMIC MALWARE ANALYSIS ADVANCED DEBUGGING STRATEGIES
API MONITORING TOOLS AND TECHNIQUES HANDLING ANTI-DEBUGGING MALWARE
REGISTRY MONITORING AND ANALYSIS PRACTICAL DEBUGGING WALKTHROUGH: ANALYZING A DROPPER
FILE SYSTEM BEHAVIOR OBSERVATION PART 7: MALWARE BEHAVIOR AND LAUNCH TECHNIQUES
NETWORK TRAFFIC MONITORING WITH WIRESHARK COMMON BEHAVIORAL PATTERNS OF MALWARE
BEHAVIORAL LOGGING AND INTERPRETATION FILE AND REGISTRY PERSISTENCE METHODS
UNDERSTANDING MALWARE TIMERS AND TRIGGERS CODE INJECTION TECHNIQUES
HANDLING FILELESS MALWARE DLL INJECTION AND PROCESS HOLLOWING
DYNAMIC ANALYSIS PITFALLS AND EVASION TECHNIQUES SCHEDULED TASKS AND WMI ABUSE
LAB WALKTHROUGH: EXECUTING AND ANALYZING A TROJAN MALICIOUS SERVICE CREATION
PART 4: X86 DISASSEMBLY AND REVERSE ENGINEERING BASICS STARTUP FOLDER AND AUTORUN TACTICS
BASICS OF COMPUTER ARCHITECTURE AND X86 PARENT-CHILD PROCESS MANIPULATION
REGISTERS, STACK, AND MEMORY ACCESS CASE STUDY: INVESTIGATING PERSISTENCE IN MALWARE
COMMON X86 INSTRUCTIONS AND OPCODES COMPARING MALWARE BEHAVIOR ACROSS SAMPLES
CONTROL FLOW AND FUNCTION CALLS PART 8: EVASION, OBFUSCATION, AND ANTI-ANALYSIS
LOOPING AND BRANCHING STRUCTURES MALWARE ANTI-DISASSEMBLY TECHNIQUES
INTRO TO REVERSE ENGINEERING TOOLS ANTI-DEBUGGING CODE ANALYSIS
USING DISASSEMBLERS FOR CODE REVIEW COMMON ANTI-VM STRATEGIES
PATTERNS IN DECOMPILED CODE BYPASSING SANDBOXES AND HEURISTICS
LIMITATIONS OF AUTOMATED DISASSEMBLERS UNDERSTANDING PACKERS AND COMPRESSION TOOLS
MINI PROJECT: REVERSE ENGINEERING A BINARY MANUAL AND AUTOMATED UNPACKING
PART 5: MASTERING IDA PRO AND ASSEMBLY CONSTRUCTS OBFUSCATED CODE DETECTION
GETTING STARTED WITH IDA PRO ROLE OF ENCRYPTION AND ENCODING
NAVIGATING THE IDA INTERFACE EVADING AV DETECTION AND SIGNATURE AVOIDANCE
RECOGNIZING HIGH-LEVEL CONSTRUCTS IN ASSEMBLY PRACTICAL EXERCISE: UNPACKING AND DEOBFUSCATING MALWARE
CROSS-REFERENCES AND CODE FLOW PART 9: NETWORK SIGNATURES AND ADVANCED CODE ANALYSIS
FUNCTION AND DATA SEGMENT ANALYSIS INTRODUCTION TO MALWARE-FOCUSED NETWORK SIGNATURES
SIGNATURES AND FLIRT TECHNOLOGY WRITING CUSTOM YARA RULES
ANALYZING OBFUSCATED ASSEMBLY USING SURICATA AND SNORT FOR DETECTION
BUILDING CUSTOM SCRIPTS IN IDAPYTHON ANALYZING NETWORK INDICATORS OF MALWARE
INTEGRATING IDA WITH OTHER TOOLS WORKING WITH SHELLCODE AND PAYLOADS
APPLIED IDA ANALYSIS: SAMPLE MALWARE INVESTIGATION SHELLCODE INJECTION ANALYSIS
PART 6: DEBUGGING TECHNIQUES AND TOOLS REVERSE ENGINEERING C++ MALWARE
INTRODUCTION TO DEBUGGING MALWARE OBJECT-ORIENTED CONSTRUCTS IN ASSEMBLY
UNDERSTANDING SOFTWARE BREAKPOINTS MALWARE ON 64-BIT SYSTEMS
STEPPING THROUGH CODE WITH OLLYDBG COMPARISON OF 32-BIT VS 64-BIT MALWARE TECHNIQUES
PART 10: APPLIED MALWARE ANALYSIS AND CASE STUDIES ORGANIZATIONAL EXPOSURE TO NATIVE THREATS
SETTING UP A MALWARE ANALYSIS PIPELINE MAPPING BUSINESS OPERATIONS TO RISK SURFACES
END-TO-END MALWARE ANALYSIS EXAMPLE EVALUATING INDUSTRY-SPECIFIC INHERENT RISK
THREAT ATTRIBUTION TECHNIQUES SYSTEM COMPLEXITY AND BUILT-IN WEAKNESSES
WRITING DETAILED ANALYSIS REPORTS TECHNOLOGY ADOPTION AND RISK MULTIPLICATION
TOOLS FOR COLLABORATIVE MALWARE RESEARCH MANAGING SHADOW IT AND UNOFFICIAL SYSTEMS
REAL-WORLD MALWARE FAMILIES OVERVIEW INHERENT RISK IN LEGACY INFRASTRUCTURE
TRENDS IN RANSOMWARE AND INFOSTEALERS PEOPLE AS INHERENT RISK VECTORS
CASE STUDY: ANALYZING A NATION-STATE MALWARE BASELINE ASSESSMENTS AND INITIAL RISK PROFILING
TEACHING MALWARE ANALYSIS TO TEAMS PART 4: MANAGING RESIDUAL CYBER RISK
FINAL PROJECT: COMPREHENSIVE MALWARE INVESTIGATION UNDERSTANDING RESIDUAL CYBER RISK
THE LIMITATIONS OF CONTROLS
CYBER RISK MANAGEMENT POST-MITIGATION RISK MEASUREMENT
RISK TRANSFER AND CYBER INSURANCE
TITLE OF THE BOOK: CYBER RISK MANAGEMENT: NAVIGATING THE DIGITAL ACCEPTABLE RISK THRESHOLDS
THREAT LANDSCAPE REASSESSING RESIDUAL RISK OVER TIME
PART 1: UNDERSTANDING CYBER RISK IN THE DIGITAL ERA COST-BENEFIT ANALYSIS IN RISK CONTROL
CYBER RISK AT THE SPEED OF DATA MONITORING RESIDUAL RISK PERFORMANCE
THE EVOLUTION OF DIGITAL THREATS RISK APPETITE VS RESIDUAL RISK
CYBER RISK IN A HYPERCONNECTED WORLD STRATEGIC PLANNING FOR RESIDUAL RISK MANAGEMENT
DIGITAL TRANSFORMATION AND EXPOSURE PART 5: VENDOR AND THIRD-PARTY CYBER RISK
FOUNDATIONS OF RISK IN INFORMATION SYSTEMS VENDOR CYBER RISK OVERVIEW
THE ROLE OF DATA IN CYBER RISK ACCELERATION DEPENDENCY ON THIRD-PARTY SERVICES
TRENDS DRIVING THE CYBER RISK SURGE COMMON THREATS FROM EXTERNAL PARTNERS
REAL-WORLD EXAMPLES OF CYBER RISK IMPACT DUE DILIGENCE IN VENDOR SELECTION
REGULATORY PRESSURE AND CYBER RISK AWARENESS CYBER RISK IN OUTSOURCED IT OPERATIONS
ASSESSING READINESS IN THE AGE OF DATA VELOCITY LEGAL AND CONTRACTUAL RISK CONSIDERATIONS
PART 2: DISSECTING CYBER RISK FUNDAMENTALS ASSESSING VENDOR RISK MANAGEMENT PROGRAMS
DISSECTING CYBER RISK CONTINUOUS VENDOR RISK MONITORING
CORE COMPONENTS OF CYBER RISK CASE STUDY: THIRD-PARTY BREACH CONSEQUENCES
IDENTIFYING THREAT ACTORS AND THEIR MOTIVATIONS FRAMEWORKS FOR MANAGING SUPPLY CHAIN RISK
ATTACK VECTORS AND VULNERABILITY EXPLOITATION PART 6: EMERGING CYBER RISK LANDSCAPES
DATA BREACHES AND THEIR BUSINESS IMPACTS FUTURE CYBER RISK SCENARIOS
FINANCIAL AND REPUTATIONAL CONSEQUENCES CYBER THREATS IN THE INTERNET OF THINGS (IOT)
INTERNAL VS EXTERNAL CYBER THREATS BLOCKCHAIN AND CRYPTOGRAPHIC SECURITY RISKS
COMMON MISCONCEPTIONS IN CYBER RISK ASSESSMENT ARTIFICIAL INTELLIGENCE AS A RISK VECTOR
LINKING RISK TO ORGANIZATIONAL OBJECTIVES QUANTUM COMPUTING AND ENCRYPTION THREATS
CASE STUDY: ANATOMY OF A CORPORATE CYBER INCIDENT PREPARING FOR FUTURE DISRUPTION
PART 3: INHERENT CYBER RISK EXPOSURE ANTICIPATING THREAT EVOLUTION
INHERENT CYBER RISK DEFINED BUILDING FLEXIBILITY INTO CYBER STRATEGIES
POLICY DEVELOPMENT FOR EMERGING TECH CASE STUDY: SUPPLY CHAIN CYBER RISK BREACH
ADAPTING GOVERNANCE TO INNOVATION CASE STUDY: INSIDER THREAT AND DATA LEAK
PART 7: CYBER RISK MANAGEMENT STRATEGIES LESSONS LEARNED FROM NOTABLE CYBER INCIDENTS
CYBER RISK MANAGEMENT TOOL KIT BENCHMARKING AGAINST INDUSTRY STANDARDS
CORE PRINCIPLES OF CYBER RISK GOVERNANCE THE FUTURE OF CYBER RISK OPERATIONS
CYBER RISK ASSESSMENT METHODOLOGIES FINAL THOUGHTS: EVOLVING WITH THE THREAT LANDSCAPE
ESTABLISHING A CYBER RISK MANAGEMENT PROGRAM
ALIGNING RISK MANAGEMENT TO BUSINESS STRATEGY CYBERSECURITY POLICIES AND PROCEDURES
CYBERSECURITY FRAMEWORKS AND MODELS
MATURITY MODELS AND CAPABILITY BUILDING TITLE OF THE BOOK: CYBERSECURITY POLICIES AND PROCEDURES:
GAP ANALYSIS AND REMEDIATION PLANNING FRAMEWORKS, GOVERNANCE, AND COMPLIANCE IN THE DIGITAL AGE
TOOLS FOR CONTINUOUS RISK ANALYSIS PART 1: FOUNDATIONS OF CYBERSECURITY POLICY AND GOVERNANCE
PRIORITIZING RESOURCES FOR MAXIMUM PROTECTION UNDERSTANDING CYBERSECURITY POLICY AND GOVERNANCE
PART 8: BUILDING A RESILIENT CYBER ECOSYSTEM THE ROLE OF GOVERNANCE IN INFORMATION SECURITY
OPTIMIZING CYBER RISK RESILIENCY KEY ELEMENTS OF AN EFFECTIVE POLICY
BUILDING BUSINESS CONTINUITY INTO CYBER STRATEGY POLICY LIFECYCLE AND IMPLEMENTATION
RESILIENT ARCHITECTURE AND SYSTEM DESIGN CYBERSECURITY RISK AND STRATEGIC PLANNING
CYBER HYGIENE AND RISK REDUCTION CULTURE POLICY INTEGRATION ACROSS BUSINESS FUNCTIONS
CYBERSECURITY AWARENESS AND TRAINING PROGRAMS LEGAL AND ETHICAL CONSIDERATIONS
SIMULATION AND TABLETOP EXERCISES ACCOUNTABILITY AND ENFORCEMENT
REAL-TIME THREAT INTELLIGENCE UTILIZATION EVALUATING POLICY EFFECTIVENESS
ADAPTIVE RISK RESPONSE MODELS BUILDING A SECURITY-CONSCIOUS CULTURE
METRICS AND KPIS FOR RESILIENCY PART 2: STRUCTURE, FORMATS, AND STANDARDS FOR CYBERSECURITY
LONG-TERM CYBER RESILIENCY PLANNING POLICY
PART 9: LEADERSHIP, COMPLIANCE, AND CYBER RISK COMMUNICATION CYBERSECURITY POLICY ORGANIZATION, FORMAT, AND STYLES
THE ROLE OF EXECUTIVES IN CYBER RISK STANDARD POLICY TEMPLATES AND COMPONENTS
INTEGRATING RISK INTO BOARD-LEVEL DISCUSSIONS WRITING FOR EXECUTIVE VS TECHNICAL AUDIENCES
COMPLIANCE REQUIREMENTS AND FRAMEWORKS POLICY TYPES: ADMINISTRATIVE, TECHNICAL, PHYSICAL
CYBER RISK COMMUNICATION ACROSS THE ORGANIZATION CRAFTING CLEAR AND MEASURABLE OBJECTIVES
BUILDING A CULTURE OF SHARED CYBER ACCOUNTABILITY INTEGRATING CHECKLISTS AND PROCEDURES
CYBER ETHICS AND CORPORATE RESPONSIBILITY COMMUNICATION AND DISTRIBUTION METHODS
LEGAL LIABILITIES AND CYBER LITIGATION TRENDS VERSION CONTROL AND POLICY REVIEW CYCLES
PREPARING EXECUTIVE REPORTS ON RISK ALIGNING POLICY WITH OPERATIONAL GOALS
COMMUNICATING WITH STAKEHOLDERS AND REGULATORS ADDRESSING RESISTANCE TO POLICY ENFORCEMENT
GOVERNANCE STRUCTURES FOR CYBER RISK PART 3: CYBERSECURITY FRAMEWORKS AND INDUSTRY STANDARDS
PART 10: CYBER RISK OPERATIONS AND CASE APPLICATIONS CYBERSECURITY FRAMEWORKS OVERVIEW
OPERATIONALIZING CYBER RISK STRATEGIES NIST CYBERSECURITY FRAMEWORK
DAILY RISK MANAGEMENT ACTIVITIES ISO/IEC 27001 AND RELATED STANDARDS
IMPLEMENTING CONTROLS AND MONITORING TOOLS COBIT FOR IT GOVERNANCE
CASE STUDY: RESPONDING TO RANSOMWARE CIS CONTROLS AND IMPLEMENTATION GROUPS
MAPPING POLICIES TO FRAMEWORK CONTROLS INCIDENT RESPONSE PLANS AND PLAYBOOKS
RISK-BASED FRAMEWORK SELECTION THREAT INTELLIGENCE AND THREAT HUNTING
CROSS-INDUSTRY COMPLIANCE REQUIREMENTS SECURITY OPERATIONS CENTER (SOC) POLICIES
INTEGRATING MULTIPLE FRAMEWORKS DIGITAL FORENSICS PROCESSES AND DOCUMENTATION
POLICY HARMONIZATION AND FRAMEWORK ADAPTATION MALWARE CONTAINMENT AND ERADICATION
PART 4: CLOUD SECURITY POLICIES AND ARCHITECTURE LOG MANAGEMENT AND MONITORING
CLOUD SECURITY FUNDAMENTALS PENETRATION TESTING AND RED TEAMING
SHARED RESPONSIBILITY MODELS IN THE CLOUD CHANGE MANAGEMENT IN CYBEROPS
CLOUD PROVIDER RISK ASSESSMENT POST-INCIDENT REVIEW AND IMPROVEMENT PLANS
MULTI-TENANT ISOLATION AND ACCESS PART 8: ACCESS CONTROL AND SUPPLY CHAIN SECURITY
DATA PROTECTION IN CLOUD ENVIRONMENTS ACCESS CONTROL MANAGEMENT POLICIES
CLOUD COMPLIANCE AND REGIONAL LAWS ROLE-BASED AND ATTRIBUTE-BASED ACCESS CONTROL
CLOUD SERVICE-LEVEL AGREEMENTS (SLAS) AUTHENTICATION MECHANISMS AND MFA
ENCRYPTION AND KEY MANAGEMENT POLICIES IDENTITY AND ACCESS LIFECYCLE MANAGEMENT
AUDITING AND LOGGING IN THE CLOUD PRIVILEGED ACCESS MANAGEMENT
CLOUD INCIDENT RESPONSE PLANS SUPPLY CHAIN SECURITY RISKS
PART 5: GOVERNANCE, RISK, AND ASSET PROTECTION THIRD-PARTY VENDOR ASSESSMENTS
GOVERNANCE AND RISK MANAGEMENT PRINCIPLES PROCUREMENT SECURITY PROTOCOLS
ESTABLISHING RISK MANAGEMENT FRAMEWORKS SECURE DEVELOPMENT LIFE CYCLE (SDLC) POLICIES
BUSINESS RISK VS. TECHNICAL RISK MONITORING VENDORS AND SERVICE PROVIDERS
ASSET IDENTIFICATION AND CLASSIFICATION PART 9: BUSINESS CONTINUITY AND SECTOR-SPECIFIC REGULATIONS
DATA LOSS PREVENTION STRATEGIES BUSINESS CONTINUITY MANAGEMENT PROGRAMS
ENDPOINT AND DEVICE SECURITY POLICIES DISASTER RECOVERY PLANNING
BACKUP AND RECOVERY REQUIREMENTS RISK ASSESSMENTS FOR BUSINESS CONTINUITY
DATA LIFECYCLE SECURITY REGULATORY COMPLIANCE FOR FINANCIAL INSTITUTIONS
ASSET RETIREMENT AND DISPOSAL COMPLIANCE AUDITS AND REPORTING FOR FINANCE
MEASURING RESIDUAL RISK REGULATORY COMPLIANCE FOR THE HEALTH-CARE SECTOR
PART 6: PERSONNEL, EDUCATION, AND PHYSICAL SECURITY HIPAA AND HEALTH DATA SECURITY POLICIES
HUMAN RESOURCES SECURITY AND EDUCATION PCI COMPLIANCE FOR MERCHANTS
EMPLOYEE BACKGROUND SCREENING POLICIES NETWORK SEGMENTATION AND POS SYSTEM CONTROLS
ACCEPTABLE USE AND SECURITY AWARENESS TRAINING FRAUD PREVENTION AND SECURE TRANSACTION POLICIES
ROLE-BASED SECURITY CONTROLS PART 10: PRIVACY, AI, AND THE FUTURE OF CYBERSECURITY POLICY
INSIDER THREAT MITIGATION PRIVACY IN AN AI-DRIVEN LANDSCAPE
PRIVILEGED USER MANAGEMENT DATA PROTECTION REGULATIONS (GDPR, CCPA, ETC.)
PHYSICAL AND ENVIRONMENTAL SECURITY CONTROLS PRIVACY BY DESIGN AND DEFAULT
FACILITY ACCESS CONTROL PROCEDURES ARTIFICIAL INTELLIGENCE GOVERNANCE AND REGULATIONS
SURVEILLANCE AND PHYSICAL SECURITY MONITORING ETHICS AND ACCOUNTABILITY IN AI SYSTEMS
ENVIRONMENTAL PROTECTION SYSTEMS FOR IT INFRASTRUCTURE AUDITING AI ALGORITHMS FOR COMPLIANCE
PART 7: CYBERSECURITY OPERATIONS AND THREAT MANAGEMENT DATA GOVERNANCE AND OWNERSHIP
CYBERSECURITY OPERATIONS (CYBEROPS) OVERVIEW PREPARING FOR FUTURE REGULATORY SHIFTS
AI INCIDENT MANAGEMENT AND MONITORING PART 4: GOVERNMENT AND THE ECONOMY
CONCLUDING INSIGHTS ON CYBERSECURITY POLICY EVOLUTION MARKETS AND GOVERNMENT
ANTITRUST AND REGULATION
BASIC ECONOMICS TAXES AND SUBSIDIES
REDISTRIBUTION OF INCOME
TITLE OF THE BOOK: BASIC ECONOMICS: PRINCIPLES, POLICIES, AND CURRENT ISSUES: INCOME, INCOME DISTRIBUTION, POVERTY, AND
GLOBAL PERSPECTIVES GOVERNMENT POLICY
PART 1: FOUNDATIONS OF ECONOMIC THOUGHT AND FREEDOM PUBLIC CHOICE AND POLITICAL ECONOMY
THE WEALTH OF NATIONS: OWNERSHIP AND ECONOMIC FREEDOM GOVERNMENT SPENDING AND BUDGET DEFICITS
UNDERSTANDING ECONOMICS IN EVERYDAY LIFE THE ROLE OF INSTITUTIONS IN ECONOMIC DEVELOPMENT
SCARCITY AND OPPORTUNITY COSTS ENVIRONMENTAL ECONOMICS AND SUSTAINABLE POLICY
THE PROBLEM OF CHOICE IN A WORLD OF LIMITS ECONOMIC JUSTICE AND FAIRNESS
FACTORS OF PRODUCTION AND ECONOMIC SYSTEMS PART 5: MEASURING ECONOMIC PERFORMANCE
THE ROLE OF INCENTIVES IN ECONOMIC DECISION-MAKING THE AGGREGATE ECONOMY
OPPORTUNITY COSTS IN CONSUMER AND PRODUCER BEHAVIOR NATIONAL INCOME ACCOUNTING
PRODUCTION POSSIBILITIES AND ECONOMIC EFFICIENCY GROSS DOMESTIC PRODUCT AND ITS COMPONENTS
SPECIALIZATION, DIVISION OF LABOR, AND TRADE REAL VS. NOMINAL GDP
COMPARATIVE ADVANTAGE AND GAINS FROM TRADE THE LIMITATIONS OF GDP AS A MEASURE
PART 2: MARKET SYSTEMS AND PRICE MECHANISMS INFLATION AND THE CONSUMER PRICE INDEX
MARKETS AND THE PRICE SYSTEM EMPLOYMENT AND UNEMPLOYMENT
DEMAND: CONSUMER CHOICE TYPES OF UNEMPLOYMENT AND THEIR CAUSES
SUPPLY: THE COSTS OF DOING BUSINESS BUSINESS CYCLES AND ECONOMIC FLUCTUATIONS
ELASTICITY: DEMAND AND SUPPLY PRODUCTIVITY AND STANDARD OF LIVING
EQUILIBRIUM PRICE AND QUANTITY PART 6: MACROECONOMIC MODELS AND EQUILIBRIUM
MARKET ADJUSTMENTS AND CHANGES IN SUPPLY AND DEMAND MACROECONOMIC EQUILIBRIUM: AGGREGATE DEMAND AND SUPPLY
GOVERNMENT INTERVENTION: PRICE FLOORS AND CEILINGS AGGREGATE DEMAND: COMPONENTS AND DETERMINANTS
CONSUMER SURPLUS AND PRODUCER SURPLUS AGGREGATE SUPPLY: SHORT RUN AND LONG RUN
MARKET FAILURES AND EXTERNALITIES INCOME AND EXPENDITURES EQUILIBRIUM
PUBLIC GOODS AND COMMON RESOURCES THE KEYNESIAN CROSS MODEL
PART 3: BUSINESS BEHAVIOR AND MARKET STRUCTURES THE MULTIPLIER EFFECT
PROFIT MAXIMIZATION AGGREGATE EXPENDITURES
COSTS OF PRODUCTION AND ECONOMIES OF SCALE INVESTMENT AND INTEREST RATES
PERFECT COMPETITION EXPECTATIONS AND ECONOMIC BEHAVIOR
MONOPOLY STABILIZATION POLICY AND THE AD-AS MODEL
MONOPOLISTIC COMPETITION AND OLIGOPOLY PART 7: FISCAL AND MONETARY POLICIES
PRICE DISCRIMINATION AND MARKET POWER FISCAL POLICY: TOOLS AND OBJECTIVES
GAME THEORY AND STRATEGIC BEHAVIOR GOVERNMENT SPENDING AND TAXATION
BARRIERS TO ENTRY AND EXIT BUDGET SURPLUSES AND DEFICITS
INNOVATION AND DYNAMIC EFFICIENCY THE ROLE OF THE GOVERNMENT IN STABILIZATION
BUSINESS ETHICS AND CORPORATE SOCIAL RESPONSIBILITY MONEY AND BANKING
THE ROLE OF CENTRAL BANKS
THE MONEY SUPPLY AND ITS DETERMINANTS BASIC COMMUNICATION SKILLS
MONETARY POLICY INSTRUMENTS
INTEREST RATES AND INVESTMENT TITLE OF THE BOOK: MASTERING BASIC COMMUNICATION SKILLS: FROM
MONETARY POLICY: GOALS AND LIMITATIONS SELF-EXPRESSION TO PUBLIC SPEAKING
PART 8: ADVANCED MACROECONOMIC TOPICS PART 1: CORE FOUNDATIONS OF COMMUNICATION
MACROECONOMIC POLICY: TRADEOFFS, EXPECTATIONS, CREDIBILITY, AND FOUNDATIONS OF COMMUNICATION
SOURCES OF BUSINESS CYCLES THE COMMUNICATION PROCESS
INFLATION: CAUSES, EFFECTS, AND CONTROL COMMUNICATION MODELS AND CONTEXTS
UNEMPLOYMENT AND INFLATION ELEMENTS OF EFFECTIVE COMMUNICATION
THE PHILLIPS CURVE BARRIERS TO COMMUNICATION
NEW KEYNESIAN, MONETARIST, AND NEW CLASSICAL PERSPECTIVES THE ROLE OF FEEDBACK
RATIONAL EXPECTATIONS AND POLICY INEFFECTIVENESS ETHICS IN COMMUNICATION
SUPPLY-SIDE ECONOMICS COMMUNICATION AND TECHNOLOGY
DEFLATION AND LIQUIDITY TRAPS THE IMPORTANCE OF COMMUNICATION IN DAILY LIFE
FISCAL-MONETARY POLICY INTERACTIONS COMMUNICATION COMPETENCE AND IMPROVEMENT
GLOBAL COORDINATION OF ECONOMIC POLICY PART 2: UNDERSTANDING PERCEPTION AND IDENTITY
PART 9: ECONOMIC GROWTH AND DEVELOPMENT PERCEPTION OF SELF AND OTHERS
ECONOMIC GROWTH: DETERMINANTS AND TRENDS THE ROLE OF PERCEPTION IN COMMUNICATION
THEORIES OF GROWTH: CLASSICAL AND MODERN SELF-CONCEPT AND SELF-ESTEEM
CAPITAL ACCUMULATION AND TECHNOLOGICAL PROGRESS IDENTITY AND COMMUNICATION STYLES
PRODUCTIVITY AND LONG-TERM GROWTH STEREOTYPES AND PREJUDICES
DEVELOPMENT ECONOMICS CULTURAL INFLUENCES ON PERCEPTION
STRATEGIES FOR ECONOMIC DEVELOPMENT MANAGING IMPRESSIONS
INSTITUTIONS AND DEVELOPMENT OUTCOMES ATTRIBUTION AND INTERPRETATION
INEQUALITY AND HUMAN DEVELOPMENT COMMUNICATION AND EMOTIONAL INTELLIGENCE
GLOBALIZATION AND ECONOMIC INTEGRATION REFLECTIVE THINKING IN COMMUNICATION
SUSTAINABLE DEVELOPMENT AND CLIMATE ECONOMICS PART 3: COMMUNICATING ACROSS CULTURES
PART 10: INTERNATIONAL ECONOMICS AND GLOBAL MARKETS INTERCULTURAL COMMUNICATION
AN INTRODUCTION TO THE FOREIGN EXCHANGE MARKET AND THE CULTURAL DIMENSIONS AND VALUES
BALANCE OF PAYMENTS COMMUNICATION AND GLOBALIZATION
EXCHANGE RATES AND FINANCIAL LINKS BETWEEN COUNTRIES HIGH-CONTEXT VS. LOW-CONTEXT CULTURES
WORLD TRADE EQUILIBRIUM LANGUAGE AND CULTURAL DIVERSITY
INTERNATIONAL TRADE THEORIES AND MODELS BARRIERS TO INTERCULTURAL UNDERSTANDING
COMPARATIVE AND ABSOLUTE ADVANTAGE ETHNOCENTRISM AND CULTURAL RELATIVISM
TRADE POLICIES AND RESTRICTIONS STRATEGIES FOR EFFECTIVE INTERCULTURAL COMMUNICATION
TARIFFS, QUOTAS, AND SUBSIDIES BUILDING CULTURAL AWARENESS
GLOBAL FINANCIAL MARKETS CONFLICT AND RESOLUTION ACROSS CULTURES
ECONOMIC CRISES AND GLOBAL RESPONSES PART 4: MASTERING VERBAL AND NONVERBAL MESSAGES
USING ECONOMICS TO UNDERSTAND THE WORLD AROUND YOU VERBAL MESSAGES
LANGUAGE AND MEANING BUILDING TEAM COHESION
EFFECTIVE WORD CHOICE EVALUATING GROUP PERFORMANCE
VERBAL COMMUNICATION IN DIFFERENT CONTEXTS PART 8: DEVELOPING PRESENTATION TOPICS AND STRUCTURE
NONVERBAL MESSAGES TOPIC SELECTION AND DEVELOPMENT
TYPES OF NONVERBAL COMMUNICATION ANALYZING YOUR AUDIENCE
THE ROLE OF BODY LANGUAGE RESEARCHING FOR PRESENTATIONS
VOCALICS AND PARALANGUAGE NARROWING AND FOCUSING A TOPIC
SPACE, TIME, AND APPEARANCE IN COMMUNICATION ORGANIZING YOUR SPEECH
INTEGRATING VERBAL AND NONVERBAL CUES STRUCTURING THE INTRODUCTION
PART 5: BECOMING A SKILLED LISTENER STRUCTURING THE BODY AND MAIN POINTS
LISTENING TRANSITIONS AND SIGNPOSTING
TYPES OF LISTENING STRUCTURING THE CONCLUSION
BARRIERS TO EFFECTIVE LISTENING ENHANCING CLARITY AND RETENTION
LISTENING VS. HEARING PART 9: ENHANCING PRESENTATION WITH STYLE AND SUPPORT
ACTIVE LISTENING TECHNIQUES PRESENTATIONAL AIDS
LISTENING IN INTERPERSONAL SETTINGS TYPES OF VISUAL AIDS
LISTENING IN PROFESSIONAL SETTINGS INTEGRATING MEDIA IN SPEECHES
EVALUATING MESSAGES VISUAL DESIGN PRINCIPLES
CRITICAL LISTENING LANGUAGE AND ORAL STYLE
EMPATHIC LISTENING STYLISTIC DEVICES IN SPEAKING
PART 6: COMMUNICATION IN RELATIONSHIPS LANGUAGE APPROPRIATENESS AND CLARITY
INTERPERSONAL RELATIONSHIPS USING HUMOR AND STORYTELLING
STAGES OF RELATIONSHIP DEVELOPMENT AVOIDING LANGUAGE PITFALLS
BUILDING TRUST AND INTIMACY CULTURALLY SENSITIVE LANGUAGE
MANAGING INTERPERSONAL CONFLICT PART 10: PUBLIC SPEAKING AND PERSUASION
INTERPERSONAL COMMUNICATION DELIVERY
ASSERTIVENESS AND COMMUNICATION STYLES MANAGING SPEECH ANXIETY
GENDER AND INTERPERSONAL COMMUNICATION PRACTICING AND REHEARSING
COMMUNICATION CLIMATE AND RELATIONAL MAINTENANCE VERBAL AND NONVERBAL DELIVERY SKILLS
FAMILY COMMUNICATION INFORMATIVE SPEAKING
FRIENDSHIPS AND ROMANTIC RELATIONSHIPS STRUCTURING INFORMATIVE SPEECHES
PART 7: GROUP COMMUNICATION AND TEAMWORK MAKING INFORMATION CLEAR AND MEMORABLE
COMMUNICATING IN GROUPS PERSUASIVE SPEAKING
TYPES OF GROUPS TECHNIQUES OF PERSUASION
GROUP NORMS AND ROLES ETHICS IN PUBLIC SPEAKING
EFFECTIVE GROUP COMMUNICATION TECHNIQUES
GROUP LEADERSHIP AND PROBLEM SOLVING PAGBASA AT PAGSULAT
LEADERSHIP STYLES AND FUNCTIONS
DECISION-MAKING METHODS PAMAGAT NG AKLAT: PAGBASA AT PAGSULAT: GABAY SA AKADEMIKONG
CONFLICT MANAGEMENT IN GROUPS KASANAYAN AT PANANALIKSIK
BAHAGI 1: WIKA BILANG DALUYAN NG PAGPAPAHAYAG PAGBUO NG KONGKLUSYON
ANG KALIKASAN AT GAMIT NG WIKA PAGGAMIT NG GRAPHIC ORGANIZERS SA PAGBASA
ANG WIKA AT PAGPAPAKAHULUGAN NITO PAGSUSURI SA ORGANISASYON NG TEKSTO
BARAYTI NG WIKA AT GAMIT SA LIPUNAN PAGSASAGAWA NG REBYU SA TEKSTO
ANTAS NG WIKA AT PORMALIDAD BAHAGI 5: MGA BATAYAN NG PAGSULAT
TEORYA NG WIKA MGA ELEMENTO SA PAGSULAT
WIKA AT KULTURA LAYUNIN NG PAGSULAT
WIKA SA MIDYA AT TEKNOLOHIYA KATANGIAN NG MABISANG PAGSULAT
WIKA SA AKADEMIKONG DISKURSO KASANAYANG GRAMATIKAL SA PAGSULAT
PAGSUSURI SA MGA ISYUNG PANGWIKA ESTILO AT BOSES NG MANUNULAT
WIKA SA MAKABAGO AT TRADISYUNAL NA KOMUNIKASYON PAGGAMIT NG WIKA SA PORMAL NA SULATIN
BAHAGI 2: MGA BATAYAN NG PAGBASA PAGPILI NG PAKSA
ANG PAGBASA: MGA PRINSIPYO AT KONSEPTO PAGGAMIT NG TAMANG ESTRUKTURA
LAYUNIN AT URI NG PAGBASA PAGSASAALANG-ALANG SA MAMBABASA
MGA ESTRATEHIYA SA MABISANG PAGBASA PAGKAKAROON NG KOHERENSIYA AT KAISAHAN
ANTAS NG PAG-UNAWA SA BINASA BAHAGI 6: ANG PROSESO NG PAGSULAT
MGA SALIK NA NAKAAAPEKTO SA PAGBASA PRE-WRITING O PANIMULANG HAKBANG
MGA MODELO NG PAGBASA PAGBUO NG BALANGKAS
PAGKILALA SA TEKSTO AT KONTEKSTO PAGSULAT NG BURADOR
PANANAW NG MAMBABASA PAGREREBISA
PAGPAPALAWAK NG TALASALITAAN PAG-EDIT NG GRAMATIKA AT MEKANIKS
KAHALAGAHAN NG KRITIKAL NA PAGBASA PAGLALATHALA NG SULATIN
BAHAGI 3: PAGBASA NG MGA AKADEMIK AT PROPESYONAL NA TEKSTO PAGSULAT BATAY SA LAYUNIN
PAGBASA NG MGA TEKSTONG AKADEMIK AT PROPESYONAL PAGSULAT PARA SA AKADEMIKO
DISKURSO SA MGA TEKSTONG AKADEMIKO PAGSULAT PARA SA PROPESYON
ANYO NG TEKSTONG AKADEMIKO PAGSULAT SA PANAHON NG DIGITAL NA KOMUNIKASYON
PAGSUSURI SA LOHIKA NG TEKSTO BAHAGI 7: ISTRUKTURA NG TEKSTO
PAGSUSURI SA NILALAMAN AT LAYUNIN MGA BAHAGI NG TEKSTO
ESTRATEHIYANG RETORIKAL SA PAGBASA PANIMULA AT INTRODUKSYON
PAGBUO NG SINTESIS MULA SA IBA’T IBANG SANGGUNIAN KATAWAN NG TEKSTO: PAGPAPALAWAK NG IDEYA
PAGGAMIT NG GRAPIKONG REPRESENTASYON PAGBUO NG KONGKLUSYON
PAGKILALA SA ISTRUKTURA NG AKADEMIKONG SULATIN TRANSISYON NG MGA IDEYA
PAGBASA NG MGA PANANALIKSIK AT ARTIKULO PAGKAKAUGNAY-UGNAY NG TALATA
BAHAGI 4: KASANAYAN SA PAGBASA NG MGA TEKSTONG AKADEMIKO PAGGAMIT NG COHESIVE DEVICES
PAGKILALA SA LAYUNIN NG TEKSTO PAGGAMIT NG LARAWAN O TALAHANAYAN SA SULATIN
PAGHINUHA AT PAGSUSURI NG DATOS PAGSUSURI SA BALANGKAS NG TEKSTO
PAGTUKOY SA OPINYON AT KATOTOHANAN EBALWASYON SA KABUUANG SULATIN
PAGTUKOY SA PANANAW NG AWTOR BAHAGI 8: MGA PARAAN NG PAGPAPAHAYAG
PAG-AANALISA NG ARGUMENTO APAT NA PANGUNAHING PARAAN NG PAGPAPAHAYAG
PAG-UUGNAY NG MGA IDEYA PAGSASALAYSAY
PAGLALARAWAN MOUNTAIN RANGES AND MIGRATION ROUTES
PAGLALAHAD ASIA’S SEISMIC AND VOLCANIC ACTIVITY
PANGANGATWIRAN DESERTS, FORESTS, AND FERTILE REGIONS
KOMBINASYON NG PARAAN NG PAGPAPAHAYAG GEOPOLITICAL BOUNDARIES AND ENVIRONMENTAL CHALLENGES
TEKNIK SA PAGSULAT NG SANAYSAY THE ROLE OF GEOGRAPHY IN EARLY ASIAN CULTURES
TEKNIK SA PAGBUO NG LATHALAIN THE ENVIRONMENT AND ASIAN SPIRITUAL BELIEFS
TEKNIK SA PAGSULAT NG TALUMPATI PART 2: THE SOCIAL FABRIC OF ANCIENT ASIA
TEKNIK SA PAGSULAT NG PORMAL NA LIHAM ANCIENT ASIAN SOCIETIES AND THEIR STRUCTURES
BAHAGI 9: PANANALIKSIK AT AKADEMIKONG SULATIN FAMILY AND KINSHIP SYSTEMS
PANGUNAHING KAALAMAN SA PANANALIKSIK RELIGION AND MYTHOLOGY IN EARLY ASIA
LAYUNIN AT KAHALAGAHAN NG PANANALIKSIK LANGUAGE DEVELOPMENT AND SCRIPTS
MGA URI NG PANANALIKSIK ARTISTIC TRADITIONS AND SYMBOLISM
ETIKA SA PANANALIKSIK GENDER ROLES AND SOCIAL NORMS
PAGHAHANAP NG SANGGUNIAN EDUCATION AND THE TRANSMISSION OF KNOWLEDGE
PAGGAMIT NG APA AT MLA FORMAT TRADE AND URBANIZATION IN EARLY SOCIETIES
PANIMULA AT LAYUNIN NG PANANALIKSIK LAW, GOVERNANCE, AND SOCIAL ORDER
PAGLALAHAD NG SULIRANIN FESTIVALS, RITUALS, AND COLLECTIVE IDENTITY
KAHALAGAHAN AT SAKLAW NG PAG-AARAL PART 3: THE BIRTH OF CIVILIZATION IN ASIA
REBYU NG KAUGNAY NA LITERATURA THE INDUS VALLEY CIVILIZATION
BAHAGI 10: PAGSASAGAWA NG SULATING PANANALIKSIK MESOPOTAMIA AND SUMERIANS OF WEST ASIA
MGA HAKBANG SA PAGBUO NG SULATING PANANALIKSIK THE RISE OF ANCIENT CHINA
METODOLOHIYA EARLY SOUTHEAST ASIAN KINGDOMS
PAGLALAHAD AT PAGSUSURI NG DATOS TECHNOLOGICAL INNOVATIONS AND CONTRIBUTIONS
PAGLALAGOM AT KONKLUSYON WRITING SYSTEMS AND RECORDKEEPING
REKOMENDASYON RELIGION AND THE TEMPLE STATES
REBYU AT REBISYON NG SULATIN ARCHITECTURE AND URBAN PLANNING
PAGLALATHALA NG PANANALIKSIK AGRICULTURAL TECHNIQUES AND FOOD CULTURE
ORAL PRESENTATION NG PANANALIKSIK INTERACTIONS AND CONFLICTS AMONG EARLY STATES
EBALWASYON NG PANANALIKSIK PART 4: WHEN ASIANS SHAPED THE WORLD
PAGTATAYA SA KAKAYAHAN SA AKADEMIKONG PAGSULAT THE SILK ROAD AND TRADE EXPANSION
MARITIME INNOVATIONS AND NAVAL TRADE
ASIAN HISTORY BUDDHIST EXPANSION AND CULTURAL EXCHANGE
ASIA’S INFLUENCE ON GLOBAL MEDICINE AND SCIENCE
TITLE OF THE BOOK: ECHOES OF THE EAST: A JOURNEY THROUGH ASIAN PHILOSOPHY AND GOVERNANCE FROM ASIA TO THE WEST
HISTORY ASIAN CONTRIBUTIONS TO MATHEMATICS AND ASTRONOMY
PART 1: ASIA AND ITS NATURAL FOUNDATIONS LITERATURE AND TRANSLATED WORKS
PHYSICAL GEOGRAPHY AND MAJOR LANDFORMS OF ASIA ASIAN ART IN GLOBAL EXHIBITIONS
CLIMATE AND ECOSYSTEMS ACROSS THE ASIAN CONTINENT THE SPREAD OF ASIAN MARTIAL ARTS
NATURAL RESOURCES AND AGRICULTURAL PATTERNS INFLUENCE OF ASIAN CUISINE AND CULTURE GLOBALLY
RIVER SYSTEMS AND THEIR IMPACT ON CIVILIZATION PART 5: WEST ASIA THROUGH THE AGES
THE CRADLE OF CIVILIZATION: MESOPOTAMIA KOREA'S DYNASTIC HERITAGE
PERSIAN EMPIRE AND CULTURAL ACHIEVEMENTS EAST ASIA IN WORLD WAR II
THE RISE AND SPREAD OF ISLAM ECONOMIC MIRACLES AND TECHNOLOGICAL GROWTH
THE ABBASID CALIPHATE PART 9: EMPIRES AND NATIONS OF INNER AND SOUTHEAST ASIA
CRUSADES AND THEIR IMPACT ON WEST ASIA GENGHIS KHAN AND THE MONGOL EMPIRE
OTTOMAN EMPIRE AND ITS LEGACY MONGOL GOVERNANCE AND CULTURAL TOLERANCE
COLONIAL INTERESTS IN WEST ASIA FALL AND FRAGMENTATION OF MONGOL RULE
POST-COLONIAL CHALLENGES EARLY SOUTHEAST ASIAN KINGDOMS
OIL POLITICS AND ECONOMIC TRANSFORMATIONS INFLUENCE OF INDIA AND CHINA ON SOUTHEAST ASIA
MODERN CONFLICTS AND PEACE INITIATIVES MARITIME TRADE AND SPICE ROUTES
PART 6: INDIAN SUBCONTINENT AND ITS LEGACY COLONIALISM IN MARITIME SOUTHEAST ASIA
HARAPPAN CIVILIZATION AND VEDIC PERIOD INDEPENDENCE MOVEMENTS IN SOUTHEAST ASIA
MAURYAN AND GUPTA EMPIRES ASEAN AND REGIONAL COOPERATION
HINDUISM, BUDDHISM, AND JAINISM MODERN DEVELOPMENT CHALLENGES IN THE REGION
MEDIEVAL KINGDOMS OF INDIA PART 10: ASIA IN THE GLOBAL ARENA
MUGHAL EMPIRE AND CULTURAL SYNTHESIS ASIA’S ROLE IN WORLD WARS
EUROPEAN COLONIZATION AND THE BRITISH RAJ COLD WAR POLITICS IN ASIA
INDIA’S FREEDOM STRUGGLE ASIAN TIGERS AND ECONOMIC GROWTH
PAKISTAN AND BANGLADESH: CREATION AND DEVELOPMENT CHINA’S RISE AS A SUPERPOWER
CONTEMPORARY INDIA’S POLITICAL LANDSCAPE ASIA AND GLOBAL CLIMATE POLICIES
INDIA'S ROLE IN MODERN ASIA INTER-ASIAN COOPERATION AND RIVALRY
PART 7: RUSSIA, CENTRAL, AND SOUTH ASIA ASIAN DIASPORA AND CULTURAL INFLUENCE
EARLY NOMADIC CULTURES OF CENTRAL ASIA TECHNOLOGY AND INNOVATION FROM ASIA
THE TURKIC KHANATES AND ISLAMIC INFLUENCE CONFLICTS AND PEACEBUILDING IN ASIA
RUSSIAN EXPANSION INTO ASIA ASIA’S VISION FOR THE 21ST CENTURY
THE GREAT GAME AND IMPERIAL RIVALRIES
SOVIET RULE IN CENTRAL ASIA PLANE AND SPHERICAL TRIGONOMETRY
CENTRAL ASIAN REPUBLICS AFTER THE USSR
SOCIAL AND RELIGIOUS MOVEMENTS TITLE OF THE BOOK: PLANE AND SPHERICAL TRIGONOMETRY:
GEOPOLITICS AND RESOURCES IN CENTRAL ASIA FOUNDATIONS, FUNCTIONS, AND APPLICATIONS
SOUTH ASIAN NEIGHBORS: NEPAL, BHUTAN, AND SRI LANKA PART 1: TRIGONOMETRIC FUNCTIONS AND THEIR GRAPHS
CONTEMPORARY CHALLENGES AND ALLIANCES UNDERSTANDING FUNCTIONS AND THEIR REPRESENTATIONS
PART 8: EAST ASIA AND THE DYNASTIC ERAS GRAPHING BASIC TRIGONOMETRIC FUNCTIONS
ANCIENT CHINA: SHANG AND ZHOU DYNASTIES AMPLITUDE, PERIOD, AND PHASE SHIFTS
CONFUCIANISM, DAOISM, AND LEGALISM GRAPHING SINE AND COSINE VARIATIONS
THE QIN AND HAN DYNASTIES TANGENT, COTANGENT, SECANT, AND COSECANT GRAPHS
TANG AND SONG DYNASTIES: GOLDEN AGES INVERSE TRIGONOMETRIC FUNCTIONS
YUAN AND MING DYNASTIES APPLICATIONS OF TRIGONOMETRIC GRAPHS
THE QING DYNASTY AND FOREIGN ENCOUNTERS REAL-LIFE MODELING USING TRIGONOMETRIC FUNCTIONS
MEIJI RESTORATION IN JAPAN IDENTIFYING SYMMETRY AND PERIODICITY
COMPOSITE AND PIECEWISE TRIGONOMETRIC FUNCTIONS SYMMETRY AND BEHAVIOR OF POLAR GRAPHS
PART 2: UNIT CIRCLE APPROACH TO TRIGONOMETRIC FUNCTIONS REAL-LIFE APPLICATIONS OF POLAR COORDINATES
INTRODUCTION TO THE UNIT CIRCLE COMPLEX NUMBERS IN POLAR FORM
RADIAN AND DEGREE MEASURE MULTIPLICATION AND DIVISION USING POLAR COORDINATES
TRIGONOMETRIC FUNCTIONS ON THE UNIT CIRCLE DE MOIVRE'S THEOREM AND ROOTS OF COMPLEX NUMBERS
REFERENCE ANGLES AND QUADRANTAL ANGLES PART 6: PARAMETRIC EQUATIONS
EXACT VALUES OF TRIGONOMETRIC FUNCTIONS INTRODUCTION TO PARAMETRIC EQUATIONS
CIRCULAR MOTION AND ANGULAR VELOCITY ELIMINATING THE PARAMETER
GRAPHS DERIVED FROM THE UNIT CIRCLE GRAPHING PARAMETRIC CURVES
REAL-WORLD APPLICATIONS OF THE UNIT CIRCLE APPLICATIONS IN PHYSICS AND ENGINEERING
TRANSFORMATIONS USING THE UNIT CIRCLE PROJECTILE MOTION WITH PARAMETRIC EQUATIONS
THE UNIT CIRCLE AND THE COMPLEX PLANE PARAMETRIC EQUATIONS IN ANIMATION AND DESIGN
PART 3: RIGHT TRIANGLE TRIGONOMETRY CALCULATING TANGENTS AND ARC LENGTHS
TRIGONOMETRIC RATIOS AND RIGHT TRIANGLES CURVATURE AND ACCELERATION
SOLVING RIGHT TRIANGLES 3D PARAMETRIC EQUATIONS AND VISUALIZATION
APPLICATIONS OF RIGHT TRIANGLE TRIGONOMETRY LINKING PARAMETRIC AND POLAR REPRESENTATIONS
ANGLE OF ELEVATION AND DEPRESSION PART 7: VECTORS IN TWO DIMENSIONS
TRIGONOMETRIC FUNCTIONS OF SPECIAL ANGLES INTRODUCTION TO VECTORS AND SCALARS
PYTHAGOREAN IDENTITY AND ITS USES VECTOR REPRESENTATION AND OPERATIONS
LAW OF SINES IN RIGHT TRIANGLES DOT PRODUCT AND ANGLE BETWEEN VECTORS
LAW OF COSINES IN RIGHT TRIANGLES APPLICATIONS OF VECTORS IN NAVIGATION AND FORCES
REAL-WORLD ENGINEERING PROBLEMS RESULTANT AND COMPONENT VECTORS
PROBLEM-SOLVING STRATEGIES IN RIGHT TRIANGLE TRIG VECTOR PROJECTIONS
PART 4: ANALYTIC TRIGONOMETRY SOLVING VECTOR EQUATIONS
FUNDAMENTAL IDENTITIES AND PROOFS UNIT VECTORS AND DIRECTION ANGLES
SIMPLIFYING TRIGONOMETRIC EXPRESSIONS VECTORS IN GEOMETRY AND TRIGONOMETRY
VERIFYING TRIGONOMETRIC IDENTITIES WORD PROBLEMS USING VECTORS
SUM AND DIFFERENCE FORMULAS PART 8: VECTORS IN THREE DIMENSIONS
DOUBLE-ANGLE AND HALF-ANGLE FORMULAS 3D VECTOR REPRESENTATION AND OPERATIONS
PRODUCT-TO-SUM AND SUM-TO-PRODUCT FORMULAS SCALAR AND VECTOR PROJECTIONS IN 3D
SOLVING TRIGONOMETRIC EQUATIONS CROSS PRODUCT AND ITS APPLICATIONS
MULTIPLE-ANGLE EQUATIONS EQUATIONS OF LINES AND PLANES IN 3D
INVERSE TRIGONOMETRIC EQUATIONS GEOMETRY WITH 3D VECTORS
APPLICATIONS OF ANALYTIC TRIGONOMETRY PLANAR AND SPATIAL RELATIONSHIPS
PART 5: POLAR COORDINATES AND GRAPHING FORCE AND TORQUE IN PHYSICS
INTRODUCTION TO POLAR COORDINATES PARAMETRIC EQUATIONS IN 3D
CONVERTING BETWEEN POLAR AND RECTANGULAR FORMS DOT PRODUCT AND CROSS PRODUCT COMPARISONS
PLOTTING POINTS AND CURVES IN POLAR COORDINATES MOTION PATHS AND VISUALIZATION IN 3D
GRAPHING POLAR EQUATIONS: CIRCLES AND ROSES PART 9: CONIC SECTIONS
GRAPHING POLAR EQUATIONS: LEMNISCATES AND SPIRALS THE PARABOLA AND ITS PROPERTIES
THE ELLIPSE AND ITS PROPERTIES ENHANCING VOTER EDUCATION AND AWARENESS
THE HYPERBOLA AND ITS PROPERTIES THE ROLE OF YOUTH IN DEMOCRATIC PARTICIPATION
IDENTIFYING CONIC SECTIONS BY EQUATION PROMOTING CLEAN AND HONEST ELECTIONS
REFLECTIVE PROPERTIES AND APPLICATIONS POLITICAL ENGAGEMENT IN THE COMMUNITY
ROTATION OF AXES SAFEGUARDING HUMAN RIGHTS IN ELECTORAL PROCESSES
POLAR EQUATIONS OF CONICS DIGITAL LITERACY AND POLITICAL AWARENESS
CONIC SECTIONS IN ASTRONOMY STRENGTHENING DEMOCRATIC INSTITUTIONS
APPLICATIONS OF CONICS IN ENGINEERING PART 3: SOCIAL MOBILIZATION AND VOLUNTEERISM
REAL-WORLD DESIGN AND ARCHITECTURE CONCEPTS AND IMPORTANCE OF SOCIAL MOBILIZATION
PART 10: EXPONENTIAL AND LOGARITHMIC FUNCTIONS BUILDING VOLUNTEER NETWORKS FOR COMMUNITY WORK
INTRODUCTION TO EXPONENTIAL FUNCTIONS CAMPAIGNING FOR SOCIAL CHANGE
PROPERTIES AND GRAPHS OF EXPONENTIALS PLANNING AND EXECUTING CIVIC PROJECTS
REAL-WORLD APPLICATIONS OF EXPONENTIAL GROWTH ROLE OF SOCIAL MEDIA IN MOBILIZATION
INTRODUCTION TO LOGARITHMS VOLUNTEER ETHICS AND RESPONSIBILITIES
PROPERTIES AND LAWS OF LOGARITHMS COMMUNITY ACTION FOR DISASTER PREPAREDNESS
SOLVING EXPONENTIAL AND LOGARITHMIC EQUATIONS EMPOWERING LOCAL LEADERS
LOGARITHMIC SCALE AND MEASUREMENT FACILITATING GRASSROOTS MOVEMENTS
MODELING DECAY AND HALF-LIFE MEASURING IMPACT OF SOCIAL MOBILIZATION
COMPOUND INTEREST AND FINANCIAL APPLICATIONS PART 4: UNDERSTANDING COMMUNITY DYNAMICS
THE NATURAL LOGARITHM AND CONTINUOUS GROWTH DEFINING COMMUNITY AND ITS ELEMENTS
COMMUNITY POWER STRUCTURES AND RELATIONSHIPS
NATIONAL SERVICE TRAINING PROGRAM 2 – CWTS MAPPING COMMUNITY RESOURCES AND NEEDS
CONFLICT RESOLUTION AND PEACEBUILDING
TITLE OF THE BOOK: EMPOWERING CITIZENSHIP THROUGH NATIONAL PROMOTING INCLUSION AND DIVERSITY
SERVICE: A COMPREHENSIVE GUIDE TO CWTS 2 LEADERSHIP AND PARTICIPATION IN COMMUNITY LIFE
PART 1: FOUNDATIONS OF RESPONSIBLE CITIZENSHIP GENDER SENSITIVITY IN THE COMMUNITY
UNDERSTANDING THE CORE PRINCIPLES OF GOOD GOVERNANCE STRENGTHENING COMMUNITY ORGANIZATIONS
PROMOTING TRANSPARENCY AND ACCOUNTABILITY IN LEADERSHIP EMPOWERING VULNERABLE GROUPS
ENCOURAGING CIVIC PARTICIPATION IN GOVERNANCE ENHANCING SOCIAL COHESION
PUBLIC ETHICS AND CITIZEN RESPONSIBILITY PART 5: ADDRESSING CHILD ABUSE AND EXPLOITATION
GOVERNMENT SERVICES AND COMMUNITY EMPOWERMENT UNDERSTANDING CHILD RIGHTS AND WELFARE
STRENGTHENING CIVIL SOCIETY AND INSTITUTIONS FORMS AND INDICATORS OF CHILD ABUSE
ETHICS AND VALUES IN PUBLIC SERVICE THE ROLE OF THE COMMUNITY IN CHILD PROTECTION
DEVELOPING TRUST IN GOVERNANCE SYSTEMS LAWS AND POLICIES PROTECTING CHILDREN
ROLES OF CITIZENS IN DEMOCRATIC SOCIETIES INTERVENTIONS AND REFERRAL SYSTEMS
ADVANCING SUSTAINABLE PUBLIC LEADERSHIP PROMOTING CHILD-FRIENDLY ENVIRONMENTS
PART 2: SAFEGUARDING DEMOCRATIC PROCESSES REHABILITATION AND REINTEGRATION OF CHILD VICTIMS
ELECTORAL SYSTEMS AND VOTER PARTICIPATION AWARENESS CAMPAIGNS ON CHILD PROTECTION
POLITICAL RIGHTS AND RESPONSIBILITIES PREVENTING ONLINE CHILD EXPLOITATION
PREVENTING ELECTORAL FRAUD AND MANIPULATION ADVOCATING FOR SAFE SPACES IN COMMUNITIES
PART 6: RESPONDING TO SOCIAL THREATS AND CHALLENGES LEADERSHIP TRAINING AND PUBLIC SPEAKING
RECOGNIZING THE PSYCHOLOGICAL IMPACT OF PORNOGRAPHY MANAGING EMOTIONS AND MENTAL HEALTH
MEDIA LITERACY AND INTERNET SAFETY TIME MANAGEMENT AND GOAL SETTING
UNDERSTANDING POPULATION EXPLOSION AND ITS IMPACTS BUILDING RESILIENCE AND ADAPTABILITY
SOLUTIONS TO OVERPOPULATION PART 10: COMMUNITY OUTREACH AND CIVIC ENGAGEMENT
DRUG ABUSE: CAUSES AND EFFECTS PRINCIPLES OF COMMUNITY OUTREACH
COMMUNITY-BASED REHABILITATION APPROACHES NEEDS ASSESSMENT FOR COMMUNITY PROJECTS
CAMPAIGNING AGAINST DRUG USE DEVELOPING PROJECT PROPOSALS AND BUDGETS
ENVIRONMENTAL POLLUTION: TYPES AND SOURCES COLLABORATION WITH STAKEHOLDERS AND PARTNERS
CONSEQUENCES OF POLLUTION ON PUBLIC HEALTH IMPLEMENTING SUSTAINABLE OUTREACH PROGRAMS
SOLUTIONS TO ENVIRONMENTAL DEGRADATION MONITORING AND EVALUATION OF CWTS PROJECTS
PART 7: TACKLING SOCIOECONOMIC ISSUES REFLECTIVE JOURNALS AND COMMUNITY IMMERSION
UNDERSTANDING THE NATURE OF UNEMPLOYMENT SUCCESS STORIES OF CIVIC ENGAGEMENT
GOVERNMENT AND NGO PROGRAMS ON EMPLOYMENT PROMOTING VOLUNTEERISM BEYOND THE PROGRAM
CAREER DEVELOPMENT AND LIFELONG LEARNING PREPARING FOR A LIFE OF SERVICE TO THE NATION
COMMUNITY ENTERPRISES AND LIVELIHOOD PROGRAMS
ROOT CAUSES OF GRAFT AND CORRUPTION NATIONAL SERVICE TRAINING PROGRAM 2 – LTS
LEGAL FRAMEWORK AGAINST CORRUPTION
ANTI-CORRUPTION EDUCATION AND INITIATIVES TITLE OF THE BOOK: TEACHING FOR THE NATION: A COMPREHENSIVE GUIDE
ENCOURAGING ETHICAL LEADERSHIP TO LITERACY TRAINING SERVICE (LTS) IN NATIONAL SERVICE TRAINING
PROMOTING TRANSPARENCY IN LOCAL GOVERNANCE PROGRAM 2
ECONOMIC EMPOWERMENT AND SELF-RELIANCE PART 1: CITIZEN DEVELOPMENT AND CORE VALUES
PART 8: DEVELOPING SUSTAINABLE COMMUNITIES FOUNDATIONS OF CITIZEN’S VALUES FORMATION
THE CONCEPT OF ENVIRONMENTAL DEVELOPMENT MORAL AND ETHICAL PRINCIPLES IN CIVIC LIFE
CLIMATE CHANGE AWARENESS AND MITIGATION BUILDING RESPECT AND INTEGRITY IN COMMUNITIES
TREE PLANTING AND WASTE MANAGEMENT DEVELOPING RESPONSIBILITY AND ACCOUNTABILITY
SUSTAINABLE PRACTICES IN DAILY LIFE PROMOTING COMPASSION AND EMPATHY
URBAN AND RURAL ENVIRONMENTAL CHALLENGES VALUES EDUCATION IN LITERACY INSTRUCTION
ECOLOGICAL SOLID WASTE MANAGEMENT PROGRAMS INSTILLING DISCIPLINE THROUGH SERVICE
COMMUNITY GARDENING AND URBAN FARMING ROLE OF TEACHERS IN CHARACTER BUILDING
RENEWABLE ENERGY AND RESOURCE CONSERVATION ENCOURAGING VOLUNTEERISM AND SERVICE
PROMOTING A CULTURE OF ENVIRONMENTAL STEWARDSHIP REFLECTION ON PERSONAL AND COMMUNITY VALUES
GREEN PROJECTS FOR CWTS INITIATIVES PART 2: FOSTERING NATIONALISM AND PATRIOTISM
PART 9: ENHANCING PERSONAL AND SOCIAL WELL-BEING UNDERSTANDING FILIPINO IDENTITY AND HERITAGE
ROLE OF RECREATIONAL ACTIVITIES IN HOLISTIC DEVELOPMENT HISTORICAL PERSPECTIVES ON NATIONALISM
PHYSICAL FITNESS AND HEALTH IN THE COMMUNITY ACTS OF PATRIOTISM IN MODERN SOCIETY
ORGANIZING SPORTS EVENTS AND COMPETITIONS THE ROLE OF YOUTH IN NATION-BUILDING
ARTS AND CULTURE FOR SOCIAL ENGAGEMENT NATIONAL SYMBOLS AND THEIR SIGNIFICANCE
FOSTERING POSITIVE PEER RELATIONSHIPS RESPECT FOR THE CONSTITUTION AND RULE OF LAW
EXPLORING SELF-AWARENESS AND PERSONAL GROWTH TEACHING PATRIOTISM THROUGH LITERACY PROGRAMS
INTEGRATING CIVIC EDUCATION IN THE COMMUNITY NUMERACY SKILLS IN BASIC LITERACY
CELEBRATING NATIONAL UNITY AND DIVERSITY DEVELOPING FUNCTIONAL LITERACY PROGRAMS
ADVOCACY AND CITIZENSHIP ENGAGEMENT ADULT LEARNING STRATEGIES
PART 3: LEADERSHIP AND EDUCATIONAL MANAGEMENT LITERACY AND LIVELIHOOD INTEGRATION
TRAITS AND PRINCIPLES OF EFFECTIVE LEADERSHIP ADAPTING MATERIALS TO LOCAL CONTEXT
MANAGEMENT OF LITERACY PROGRAMS MONITORING AND EVALUATION OF LITERACY OUTCOMES
TEAM BUILDING AND COLLABORATION SUCCESS STORIES AND PROGRAM SUSTAINABILITY
LEADING COMMUNITY-BASED TEACHING TEAMS PART 7: EDUCATIONAL THEORIES AND INSTRUCTIONAL MODELS
TIME AND RESOURCE MANAGEMENT IN LTS OVERVIEW OF LEARNING THEORIES
PROBLEM SOLVING AND DECISION-MAKING BEHAVIORIST APPROACHES TO TEACHING
LEADERSHIP STYLES IN COMMUNITY ENGAGEMENT CONSTRUCTIVIST LEARNING ENVIRONMENTS
PROMOTING ACCOUNTABILITY AND TRANSPARENCY SOCIO-CULTURAL THEORY AND COMMUNITY LEARNING
CONFLICT RESOLUTION AND MEDIATION MULTIPLE INTELLIGENCES AND LEARNER DIVERSITY
EMPOWERING OTHERS THROUGH LEADERSHIP BLOOM’S TAXONOMY IN LESSON PLANNING
PART 4: SOCIAL MOBILIZATION FOR LITERACY STUDENT-CENTERED INSTRUCTION
CONCEPTS AND GOALS OF SOCIAL MOBILIZATION EXPERIENTIAL AND REFLECTIVE LEARNING
ORGANIZING FOR LITERACY CAMPAIGNS TEACHING WITH INCLUSION AND EQUITY
MOBILIZING YOUTH VOLUNTEERS CONNECTING THEORY TO LITERACY PRACTICE
ENGAGING STAKEHOLDERS AND LOCAL LEADERS PART 8: TEACHING STRATEGIES FOR LTS
COMMUNICATION AND ADVOCACY TECHNIQUES CLASSROOM MANAGEMENT IN COMMUNITY SETTINGS
BUILDING AWARENESS AND LITERACY DRIVES MOTIVATING LEARNERS IN LOW-LITERACY ENVIRONMENTS
PROMOTING PARTICIPATION IN TEACHING PROGRAMS INTERACTIVE AND PARTICIPATORY TECHNIQUES
CREATING SUSTAINABLE COMMUNITY PROJECTS SMALL GROUP AND ONE-ON-ONE INSTRUCTION
UTILIZING MEDIA AND TECHNOLOGY STORYTELLING AND CONTEXTUAL TEACHING
EVALUATING THE IMPACT OF MOBILIZATION EFFORTS CREATIVE USE OF LOCAL RESOURCES
PART 5: COMMUNITY ASSESSMENT AND EDUCATIONAL NEEDS DIFFERENTIATED INSTRUCTION FOR VARIED LEARNERS
INTRODUCTION TO COMMUNITY PROFILING LESSON PLANNING FOR LTS SESSIONS
METHODS OF CONDUCTING COMMUNITY SURVEYS TEACHING ASSESSMENT AND FEEDBACK TECHNIQUES
IDENTIFYING LITERACY CHALLENGES AND GAPS BUILDING RELATIONSHIPS WITH LEARNERS
ASSESSING LOCAL EDUCATIONAL RESOURCES PART 9: CREATING DAY CARE INSTRUCTIONAL MATERIALS
ENGAGING THE COMMUNITY IN EDUCATION PLANNING DESIGNING VISUAL AIDS AND CHARTS
MAPPING STAKEHOLDERS AND EDUCATIONAL PARTNERS TEACHING AIDS FOR ALPHABET AND NUMBERS
DATA COLLECTION AND ANALYSIS FLASHCARDS AND STORYBOOKS CREATION
REPORTING AND PRESENTING ASSESSMENT RESULTS INTERACTIVE GAMES AND SONGS FOR LEARNING
DESIGNING RESPONSIVE TEACHING PROGRAMS CRAFTING SIMPLE WORKSHEETS AND ACTIVITY SHEETS
CONTINUOUS ASSESSMENT FOR LITERACY DEVELOPMENT USING RECYCLED MATERIALS FOR TEACHING AIDS
PART 6: DESIGNING LITERACY TRAINING PROGRAMS SAFETY AND CHILD-FRIENDLY DESIGN PRINCIPLES
PLANNING A BASIC LITERACY CURRICULUM DIGITAL TOOLS AND TECHNOLOGY INTEGRATION
LITERACY FOR CHILDREN, YOUTH, AND ADULTS CULTURALLY RELEVANT AND INCLUSIVE MATERIALS
TEACHING READING AND WRITING SKILLS SHARING AND COLLABORATING ON RESOURCE DEVELOPMENT
PART 10: REFLECTION, EVALUATION, AND CONTINUING SERVICE SHIP PROPULSION SYSTEMS OVERVIEW
REFLECTIVE PRACTICE IN COMMUNITY TEACHING MARINE ENGINEERING TERMS AND CONCEPTS
DOCUMENTING LEARNING EXPERIENCES MAINTENANCE AND REPAIR OF SHIP SYSTEMS
SHARING BEST PRACTICES AND INNOVATIONS HULL INTEGRITY AND STRUCTURAL SAFETY
EVALUATION TOOLS FOR LTS PROGRAMS DAMAGE CONTROL AND CONTINGENCY PLANNING
IMPACT ASSESSMENT AND REPORTING FIREFIGHTING AT SEA
ADDRESSING CHALLENGES AND BARRIERS FLOODING CONTROL AND DEWATERING
PROMOTING LIFELONG LEARNING IN COMMUNITIES EMERGENCY REPAIRS AT SEA
TRANSITIONING FROM VOLUNTEER TO EDUCATOR USE OF DAMAGE CONTROL EQUIPMENT
ADVOCACY FOR LITERACY AND EDUCATION FOR ALL DAMAGE CONTROL TRAINING SIMULATIONS
SUSTAINING THE SPIRIT OF SERVICE BEYOND LTS PART 4: ORDNANCE AND NAVAL GUNNERY
CLASSIFICATION OF NAVAL WEAPONS
NATIONAL SERVICE TRAINING PROGRAM 2 – ROTC SHIPBOARD GUN SYSTEMS AND OPERATION
AMMUNITION TYPES AND STORAGE PROTOCOLS
TITLE OF THE BOOK: HONOR, DISCIPLINE, AND DUTY: A COMPREHENSIVE SAFETY IN ORDNANCE HANDLING
GUIDE TO NAVAL ROTC TRAINING UNDER NATIONAL SERVICE TRAINING TARGETING AND FIRE CONTROL SYSTEMS
PROGRAM 2 MISSILE SYSTEMS AND TORPEDO BASICS
PART 1: FOUNDATIONS OF NAVAL ORGANIZATION USE OF SMALL ARMS AND PERSONAL WEAPONS
INTRODUCTION TO NAVAL ROTC AND NATIONAL SERVICE MAINTENANCE OF WEAPONS SYSTEMS
HISTORICAL BACKGROUND OF THE NAVAL ORGANIZATION ORDNANCE LOGISTICS AND INVENTORY
STRUCTURE OF THE PHILIPPINE NAVY NAVAL GUNNERY PRACTICE AND DRILLS
ROLES AND MISSIONS OF NAVAL FORCES PART 5: NAVAL OPERATIONS AND TACTICS
NAVY ENLISTMENT AND OFFICER COMMISSIONING PROGRAMS INTRODUCTION TO NAVAL WARFARE TACTICS
NAVAL COMMAND AND HIERARCHY MARITIME PATROL AND SURVEILLANCE
MILITARY RANKS AND INSIGNIA CONVOY OPERATIONS AND ESCORT DUTIES
NAVAL BASE AND FLEET COMPONENTS AMPHIBIOUS OPERATIONS
INTERNATIONAL NAVAL ALLIANCES AND COOPERATION COASTAL DEFENSE OPERATIONS
ETHICS, LEADERSHIP, AND MILITARY CODE OF CONDUCT ANTI-SUBMARINE WARFARE PRINCIPLES
PART 2: CORE PRINCIPLES OF SEAMANSHIP SEARCH AND RESCUE OPERATIONS
FUNDAMENTALS OF SEAMANSHIP NAVAL INTELLIGENCE AND RECONNAISSANCE
PARTS OF A SHIP AND TERMINOLOGIES HUMANITARIAN MISSIONS BY NAVAL FORCES
NAVIGATION BASICS AND SEA CHARTS SIMULATION OF NAVAL OPERATIONAL SCENARIOS
ROPEWORK, KNOTS, AND LINE HANDLING PART 6: MARINE CORPS OPERATIONS
ANCHORING AND MOORING PROCEDURES OVERVIEW OF THE PHILIPPINE MARINE CORPS
SHIP MANEUVERING AND STEERING MARINE CORPS STRUCTURE AND MISSION
WATCHSTANDING DUTIES AND RESPONSIBILITIES AMPHIBIOUS WARFARE DOCTRINE
MARITIME SAFETY RULES AND PROTOCOLS JUNGLE AND URBAN WARFARE TACTICS
BASIC RULES OF THE ROAD AT SEA MARINE INFANTRY WEAPONS
PRACTICAL SEAMANSHIP EXERCISES COMBAT LEADERSHIP AND PLANNING
PART 3: ENGINEERING AND DAMAGE CONTROL FIRST AID AND TACTICAL MEDICAL SUPPORT
PHYSICAL CONDITIONING FOR MARINE CADETS WRITTEN AND PRACTICAL EXAMINATIONS
CAMOUFLAGE AND TACTICAL MOVEMENT PHYSICAL FITNESS AND ENDURANCE TESTING
FIELD EXERCISES AND LIVE SIMULATIONS CRISIS SCENARIO SIMULATIONS
PART 7: SHIPBOARD FAMILIARIZATION AND DISCIPLINE COMMUNITY ENGAGEMENT THROUGH ROTC
LIFE ABOARD A NAVAL SHIP GRADUATION AND COMMISSIONING TRADITIONS
ROLES AND RESPONSIBILITIES OF SHIP PERSONNEL CAREER PATHWAYS IN THE NAVY
CHAIN OF COMMAND ON A SHIP SUSTAINING THE SPIRIT OF SERVICE AND DUTY
DUTIES DURING NORMAL AND BATTLE STATIONS
CLEANLINESS AND MAINTENANCE OF SHIPBOARD AREAS GENERAL PHYSICS
COMMUNICATION SYSTEMS ONBOARD
SHIPBOARD DRILLS AND SAFETY INSPECTIONS TITLE OF THE BOOK: FOUNDATIONS AND FRONTIERS: A COMPREHENSIVE
MEAL ROUTINES AND MORALE MAINTENANCE EXPLORATION OF GENERAL PHYSICS
CHAIN LOCKER AND LIVING QUARTERS TOUR PART 1: FUNDAMENTALS AND KINEMATICS
PRACTICAL SHIPBOARD IMMERSION TRAINING UNDERSTANDING UNITS AND MEASUREMENT
PART 8: DRILLS, CEREMONIES, AND TRADITIONS INTRODUCTION TO TRIGONOMETRY IN PHYSICS
BASICS OF MILITARY DRILL AND BEARING VECTOR ANALYSIS AND OPERATIONS
FORMATIONS AND MARCHING TECHNIQUES MOTION IN ONE DIMENSION: DISPLACEMENT AND VELOCITY
RIFLE DRILL AND MANUAL OF ARMS ACCELERATION AND FREE FALL
FLAG PROTOCOL AND SALUTING STANDARDS MOTION IN TWO DIMENSIONS: PROJECTILES
COLORS, RETREAT, AND HONORS CEREMONIES CIRCULAR MOTION AND CENTRIPETAL FORCE
ROLE OF MUSIC AND MILITARY BANDS ANALYTICAL PROBLEM-SOLVING TECHNIQUES
CEREMONIAL GUARD DUTIES GRAPHICAL INTERPRETATION OF MOTION
CHANGE OF COMMAND CEREMONIES REAL-WORLD APPLICATIONS OF KINEMATICS
ETIQUETTE AND TRADITIONS IN THE NAVY PART 2: NEWTONIAN MECHANICS
PARADE AND REVIEW PREPARATION NEWTON’S FIRST LAW AND INERTIA
PART 9: SPECIALIZED NAVAL SKILLS AND APPLICATION NEWTON’S SECOND LAW AND FORCE CALCULATIONS
MARITIME LAW AND NAVAL JURISDICTION NEWTON’S THIRD LAW AND INTERACTION PAIRS
RADIO COMMUNICATIONS AND SIGNALING FRICTION AND ITS EFFECTS ON MOTION
MAP READING AND MARITIME NAVIGATION APPLICATIONS OF NEWTON’S LAWS
DIVING AND UNDERWATER OPERATIONS TENSION, NORMAL FORCE, AND INCLINED PLANES
LEADERSHIP IN NAVAL ENVIRONMENTS EQUILIBRIUM AND NET FORCE
HUMANITARIAN ASSISTANCE AND DISASTER RESPONSE DYNAMICS OF CIRCULAR MOTION
MARITIME SECURITY AND ANTI-PIRACY PROBLEM-SOLVING WITH FREE-BODY DIAGRAMS
NAVAL ENVIRONMENTAL PROTECTION EFFORTS CASE STUDIES IN CLASSICAL MECHANICS
CIVIL-MILITARY OPERATIONS PART 3: WORK, ENERGY, AND MOMENTUM
INTEGRATION OF WOMEN IN NAVAL SERVICE WORK AND POWER
PART 10: FINAL TRAINING AND READINESS THE WORK-ENERGY THEOREM
ROTC CADET EVALUATION PROCEDURES KINETIC AND POTENTIAL ENERGY
LEADERSHIP ASSESSMENT AND DEVELOPMENT CONSERVATION OF MECHANICAL ENERGY
COMPREHENSIVE REVIEW OF NAVAL TOPICS IMPULSE AND MOMENTUM
CONSERVATION OF MOMENTUM IN COLLISIONS ELECTRIC FIELDS AND FIELD LINES
ELASTIC AND INELASTIC COLLISIONS ELECTRIC POTENTIAL AND POTENTIAL ENERGY
TWO-DIMENSIONAL MOMENTUM CAPACITORS AND DIELECTRICS
EXPLOSIONS AND RECOIL CURRENT AND VOLTAGE
ENERGY TRANSFORMATIONS IN SYSTEMS RESISTANCE AND OHM’S LAW
PART 4: ROTATIONAL MOTION AND GRAVITY SERIES AND PARALLEL CIRCUITS
TORQUE AND ROTATIONAL INERTIA KIRCHHOFF’S RULES
ANGULAR VELOCITY AND ACCELERATION MAGNETIC FIELDS AND MAGNETIC FORCES
ROTATIONAL KINETIC ENERGY APPLICATIONS OF MAGNETISM
CONSERVATION OF ANGULAR MOMENTUM PART 8: ELECTROMAGNETISM AND LIGHT
ROLLING MOTION ELECTROMAGNETIC INDUCTION
STATIC EQUILIBRIUM AND CENTER OF GRAVITY FARADAY’S AND LENZ’S LAWS
GRAVITATIONAL FORCE AND NEWTON’S LAW OF GRAVITATION INDUCTANCE AND TRANSFORMERS
ORBITAL MOTION AND SATELLITES AC AND DC CIRCUITS
KEPLER’S LAWS OF PLANETARY MOTION POWER IN AC CIRCUITS
ROTATIONAL DYNAMICS IN ENGINEERING MAXWELL’S EQUATIONS (INTRODUCTION)
PART 5: FLUIDS AND THERMODYNAMICS NATURE AND SPEED OF LIGHT
PROPERTIES OF FLUIDS: DENSITY AND PRESSURE REFLECTION LAWS AND PLANE MIRRORS
BUOYANCY AND ARCHIMEDES’ PRINCIPLE REFRACTION AND SNELL’S LAW
FLUID DYNAMICS AND BERNOULLI’S EQUATION LENSES AND OPTICAL DEVICES
SURFACE TENSION AND CAPILLARITY PART 9: OPTICS AND MODERN PHYSICS
ELASTICITY IN SOLIDS INTERFERENCE AND DIFFRACTION OF LIGHT
TEMPERATURE AND THERMAL EXPANSION YOUNG’S DOUBLE SLIT EXPERIMENT
HEAT TRANSFER METHODS POLARIZATION OF LIGHT
CALORIMETRY AND SPECIFIC HEAT OPTICAL INSTRUMENTS: MICROSCOPES AND TELESCOPES
THE FIRST LAW OF THERMODYNAMICS INTRODUCTION TO RELATIVITY
THERMAL EFFICIENCY AND HEAT ENGINES TIME DILATION AND LENGTH CONTRACTION
PART 6: THERMODYNAMICS AND WAVES MASS-ENERGY EQUIVALENCE
THE SECOND LAW OF THERMODYNAMICS THE PHOTOELECTRIC EFFECT
ENTROPY AND IRREVERSIBILITY WAVE-PARTICLE DUALITY
THERMODYNAMIC CYCLES QUANTUM THEORIES IN PERSPECTIVE
MECHANICAL WAVES AND THEIR PROPERTIES PART 10: ATOMIC AND NUCLEAR PHYSICS
SIMPLE HARMONIC MOTION ATOMIC MODELS AND SPECTRA
WAVE SPEED AND FREQUENCY THE BOHR MODEL
INTERFERENCE AND DIFFRACTION QUANTUM NUMBERS AND ORBITALS
THE DOPPLER EFFECT X-RAYS AND ATOMIC TRANSITIONS
STANDING WAVES AND RESONANCE RADIOACTIVITY AND NUCLEAR DECAY
SOUND AND ITS APPLICATIONS HALF-LIFE AND DECAY SERIES
PART 7: ELECTRICITY AND MAGNETISM NUCLEAR REACTIONS AND ENERGY
ELECTRIC CHARGE AND COULOMB’S LAW FISSION AND FUSION
NUCLEAR POWER AND APPLICATIONS PART 4: KICKING TECHNIQUES AND APPLICATIONS
PHYSICS IN THE 21ST CENTURY: TECHNOLOGY AND BEYOND EXECUTION OF THE BASIC KICK
FRONT KICK AND PUSH KICK
DISARMING TECHNIQUES ROUNDHOUSE KICK TECHNIQUE
SIDE KICK AND BACK KICK
TITLE OF THE BOOK: MASTERING DISARMING TECHNIQUES: A LOW AND HIGH KICK CONTROL
COMPREHENSIVE GUIDE TO DEFENSIVE MARTIAL ARTS FLEXIBILITY DRILLS FOR KICKING
PART 1: FOUNDATIONS OF COMBAT READINESS DEFENDING WITH KICKS
INTRODUCTION AND ORIENTATION TO SELF-DEFENSE USING KICKS FOR DISARMING
MENTAL PREPAREDNESS AND SITUATIONAL AWARENESS KICKBOXING APPLICATIONS
UNDERSTANDING THE PHILOSOPHY OF DISARMING POWER AND BALANCE IN KICKING
BODY MECHANICS AND CONTROL PART 5: STABILITY THROUGH STANCES
BREATHING TECHNIQUES AND FOCUS EXECUTION OF THE BASIC STANCE
THE ROLE OF BALANCE IN COMBAT HORSE STANCE AND FRONT STANCE
INTRODUCTION TO DEFENSIVE ARTS CAT STANCE AND BACK STANCE
TRAINING DISCIPLINE AND ETHICS STANCE TRANSITIONS AND MOVEMENT
PHYSICAL CONDITIONING FOR SELF-DEFENSE ROOTING AND STABILITY PRINCIPLES
WARM-UPS AND INJURY PREVENTION OFFENSIVE AND DEFENSIVE STANCES
PART 2: MASTERY OF BASIC ATTACKS GROUNDED POWER IN MOVEMENT
EXECUTION OF THE BASIC PUNCH MAINTAINING CENTER OF GRAVITY
STRAIGHT PUNCH TECHNIQUES STANCE CORRECTION DRILLS
HOOK PUNCH AND UPPERCUT VARIATIONS APPLYING STANCES IN REAL COMBAT
PRECISION STRIKING METHODS PART 6: COMBINING TECHNIQUES IN SPARRING
SPEED AND POWER DRILLS BASIC SPARRING COMBINATION INTRODUCTION
TARGETING VITAL POINTS PUNCH-KICK COMBINATIONS
COMBINATIONS OF HAND STRIKES BLOCK-COUNTER COMBINATIONS
COMMON MISTAKES IN PUNCHING DISTANCE CONTROL IN SPARRING
PARTNER DRILLS FOR PUNCH ACCURACY SPEED AND REACTION DRILLS
REACTION TIME TRAINING STRATEGIC MOVEMENT PATTERNS
PART 3: DEFENSIVE BLOCKING ESSENTIALS FEINTS AND SET-UPS
EXECUTION OF THE BASIC BLOCK CONTROLLED SPARRING EXERCISES
INSIDE AND OUTSIDE BLOCKS SPARRING SAFETY AND ETIQUETTE
RISING AND DOWNWARD BLOCKS ANALYZING AND IMPROVING TECHNIQUE
REDIRECTION TECHNIQUES PART 7: UNDERSTANDING KATA AND FORMS
STRENGTHENING THE FOREARMS BASIC KATA INTRODUCTION
BLOCKING AGAINST STRIKES HISTORY AND PURPOSE OF KATA
TIMING AND DISTANCE CONTROL SOLO PRACTICE OF MOVEMENT
COMBINING BLOCKS WITH COUNTERATTACKS INTERPRETING KATA APPLICATIONS
DEFENDING AGAINST MULTIPLE PUNCHES POWER GENERATION THROUGH FORMS
FLOW DRILLS FOR BLOCK REACTION FOCUS AND DISCIPLINE IN KATA
FLOW AND RHYTHM TRAINING TITLE OF THE BOOK: CYBERSECURITY VULNERABILITY ASSESSMENT:
PARTNER APPLICATION OF KATA PRINCIPLES, PRACTICE, AND PROTECTION
KATA PERFORMANCE ASSESSMENT PART 1: FOUNDATIONS OF CYBERSECURITY
CREATING PERSONALIZED FORMS INTRODUCTION TO SECURITY CONCEPTS
PART 8: FALLING AND RECOVERY TECHNIQUES TYPES OF SECURITY THREATS AND ATTACKS
FALLING TECHNIQUES INTRODUCTION SECURITY OBJECTIVES: CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY
BACK BREAKFALL AND SIDE BREAKFALL CYBERSECURITY ROLES AND RESPONSIBILITIES
FORWARD ROLL AND SAFETY ROLLS THE IMPORTANCE OF VULNERABILITY ASSESSMENT
FALL RECOVERY DRILLS SECURITY MODELS AND POLICIES
MINIMIZING INJURY FROM FALLS SECURITY CONTROLS AND LAYERS OF DEFENSE
BREAKFALL TIMING IN COMBAT EVOLUTION OF CYBERSECURITY
PRACTICING WITH A PARTNER COMMON MISCONCEPTIONS IN CYBERSECURITY
CONDITIONING FOR FALLS FUTURE TRENDS IN SECURITY
USING FALLS IN SELF-DEFENSE PART 2: UNDERSTANDING NETWORKS
RECOVERY INTO COUNTERATTACK INTRODUCTION TO NETWORK FUNDAMENTALS
PART 9: THROWING AND TAKEDOWN MASTERY NETWORK TOPOLOGIES AND DEVICES
INTRODUCTION TO THROWING OSI AND TCP/IP MODELS
PRINCIPLES OF LEVERAGE AND BALANCE IP ADDRESSING AND SUBNETTING BASICS
HIP THROWS AND SHOULDER THROWS NETWORK PROTOCOLS AND PORTS
LEG SWEEPS AND TRIPS FIREWALLS AND ACCESS CONTROL LISTS
ARM CONTROL AND JOINT LOCKS WIRELESS NETWORK SECURITY
ESCAPING HOLDS THROUGH THROWING NETWORK MONITORING AND INTRUSION DETECTION
THROWING FROM DEFENSE COMMON NETWORK VULNERABILITIES
INTEGRATING THROWS INTO SPARRING SECURE NETWORK DESIGN CONCEPTS
CONTROLLING THE OPPONENT SAFELY PART 3: FUNDAMENTALS OF VULNERABILITY
COUNTER-THROWS AND DEFENSE VULNERABILITY CONCEPTS OVERVIEW
PART 10: REAL-WORLD SELF-DEFENSE APPLICATIONS COMMON VULNERABILITIES AND EXPOSURES (CVES)
SELF–DEFENSE TRAINING FOR UNARMED OPPONENT THREATS VS. VULNERABILITIES VS. RISKS
ESCAPING GRABS AND HOLDS ZERO-DAY VULNERABILITIES
DE-ESCALATION TACTICS VULNERABILITY DATABASES AND STANDARDS
DEFENSE AGAINST MULTIPLE ATTACKERS THE MITRE ATT&CK FRAMEWORK
IMPROVISED WEAPONS DEFENSE VULNERABILITIES IN SOFTWARE AND HARDWARE
SELF–DEFENSE TECHNIQUES FOR ARMED OPPONENT WEAK CONFIGURATION AND MISMANAGEMENT
DISARMING BLUNT WEAPONS VULNERABILITIES IN LEGACY SYSTEMS
DISARMING EDGED WEAPONS EMERGING VULNERABILITY TRENDS
DISARMING FIREARMS TECHNIQUES PART 4: ETHICS, LAW, AND RISK
FINAL SELF-DEFENSE SIMULATION AND TESTING LEGAL AND ETHICAL CONSIDERATIONS IN CYBERSECURITY
CYBERCRIME AND LEGAL FRAMEWORKS
CYBERSECURITY VULNERABILITY ASSESSMENT ETHICAL HACKING PRINCIPLES
NATIONAL AND INTERNATIONAL REGULATIONS
PRIVACY LAWS AND COMPLIANCE (E.G., GDPR, HIPAA) OTHER ASSESSMENT TECHNIQUES OVERVIEW
INTELLECTUAL PROPERTY IN CYBERSECURITY VULNERABILITY CLASSIFICATION STANDARDS
CYBERSECURITY STANDARDS AND POLICIES PRIORITIZING VULNERABILITIES USING CVSS
PROFESSIONAL CONDUCT AND RESPONSIBILITY RISK-BASED PRIORITIZATION MODELS
REPORTING ETHICAL CONCERNS VULNERABILITY REMEDIATION PLANNING
BALANCING SECURITY AND PRIVACY PATCH MANAGEMENT BEST PRACTICES
PART 5: RISK AND VULNERABILITY MANAGEMENT CONFIGURATION MANAGEMENT
INTRODUCTION TO RISK MANAGEMENT IMPLEMENTING SECURITY CONTROLS
RISK ASSESSMENT METHODOLOGIES TESTING AFTER REMEDIATION
IDENTIFYING AND EVALUATING RISKS DEVELOPING A REMEDIATION WORKFLOW
RISK RESPONSE STRATEGIES PART 9: DOCUMENTATION AND ONGOING SECURITY
RISK APPETITE AND TOLERANCE WRITING A VULNERABILITY ASSESSMENT REPORT
RISK REGISTER AND DOCUMENTATION STRUCTURING AND PRESENTING FINDINGS
THREAT MODELING TECHNIQUES RECOMMENDATIONS AND ACTION PLANS
BUSINESS IMPACT ANALYSIS COMMUNICATING WITH STAKEHOLDERS
RISK COMMUNICATION STRATEGIES CONTINUOUS VULNERABILITY MANAGEMENT CONCEPTS
INTEGRATING RISK MANAGEMENT IN CYBERSECURITY INTEGRATING VA IN DEVSECOPS
PART 6: VULNERABILITY ASSESSMENT TOOLS AND TECHNIQUES USING SIEM FOR CONTINUOUS MONITORING
OVERVIEW OF VULNERABILITY SCANNING TOOLS VULNERABILITY TRACKING AND METRICS
USING NESSUS AND OPENVAS TOOLS FOR CONTINUOUS MONITORING
SCANNING FOR WEB APPLICATION VULNERABILITIES REPORTING TO COMPLIANCE AUDITORS
NETWORK AND SYSTEM SCANNING PART 10: APPLICATION, CLOUD, AND CRITICAL INFRASTRUCTURE
PASSWORD CRACKING AND CREDENTIAL TESTING APPLICATION SECURITY FUNDAMENTALS
VULNERABILITY DETECTION IN IOT DEVICES SECURE CODING PRACTICES
INTERPRETING SCAN RESULTS WEB APP VULNERABILITIES (OWASP TOP 10)
UNDERSTANDING FALSE POSITIVES AND NEGATIVES CLOUD SECURITY CHALLENGES
COMPARING COMMERCIAL VS. OPEN SOURCE TOOLS CLOUD SECURITY TOOLS AND STRATEGIES
AUTOMATING VULNERABILITY SCANNING INDUSTRIAL CONTROL SYSTEMS (ICS) SECURITY
PART 7: PENETRATION TESTING AND ADVANCED TECHNIQUES ICS THREATS AND PROTECTION MEASURES
INTRODUCTION TO PENETRATION TESTING DEVELOPING AN INCIDENT RESPONSE PLAN
PENETRATION TESTING METHODOLOGIES RESPONDING TO VULNERABILITY EXPLOITS
SCOPING AND RULES OF ENGAGEMENT REAL-WORLD CASE STUDIES AND HANDS-ON LABS
RECONNAISSANCE AND INTELLIGENCE GATHERING
SCANNING AND ENUMERATION PENETRATION TESTING
EXPLOITATION AND PRIVILEGE ESCALATION
POST-EXPLOITATION TECHNIQUES TITLE OF THE BOOK: MASTERING PENETRATION TESTING: A
WEB APPLICATION PEN TESTING COMPREHENSIVE GUIDE TO ETHICAL HACKING AND CYBERSECURITY
SOCIAL ENGINEERING TACTICS ASSESSMENT
WRITING A PENETRATION TEST REPORT PART 1: PENETRATION TESTING FUNDAMENTALS
PART 8: ANALYZING AND RESPONDING TO VULNERABILITIES INTRODUCTION TO PENETRATION TESTING
HISTORY AND EVOLUTION OF ETHICAL HACKING PRIORITIZING VULNERABILITIES
LEGAL AND ETHICAL ASPECTS OF PENETRATION TESTING INTEGRATING SCANNING INTO WORKFLOWS
CERTIFICATIONS AND CAREER PATHS PART 5: EXPLOITATION AND PAYLOADS
TYPES OF PENETRATION TESTS EXPLOITATION METHODS AND TOOLS
ROLES AND RESPONSIBILITIES OF A PEN TESTER INTRODUCTION TO METASPLOIT FRAMEWORK
UNDERSTANDING ATTACK SURFACES PRIVILEGE ESCALATION TECHNIQUES
PHASES OF A PENETRATION TEST POST-EXPLOITATION ACTIVITIES
KEY TOOLS OF THE TRADE CUSTOM PAYLOADS WITH MSFVENOM
CREATING A PERSONAL LEARNING ROADMAP BYPASSING ANTIVIRUS AND EDR
PART 2: LAB AND ENVIRONMENT SETUP SHELLS AND REVERSE CONNECTIONS
SETTING UP A PENETRATION TESTING LAB PIVOTING AND LATERAL MOVEMENT
CHOOSING VIRTUALIZATION SOFTWARE EXPLOITING MISCONFIGURATIONS
INSTALLING KALI LINUX AND OTHER TOOLS CLEARING TRACKS AFTER EXPLOITATION
SAFE ENVIRONMENT PRACTICES PART 6: NETWORK AND SYSTEM ATTACKS
CREATING VULNERABLE TEST MACHINES NETWORK ATTACKS AND ATTACK VECTORS
INTRODUCTION TO CTF PLATFORMS TCP/IP VULNERABILITIES
SIMULATING REAL-WORLD NETWORK ENVIRONMENTS MAN-IN-THE-MIDDLE ATTACKS
SANDBOXING AND ISOLATION TECHNIQUES ARP SPOOFING AND DNS POISONING
MAINTAINING AND UPDATING YOUR LAB SNIFFING AND PACKET ANALYSIS
COMMON MISTAKES TO AVOID IN LAB SETUP PASSWORD CRACKING (OFFLINE AND ONLINE)
PART 3: SCOPING AND RECONNAISSANCE SMB AND RDP EXPLOITATION
PLANNING AND SCOPING ENGAGEMENTS ATTACKING WINDOWS AND LINUX HOSTS
UNDERSTANDING RULES OF ENGAGEMENT NETWORK SERVICE ENUMERATION
DEFINING OBJECTIVES AND TARGETS DEFENSE EVASION IN NETWORKS
PASSIVE VS ACTIVE RECONNAISSANCE PART 7: WIRELESS, CLOUD, AND SPECIALIZED TARGETS
WHOIS AND DNS ENUMERATION WIRELESS ATTACK VECTORS AND TECHNIQUES
USING SEARCH ENGINES FOR INFO GATHERING WI-FI CRACKING AND WPA ATTACKS
SOCIAL MEDIA AND OPEN SOURCE INTELLIGENCE (OSINT) ROGUE ACCESS POINTS
NETWORK SCANNING AND MAPPING BLUETOOTH AND IOT VULNERABILITIES
SUBDOMAIN ENUMERATION TECHNIQUES ATTACKING SCADA AND ICS SYSTEMS
UNDERSTANDING RECON TOOLS (NMAP, MALTEGO, ETC.) CLOUD TECHNOLOGIES AND SECURITY
PART 4: VULNERABILITY ASSESSMENT EXPLOITING CLOUD CONFIGURATIONS
PERFORMING VULNERABILITY SCANNING CONTAINER AND KUBERNETES WEAKNESSES
MANUAL VS AUTOMATED SCANNING SAAS VULNERABILITIES
SCANNING WITH NESSUS AND OPENVAS MULTI-CLOUD SECURITY CHALLENGES
IDENTIFYING COMMON CVES PART 8: APPLICATION AND HOST-LEVEL ATTACKS
REDUCING FALSE POSITIVES APPLICATION-BASED ATTACK VECTORS
DISCOVERING MISCONFIGURATIONS OWASP TOP 10 OVERVIEW
VULNERABILITY SCANNING FOR WEB APPS SQL INJECTION AND XSS
INTERPRETING VULNERABILITY REPORTS CSRF AND BROKEN AUTHENTICATION
SERVER-SIDE REQUEST FORGERY (SSRF) COLLABORATION BETWEEN SOC AND OTHER IT TEAMS
API EXPLOITATION TECHNIQUES INTRODUCTION TO THREAT INTELLIGENCE
CLIENT-SIDE AND MOBILE APP ATTACKS SOC AND INCIDENT RESPONSE INTEGRATION
FILE UPLOAD VULNERABILITIES KEY METRICS AND KPIS IN SOCS
ATTACKING CMS PLATFORMS COMPLIANCE AND REGULATORY CONSIDERATIONS
CLOUD-BASED APPLICATION SECURITY TESTING PART 2: SOC TECHNOLOGIES AND ARCHITECTURE
PART 9: SOCIAL ENGINEERING AND PHYSICAL SECURITY OVERVIEW OF SOC TECHNOLOGIES
SOCIAL ENGINEERING FUNDAMENTALS SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
PHISHING AND SPEAR PHISHING CAMPAIGNS ENDPOINT DETECTION AND RESPONSE (EDR)
PRETEXTING AND IMPERSONATION THREAT INTELLIGENCE PLATFORMS (TIP)
USB AND DROP ATTACKS INTRUSION DETECTION AND PREVENTION SYSTEMS (IDS/IPS)
PHYSICAL PENETRATION TESTING USER AND ENTITY BEHAVIOR ANALYTICS (UEBA)
LOCK PICKING AND BADGE CLONING SOAR PLATFORMS
BYPASSING PHYSICAL SECURITY CONTROLS LOG MANAGEMENT SOLUTIONS
PSYCHOLOGICAL PRINCIPLES IN SOCIAL ENGINEERING NETWORK TRAFFIC ANALYSIS TOOLS
MITIGATING HUMAN WEAKNESS TOOL INTEGRATION STRATEGIES
DOCUMENTING SOCIAL ENGINEERING RESULTS PART 3: CAPABILITY ASSESSMENT AND MATURITY MODELS
PART 10: REPORTING AND FINAL PROJECTS ASSESSING SECURITY OPERATIONS CAPABILITIES
REPORTING AND COMMUNICATION ESSENTIALS SOC MATURITY MODELS AND BENCHMARKS
WRITING EFFECTIVE EXECUTIVE SUMMARIES IDENTIFYING GAPS IN PEOPLE, PROCESS, AND TECHNOLOGY
TECHNICAL DOCUMENTATION FOR STAKEHOLDERS PERFORMANCE INDICATORS FOR SOC HEALTH
PRESENTING RISK LEVELS AND RECOMMENDATIONS RED TEAM AND BLUE TEAM EXERCISES
BUILDING CUSTOM REPORTS CYBERSECURITY CAPABILITY MATURITY MODEL (C2M2)
REPORT WRITING BEST PRACTICES THREAT HUNTING CAPABILITIES
WRITING AND UNDERSTANDING EXPLOIT CODE USE CASE AND PLAYBOOK EFFECTIVENESS
SCRIPTING AUTOMATION FOR TESTING ASSESSING INCIDENT RESPONSE READINESS
FINAL PENETRATION TESTING PROJECT DESIGN CONDUCTING A SOC READINESS REVIEW
CONDUCTING A FULL END-TO-END PENETRATION TEST PART 4: STRATEGIC SOC PLANNING
SOC STRATEGY FUNDAMENTALS
CYBERSECURITY OPERATIONS CENTER ALIGNING SOC STRATEGY WITH BUSINESS GOALS
RISK-BASED SOC PRIORITIZATION
TITLE OF THE BOOK: MASTERING CYBERSECURITY OPERATIONS CENTER: RESOURCE PLANNING AND BUDGETING
STRATEGIES, TECHNOLOGIES, AND EXECUTION FOR EFFECTIVE SOC DEVELOPING A ROADMAP FOR SOC EVOLUTION
MANAGEMENT VENDOR AND TECHNOLOGY EVALUATION
PART 1: FOUNDATIONS OF CYBERSECURITY OPERATIONS EXTERNAL THREAT LANDSCAPE ASSESSMENT
INTRODUCTION TO SECURITY OPERATIONS AND THE SOC INTEGRATING THREAT INTELLIGENCE STRATEGICALLY
EVOLUTION AND IMPORTANCE OF SOCS STAKEHOLDER ENGAGEMENT
SOC MODELS: CENTRALIZED, DISTRIBUTED, VIRTUAL LONG-TERM SOC SUSTAINABILITY
KEY FUNCTIONS OF A SECURITY OPERATIONS CENTER PART 5: BUILDING THE SOC INFRASTRUCTURE
ROLES AND RESPONSIBILITIES IN A SOC THE SOC INFRASTRUCTURE ESSENTIALS
PHYSICAL AND VIRTUAL INFRASTRUCTURE DESIGN AUTOMATION AND HUMAN AUGMENTATION
NETWORK SEGMENTATION FOR SECURITY MONITORING EVALUATING TEAM PERFORMANCE
HIGH AVAILABILITY AND REDUNDANCY PART 9: OPERATIONAL READINESS AND INCIDENT HANDLING
DATA RETENTION AND STORAGE PLANNING PREPARING TO OPERATE THE SOC
SECURE COMMUNICATION AND ACCESS CONTROLS CREATING AND TESTING SOC RUNBOOKS
INFRASTRUCTURE AS CODE FOR SOC SETUP ESTABLISHING INCIDENT ESCALATION PATHS
CLOUD-BASED SOC DESIGN DAILY AND WEEKLY SOC ROUTINES
HYBRID SOC INFRASTRUCTURE REAL-TIME MONITORING PROCEDURES
SCALABILITY AND FLEXIBILITY PLANNING THREAT HUNTING TECHNIQUES
PART 6: EVENT COLLECTION AND MANAGEMENT ANALYZING INDICATORS OF COMPROMISE (IOCS)
SECURITY EVENT GENERATION AND COLLECTION EVIDENCE COLLECTION AND PRESERVATION
LOGGING BEST PRACTICES EVENT TRIAGE AND CATEGORIZATION
DATA NORMALIZATION AND CORRELATION CRISIS MANAGEMENT AND COMMUNICATION
COLLECTING EVENTS FROM CLOUD PLATFORMS PART 10: REVIEW, OPTIMIZATION, AND FUTURE GROWTH
COLLECTION FROM MOBILE AND REMOTE DEVICES REACTING TO EVENTS AND INCIDENTS
DNS, WEB, EMAIL, AND ENDPOINT LOGS ROOT CAUSE ANALYSIS AND LESSONS LEARNED
EVENT TAGGING AND CATEGORIZATION CONDUCTING POST-INCIDENT REVIEWS
LOG FORWARDING AND PARSING CONTINUOUS SOC PERFORMANCE REVIEW
MONITORING EXTERNAL DATA SOURCES METRICS-BASED SOC OPTIMIZATION
TUNING DATA COLLECTION SYSTEMS UPDATING USE CASES AND DETECTION LOGIC
PART 7: VULNERABILITY AND THREAT MANAGEMENT INTEGRATING NEW TECHNOLOGIES
VULNERABILITY MANAGEMENT PROCESS PLANNING FOR EMERGING THREATS
VULNERABILITY SCANNING AND ASSESSMENT KEEPING SOC DOCUMENTATION CURRENT
INTEGRATION WITH PATCH MANAGEMENT FUTURE TRENDS IN SOC OPERATIONS
PRIORITIZING VULNERABILITIES WITH CVSS
THREAT INTELLIGENCE AND VULNERABILITY CONTEXT FIREWALL MANAGEMENT
THREAT MODELING FOR SOC OPERATIONS
ZERO-DAY AND EMERGING THREAT TRACKING TITLE OF THE BOOK: FIREWALL MANAGEMENT: SECURING NETWORKS
COORDINATING WITH RED AND BLUE TEAMS THROUGH POLICY, CONFIGURATION, AND CONTROL
EXPOSURE REDUCTION TECHNIQUES PART 1: FOUNDATIONS OF CYBERSECURITY AND INFORMATION
DOCUMENTING AND COMMUNICATING RISKS PROTECTION
PART 8: PEOPLE AND PROCESSES IN THE SOC INTRODUCTION TO INFORMATION SECURITY
PEOPLE AND PROCESSES OVERVIEW THE CIA TRIAD: CONFIDENTIALITY, INTEGRITY, AVAILABILITY
ROLES: ANALYSTS, ENGINEERS, MANAGERS TYPES OF SECURITY THREATS AND ATTACKS
SKILLS AND TRAINING FOR SOC PERSONNEL PRINCIPLES OF DEFENSE IN DEPTH
ONBOARDING AND CONTINUOUS EDUCATION THE ROLE OF SECURITY IN NETWORK ARCHITECTURE
SOC PROCESS DOCUMENTATION UNDERSTANDING RISK IN CYBERSECURITY
INCIDENT RESPONSE WORKFLOW FUNDAMENTALS OF NETWORK SECURITY
SHIFT MANAGEMENT AND COVERAGE INTRODUCTION TO NETWORK SECURITY DEVICES
MANAGING ANALYST BURNOUT KEY CONCEPTS IN NETWORK MONITORING
IMPORTANCE OF SECURITY AWARENESS PACKET FILTERING STRENGTHS AND LIMITATIONS
PART 2: DESIGNING AND IMPLEMENTING SECURITY POLICIES RULE OPTIMIZATION TECHNIQUES
SECURITY POLICIES AND STANDARDS LOGGING PACKET FILTERING EVENTS
SECURITY FRAMEWORKS AND COMPLIANCE MODELS DETECTING ANOMALOUS PACKETS
DEVELOPING AN ORGANIZATION-WIDE SECURITY POLICY TROUBLESHOOTING PACKET FILTERING ISSUES
POLICY ENFORCEMENT STRATEGIES PART 6: FIREWALL SETUP AND MAINTENANCE
ACCEPTABLE USE AND INTERNET ACCESS POLICIES FIREWALL CONFIGURATION AND ADMINISTRATION
INCIDENT RESPONSE POLICIES INITIAL SETUP AND INTERFACE CONFIGURATION
POLICY REVIEW AND AUDIT PROCEDURES DEFINING SECURITY ZONES AND INTERFACES
ALIGNING POLICIES WITH BUSINESS OBJECTIVES CREATING AND TESTING RULE SETS
INDUSTRY REGULATIONS AND LEGAL REQUIREMENTS MANAGING NAT AND PORT FORWARDING
CASE STUDY: POLICY IMPLEMENTATION IN ENTERPRISES INTEGRATING FIREWALLS WITH IDS/IPS
PART 3: USER IDENTIFICATION AND ACCESS CONTROL HIGH AVAILABILITY AND REDUNDANCY
AUTHENTICATING USERS FIRMWARE AND PATCH MANAGEMENT
PASSWORD POLICIES AND MULTI-FACTOR AUTHENTICATION BACKUP AND RECOVERY STRATEGIES
ACCESS CONTROL MODELS: DAC, MAC, AND RBAC ROUTINE MAINTENANCE TASKS
DIRECTORY SERVICES AND AUTHENTICATION PROTOCOLS PART 7: ADVANCED APPLICATION-LAYER FIREWALLS
FEDERATED IDENTITY AND SSO WORKING WITH PROXY SERVERS AND APPLICATION-LEVEL FIREWALLS
ROLE-BASED ACCESS CONTROL IMPLEMENTATION HOW PROXY SERVERS FUNCTION
ACCESS CONTROL IN CLOUD ENVIRONMENTS BENEFITS OF APPLICATION-LEVEL INSPECTION
LOGGING AND AUDITING USER ACTIVITIES CONFIGURING WEB PROXIES
USER PROVISIONING AND DE-PROVISIONING PROXY FILTERING AND URL BLOCKING
PROTECTING AUTHENTICATION SYSTEMS MANAGING APPLICATION WHITELISTS
PART 4: FIREWALL FUNDAMENTALS AND NETWORK SEGMENTATION FIREWALL POLICIES FOR EMAIL AND FTP
INTRODUCTION TO FIREWALLS CONTROLLING APPLICATIONS IN BYOD ENVIRONMENTS
TYPES OF FIREWALLS: HARDWARE, SOFTWARE, CLOUD-BASED DEEP PACKET INSPECTION TECHNIQUES
NETWORK ZONES AND DMZS INTEGRATING PROXIES WITH CLOUD ACCESS SECURITY BROKERS
HOW FIREWALLS FIT INTO NETWORK ARCHITECTURE PART 8: BASTION HOSTS AND HARDENED PERIMETERS
STATEFUL VS. STATELESS FIREWALLS IMPLEMENTING THE BASTION HOST
FIREWALLS IN HOME VS. ENTERPRISE NETWORKS ROLE OF A BASTION HOST IN PERIMETER DEFENSE
EVOLUTION OF FIREWALL TECHNOLOGY HOST HARDENING TECHNIQUES
IDENTIFYING FIREWALL CAPABILITIES AND FEATURES OPERATING SYSTEM AND SERVICE CONFIGURATION
COMMON FIREWALL VENDORS AND SOLUTIONS USING BASTION HOSTS FOR REMOTE ACCESS
THE FUTURE OF FIREWALLS PLACEMENT OF BASTION HOSTS IN NETWORK ARCHITECTURE
PART 5: PACKET FILTERING AND TRAFFIC CONTROL MONITORING BASTION HOST ACTIVITY
PACKET FILTERING BASICS ATTACK VECTORS TARGETING BASTION HOSTS
UNDERSTANDING IP, TCP/UDP, AND ICMP HEADERS REAL-WORLD DEPLOYMENT SCENARIOS
CRAFTING ACCESS CONTROL LISTS (ACLS) AUDITING AND MAINTAINING BASTION HOSTS
INBOUND AND OUTBOUND RULES PART 9: ENCRYPTION AND CRYPTOGRAPHIC FOUNDATIONS
CONFIGURING RULES FOR COMMON PROTOCOLS ENCRYPTION – THE FOUNDATION FOR THE VIRTUAL PRIVATE NETWORK
TYPES OF ENCRYPTION: SYMMETRIC AND ASYMMETRIC CISCO THREAT INTELLIGENCE TOOLS
PUBLIC KEY INFRASTRUCTURE (PKI) BASICS CISCO SECURITY CERTIFICATIONS AND FRAMEWORKS
DIGITAL SIGNATURES AND CERTIFICATES CISCO SECUREX AND INTEGRATION FEATURES
SSL/TLS AND HTTPS CISCO STEALTHWATCH AND TRAFFIC ANALYSIS
CRYPTOGRAPHIC HASH FUNCTIONS CISCO SECURE ENDPOINT OVERVIEW
KEY EXCHANGE ALGORITHMS CISCO SECURITY POLICIES AND MANAGEMENT TOOLS
IMPLEMENTING ENCRYPTION IN NETWORKS CISCO NETWORK SECURITY USE CASES
SECURE EMAIL AND FILE ENCRYPTION PART 3: INTRUSION DETECTION FUNDAMENTALS
COMMON ENCRYPTION PROTOCOLS AND TOOLS INTRUSION DETECTION CONCEPTS
PART 10: DEPLOYING AND MANAGING VPNS IDS VS. IPS – KEY DIFFERENCES
SETTING UP A VIRTUAL PRIVATE NETWORK TYPES OF IDS: HOST-BASED VS. NETWORK-BASED
VPN TYPES: SITE-TO-SITE AND REMOTE ACCESS PASSIVE AND ACTIVE DETECTION MODES
VPN PROTOCOLS: IPSEC, L2TP, PPTP, OPENVPN DETECTION TECHNIQUES: SIGNATURE-BASED
CONFIGURING VPN GATEWAYS DETECTION TECHNIQUES: ANOMALY-BASED
AUTHENTICATION AND ENCRYPTION IN VPNS DETECTION TECHNIQUES: HEURISTIC AND BEHAVIORAL
SPLIT TUNNELING AND FULL TUNNELING IDS DEPLOYMENT CONSIDERATIONS
VPN PERFORMANCE OPTIMIZATION BENEFITS AND LIMITATIONS OF IDS
VPN USAGE POLICIES AND MONITORING IDS IN THE SECURITY LIFECYCLE
TROUBLESHOOTING VPN CONNECTIVITY PART 4: CISCO INTRUSION PROTECTION TECHNOLOGIES
FUTURE TRENDS IN SECURE REMOTE ACCESS CISCO INTRUSION PROTECTION
CISCO IPS DEVICE OVERVIEW
INTRUSION DETECTION SYSTEMS FUNCTIONAL COMPONENTS OF CISCO IPS
CISCO IPS DEPLOYMENT MODES
TITLE OF THE BOOK: INTRUSION DETECTION SYSTEMS: DESIGN, INLINE VS. PROMISCUOUS MODE
CONFIGURATION, AND ENTERPRISE SECURITY WITH CISCO TECHNOLOGIES CISCO IPS POLICY CONFIGURATION
PART 1: FOUNDATIONS OF NETWORK SECURITY EVENT ANALYSIS AND ALERTS
THE NEED FOR NETWORK SECURITY TUNING AND PERFORMANCE OPTIMIZATION
EVOLVING THREATS IN THE CYBERSECURITY LANDSCAPE INTEGRATION WITH CISCO SECUREX
KEY SECURITY PRINCIPLES: CONFIDENTIALITY, INTEGRITY, AVAILABILITY CASE STUDIES ON CISCO IPS DEPLOYMENT
UNDERSTANDING ATTACK VECTORS AND METHODS PART 5: NETWORK ARCHITECTURE AND TRAFFIC CAPTURE
SECURITY POLICIES AND CONTROLS CISCO IDS ARCHITECTURE
NETWORK INFRASTRUCTURE VULNERABILITIES COMPONENTS OF IDS SYSTEMS
LAYERED SECURITY APPROACHES SENSOR DEPLOYMENT AND TOPOLOGY
IMPORTANCE OF REAL-TIME MONITORING CAPTURING NETWORK TRAFFIC
OVERVIEW OF NETWORK DEFENSE MECHANISMS UNDERSTANDING SPAN, TAPS, AND MIRROR PORTS
INTRODUCTION TO INTRUSION DETECTION AND PREVENTION NETWORK FLOW ANALYSIS TECHNIQUES
PART 2: CISCO’S ROLE IN NETWORK SECURITY PACKET SNIFFERS AND TRAFFIC CAPTURE TOOLS
NETWORK SECURITY AND CISCO LOGGING AND LOG MANAGEMENT
CISCO SECURITY PORTFOLIO OVERVIEW REAL-TIME VS. BATCH TRAFFIC ANALYSIS
CISCO SECURE FIREWALL ESSENTIALS BEST PRACTICES IN TRAFFIC COLLECTION
PART 6: SENSOR AND MODULE DEPLOYMENT CENTRALIZED LOGGING AND REPORTING
CISCO IDS NETWORK SENSOR INSTALLATION MANAGING IDS ACROSS MULTIPLE LOCATIONS
PREREQUISITES FOR SENSOR SETUP ROLE-BASED ACCESS CONTROL FOR IDS TOOLS
SENSOR HARDWARE AND SOFTWARE REQUIREMENTS CONTINUOUS SECURITY IMPROVEMENT
PLANNING SENSOR PLACEMENT PART 10: THREAT RESPONSE AND FUTURE TRENDS
SENSOR ACTIVATION AND CONFIGURATION ENTERPRISE IDS MONITORING AND REPORTING
CISCO IDS MODULE CONFIGURATION DASHBOARDS AND REPORTING TOOLS
SECURITY POLICIES ON MODULES CISCO THREAT RESPONSE
UPDATING AND PATCHING IDS MODULES AUTOMATING THREAT RESPONSE
ADVANCED SENSOR FEATURES THREAT INTELLIGENCE INTEGRATION
SECURING THE SENSOR INTERFACE REAL-TIME THREAT HUNTING WITH CISCO
PART 7: EVENT MANAGEMENT AND SIGNATURE TUNING CISCO INTRUSION PROTECTION SYSTEM UPCOMING FUNCTIONALITY
CISCO IDS DEVICE MANAGER AND EVENT VIEWER EMERGING IDS TECHNOLOGIES AND AI
NAVIGATING THE IDS DEVICE MANAGER CLOUD-BASED IDS SOLUTIONS
UNDERSTANDING IDS ALERTS AND EVENTS THE FUTURE OF INTRUSION DETECTION SYSTEMS
FILTERING AND PRIORITIZING EVENTS
SENSOR CONFIGURATION COLLEGE READING AND WRITING
CREATING AND MANAGING SENSOR PROFILES
SIGNATURE CONFIGURATION TITLE OF THE BOOK: COLLEGE READING AND WRITING: FOUNDATIONS OF
SIGNATURE LIBRARIES AND UPDATES ACADEMIC LITERACY AND EXPRESSION
SIGNATURE TUNING FOR FALSE POSITIVES PART 1: FOUNDATIONS OF READING AND WRITING
AUTOMATED SIGNATURE RESPONSE MECHANISMS THE READING-WRITING CONNECTION
PART 8: ALARM HANDLING AND HOST SECURITY UNDERSTANDING THE READING PROCESS
CISCO IDS ALARMS AND SIGNATURES UNDERSTANDING THE WRITING PROCESS
ALARM CATEGORIES AND SEVERITY LEVELS THE INTERPLAY OF READING AND WRITING IN LEARNING
MANAGING EVENT CORRELATION DEVELOPING A READING-WRITING MINDSET
ALARM SUPPRESSION AND ESCALATION THE IMPORTANCE OF READING IN ACADEMIC SUCCESS
HOST INTRUSION PREVENTION WRITING AS A TOOL FOR LEARNING
DIFFERENCES BETWEEN HIPS AND NIPS TRANSITIONING FROM PASSIVE TO ACTIVE READING
HOST-BASED MONITORING TOOLS USING WRITING TO RESPOND TO READING
ENDPOINT BEHAVIOR ANALYTICS INTEGRATING READING AND WRITING FOR COMPREHENSION
ENDPOINT RESPONSE STRATEGIES PART 2: STRATEGIES FOR COMPREHENSION AND COMPOSITION
INTEGRATING HIPS WITH CISCO IDS USING READING STRATEGIES FOR UNDERSTANDING
PART 9: SYSTEM MAINTENANCE AND ENTERPRISE INTEGRATION PRE-READING AND PREVIEWING TECHNIQUES
CISCO IDS MAINTENANCE AND TROUBLESHOOTING ANNOTATING AND NOTE-TAKING
BACKUP AND RESTORE PROCEDURES WRITING STRATEGIES FOR DRAFTING AND REVISING
PERFORMANCE MONITORING READING FOR STRUCTURE AND PURPOSE
IDS HEALTH CHECKS AND LOGS WRITING WITH CLARITY AND INTENT
COMMON TROUBLESHOOTING TECHNIQUES SUMMARIZING AND PARAPHRASING TEXTS
ENTERPRISE IDS MANAGEMENT SYNTHESIZING MULTIPLE SOURCES
READING CRITICALLY AND WRITING ANALYTICALLY INTEGRATING QUOTES AND CITATIONS
APPLYING STRATEGIES TO ACADEMIC TEXTS AVOIDING PLAGIARISM
PART 3: BUILDING LANGUAGE AND THOUGHT SUMMARIZING RESEARCH FINDINGS
IMPROVING VOCABULARY THROUGH READING WRITING THE RESEARCH PAPER
VOCABULARY DEVELOPMENT STRATEGIES FORMATTING ACADEMIC PAPERS
USING CONTEXT CLUES EFFECTIVELY PRESENTING RESEARCH FINDINGS
BUILDING ACADEMIC WORD KNOWLEDGE PART 7: GRAMMAR AND SENTENCE CONSTRUCTION
DEVELOPING CRITICAL THINKING THROUGH READING SENTENCE BASICS AND PARTS OF SPEECH
APPLYING LOGIC AND REASONING IN WRITING UNDERSTANDING SENTENCE STRUCTURE
VISUAL LITERACY AND CRITICAL VIEWING SIMPLE SENTENCES AND THEIR USES
EVALUATING ARGUMENTS IN TEXTS COMPOUND SENTENCES AND COORDINATION
RESPONDING TO VISUAL AND TEXTUAL MESSAGES COMPLEX SENTENCES AND SUBORDINATION
MAKING CONNECTIONS ACROSS IDEAS SENTENCE VARIETY FOR STYLE
PART 4: CRAFTING MEANINGFUL WRITING AGREEMENT BETWEEN SUBJECT AND VERB
DEVELOPING IDEAS FOR WRITING PRONOUN-ANTECEDENT AGREEMENT
BRAINSTORMING AND PREWRITING TECHNIQUES COMMON SENTENCE PROBLEMS
FOCUSING AND NARROWING A TOPIC AVOIDING FRAGMENTS AND RUN-ONS
DEVELOPING A THESIS STATEMENT PART 8: GRAMMAR IN DEPTH
ORGANIZING WRITING FOR CLARITY UNDERSTANDING NOUNS AND THEIR ROLES
USING PARAGRAPHS EFFECTIVELY TYPES OF PRONOUNS AND THEIR FUNCTIONS
TRANSITIONS AND LOGICAL FLOW USING VERBS ACCURATELY AND EFFECTIVELY
STRUCTURING INTRODUCTIONS AND CONCLUSIONS VERB TENSE CONSISTENCY
WRITING WITH A CLEAR VOICE MODIFIERS: ADJECTIVES AND ADVERBS
ESTABLISHING TONE AND AUDIENCE AWARENESS PREPOSITIONS AND THEIR USES
PART 5: READING AND WRITING ACROSS TEXT TYPES CONJUNCTIONS AND SENTENCE FLOW
READING AND WRITING ESSAYS COORDINATING AND SUBORDINATING CONJUNCTIONS
UNDERSTANDING ESSAY STRUCTURE ARTICLES AND DETERMINERS
READING AND WRITING NARRATIVE TEXTS TROUBLESHOOTING COMMON GRAMMAR ERRORS
ELEMENTS OF NARRATIVE AND STORYTELLING PART 9: MECHANICS AND STYLE
READING AND WRITING EXPOSITORY TEXTS RULES OF CAPITALIZATION
EXPLAINING WITH CLARITY AND LOGIC UNDERSTANDING COMMA USAGE
READING AND WRITING ARGUMENTS COMMA SPLICES AND CORRECTIONS
CONSTRUCTING PERSUASIVE ARGUMENTS USING QUOTATION MARKS PROPERLY
EVALUATING SOURCES AND BIAS ITALICS AND EMPHASIS
REFUTING COUNTERARGUMENTS RESPECTFULLY OTHER PUNCTUATION MARKS
PART 6: RESEARCH AND EVIDENCE APOSTROPHES AND POSSESSION
CONDUCTING RESEARCH FOR ACADEMIC WRITING COLONS, SEMICOLONS, AND DASHES
UNDERSTANDING THE RESEARCH PROCESS EDITING FOR MECHANICS AND STYLE
FINDING AND EVALUATING SOURCES PROOFREADING STRATEGIES
NOTE-TAKING AND ORGANIZING RESEARCH PART 10: ADVANCED PRACTICE AND ANTHOLOGY
READING ACADEMIC AND LITERARY TEXTS PANANALINGHAGA SA PANITIKAN
ANALYZING AUTHOR’S PURPOSE AND STYLE PAGPAPAHAYAG GAMIT ANG SIMBOLO AT IMAHEN
WRITING LITERARY ANALYSES EPEKTO NG MATALINGHAGA SA DAMDAMIN NG MAMBABASA
WRITING REFLECTIVE AND RESPONSE ESSAYS PAGSULAT NG TULA AT SANAYSAY NA MATALINGHAGA
READING PROFESSIONAL ESSAYS AND COMMENTARIES RETORIKA SA MATALINGHAGANG PAGPAPAHAYAG
WRITING ABOUT CONTEMPORARY ISSUES PAGSASANAY SA PAGGAMIT NG TAYUTAY
INCORPORATING ANTHOLOGY READINGS INTO WRITING PAGSUSURI NG MGA TEKSTONG MATALINGHAGA
BUILDING INDEPENDENT READING HABITS PAGGAMIT NG TALINHAGA SA KOMUNIKASYON
FINAL WRITING PORTFOLIO PREPARATION BAHAGI 4: ORGANISASYON NG PASALITA AT PASULAT NA KOMPOSISYON
REVIEW AND REFLECTION ON COLLEGE READING AND WRITING KAHULUGAN NG ORGANISASYON NG IDEYA
PAGBUO NG BALANGKAS NG SULATIN
PAGPAPAHAYAG SA FILIPINO PANIMULA, KATAWAN, AT WAKAS
LOHIKA SA PAGPAPAHAYAG
PAMAGAT NG AKLAT: SINING NG PAGPAPAHAYAG SA FILIPINO: RETORIKA, KOHESYON AT KONEKSYON NG TALATA
KOMPOSISYON, AT DISKURSO PARA SA MAKABULUHANG KOMUNIKASYON TEKNIK SA PAG-OORGANISA NG TALUMPATI
BAHAGI 1: RETORIKA BILANG SINING NG MABISANG PAGPAPAHAYAG EPEKTIBONG PAGPAPAKILALA AT PAGTATAPOS
KAHULUGAN AT KAHALAGAHAN NG RETORIKA MGA URI NG PAGKAKASUNOD-SUNOD NG IDEYA
KASAYSAYAN NG RETORIKA SA DAIGDIG AT SA PILIPINAS PAGSASANAY SA PAGSULAT NG ORGANISADONG KOMPOSISYON
MGA ELEMENTO NG RETORIKA PAGSUSURI SA ORGANISASYON NG IBA’T IBANG TEKSTO
ETIKA AT PANANAGUTAN SA RETORIKA BAHAGI 5: PAGSULAT NG KOMPOSISYON
ESTILO AT TEKNIK SA MABISANG PAGPAPAHAYAG HAKBANG SA PAGSULAT
RETORIKANG PASALITA SA TALUMPATI AT DEBATE PAGPILI NG PAKSA
RETORIKANG PASULAT SA KOMPOSISYON LAYUNIN AT TONO SA PAGSULAT
RETORIKA SA MIDYA AT KOMUNIKASYONG DIGITAL PANANALIKSIK AT PAGKALAP NG DATOS
RETORIKA SA PANITIKAN PAGSASAMA NG OPINYON AT KATOTOHANAN
PAGSASANAY SA PAGSULAT GAMIT ANG RETORIKA PAGSULAT NG PAUNANG BURADOR
BAHAGI 2: ANG UGNAYAN NG GRAMATIKA AT RETORIKA PAGWAWASTO AT PAGREBISA
BATAYANG ESTRUKTURA NG WIKA PINAL NA PAGSUSULAT
TUNGKULIN NG GRAMATIKA SA PAGPAPAHAYAG PAGPAPASA AT PRESENTASYON NG SULATIN
SINTAKSIS AT SEMANTIKA SA KOMPOSISYON PAGPUNA SA SARILING AKDA
PAGKAKAUGNAY-UGNAY NG IDEYA BAHAGI 6: MGA KOMPOSISYONG PERSONAL
KOHESYONG GRAMATIKAL SANAYSAY NA PERSONAL
KOHESYONG LEKSIKAL LIHAM-PANGKAIBIGAN
ISPELING, BANTAS, AT MEKANIKS TALAARAWAN AT DYORNAL
KATUMPAKAN AT KAANGKUPAN NG WIKA LIHAM-MOTIBASYON AT APLIKASYON
PAGSASANAY SA PAGSULAT GAMIT ANG GRAMATIKA AT RETORIKA AUTOBIOGRAPIYA AT BIODATA
REBISYON GAMIT ANG GRAMATIKAL NA PANUNTUNAN TALAMBUHAY
BAHAGI 3: PAGPAPAHAYAG NG IDEA SA MATALINGHAGANG ESTILO LIHAM-PASASALAMAT
KAHULUGAN NG MATALINGHAGANG WIKA REFLEKSIYON SA PERSONAL NA KARANASAN
IDYOMA, TAYUTAY, AT SINING NG TALINHAGA KOMPOSISYONG PAMPAMILYA AT PANLIPUNAN
PRAKTIKAL NA KOMPOSISYON PARA SA PANG-ARAW-ARAW PAGLALAHAD NG KONSEPTO
BAHAGI 7: DISKURSO LAYUNIN NG ARGUMENTASYON
KAHULUGAN NG DISKURSO ELEMENTO NG LOHIKAL NA PANGANGATWIRAN
PASALITA AT PASULAT NA DISKURSO PAGBUO NG PAHAYAG NA MAY PANININDIGAN
PORMAL AT DI-PORMAL NA DISKURSO PAGHARAP SA TALIWAS NA PANANAW
INTERAKTIBONG DISKURSO PAGSULAT NG MATIBAY NA ARGUMENTATIBONG KOMPOSISYON
DISKURSO SA AKADEMIKONG KONTEKSTO
DISKURSO SA MASS MEDIA ART APPRECIATION
DISKURSO SA LIPUNAN
DISKURSO SA TEKNOLOHIYA TITLE OF THE BOOK: ART APPRECIATION: A JOURNEY THROUGH VISUAL
DISKURSO SA POLITIKA EXPRESSION AND HUMAN CREATIVITY
KRITIKAL NA PAGSUSURI SA IBA’T IBANG URI NG DISKURSO PART 1: FOUNDATIONS OF ART AND VISUAL ELEMENTS
BAHAGI 8: PAGLALARAWAN / DESKRIPTIBO UNDERSTANDING ART AND ITS PURPOSE
LAYUNIN NG PAGLALARAWAN THE ROLE OF THE ARTIST IN SOCIETY
TEKNIK SA PAGLALARAWAN THE CREATIVE PROCESS IN ART
PAGGAMIT NG SENSORY DETAILS THE AUDIENCE AND THEIR INTERPRETATION
DESKRIPSYONG OBHEKTIBO AT SUBHEKTIBO THE EVOLUTION OF ARTISTIC STYLES
PAGLALARAWAN SA TAO LINE AS THE FOUNDATION OF FORM
PAGLALARAWAN SA LUGAR EXPLORING SHAPE IN ARTISTIC EXPRESSION
PAGLALARAWAN SA BAGAY VISUAL PERCEPTION AND ARTISTIC ILLUSION
PAGLALARAWAN SA PANGYAYARI THE LANGUAGE OF ART: SYMBOLS AND MEANING
PAGLALARAWAN SA DAMDAMIN THE RELATIONSHIP BETWEEN ART AND CULTURE
PAGSASANAY SA PAGLALARAWAN PART 2: ELEMENTS OF DESIGN AND COMPOSITION
BAHAGI 9: PAGSASALAYSAY / NARATIBO THE SCIENCE AND PSYCHOLOGY OF LIGHT
LAYUNIN NG PAGSASALAYSAY UNDERSTANDING COLOR THEORY
ELEMENTO NG NARATIBO THE EMOTIONAL IMPACT OF COLOR
BANGHAY, TAUHAN, TAGPUAN TECHNIQUES IN USING COLOR
PANANAW AT PANAUHAN TEXTURE: REAL AND IMPLIED
TEKNIK SA PAGSASALAYSAY PATTERN AND REPETITION IN DESIGN
NARATIBONG PERSONAL TIME AND MOTION IN VISUAL ART
NARATIBONG MAKABAYAN CREATING THE ILLUSION OF SPACE
NARATIBONG PANGKASAYSAYAN PERSPECTIVE TECHNIQUES
NARATIBONG PANGKAISIPAN DYNAMIC MOVEMENT IN COMPOSITION
PAGSULAT NG MABISANG NARATIBO PART 3: PRINCIPLES AND PROCESSES IN ART
BAHAGI 10: PAGLALAHAD / EKSPOSITORI AT PANGANGATWIRAN / THE PRINCIPLES OF DESIGN
ARGUMENTATIBO BALANCE AND HARMONY IN ART
LAYUNIN NG EKSPOSITORI RHYTHM AND UNITY IN COMPOSITION
TEKNIK NG PAGLALAHAD EMPHASIS AND FOCAL POINT
PAGGAMIT NG HALIMBAWA AT PAGPAPALIWANAG SCALE AND PROPORTION
PAGLALAHAD NG PROSESO VARIETY AND CONTRAST IN ART
DRAWING: MATERIALS AND TECHNIQUES WEAVING, TEXTILES, AND FIBER ARTS
DRY MEDIA IN DRAWING METALWORK, GLASS, AND JEWELRY DESIGN
WET MEDIA IN DRAWING ARCHITECTURE: BASIC CONCEPTS AND FORMS
EXPERIMENTAL DRAWING APPROACHES STYLES AND PERIODS IN ARCHITECTURE
PART 4: PAINTING AND PRINTMAKING TECHNIQUES SACRED AND MONUMENTAL STRUCTURES
HISTORY OF PAINTING ACROSS CULTURES URBAN DESIGN AND PUBLIC SPACE
MEDIUMS AND SURFACES IN PAINTING INNOVATIONS IN MODERN ARCHITECTURE
OIL, ACRYLIC, AND WATERCOLOR TECHNIQUES ARCHITECTURE AS CULTURAL IDENTITY
EXPLORING ABSTRACT AND REALISTIC PAINTING PART 8: HISTORICAL PERSPECTIVES IN ART
PRINTMAKING PROCESSES: RELIEF AND INTAGLIO PREHISTORIC ART AND THE FIRST ARTISTS
LITHOGRAPHY AND SCREEN PRINTING ART OF THE ANCIENT NEAR EAST
MONOTYPE AND CONTEMPORARY PRINTS EGYPTIAN ART AND THE AFTERLIFE
COMBINING PRINTMAKING AND MIXED MEDIA ART OF ANCIENT INDIA, CHINA, AND JAPAN
THE ARTIST’S PRINT STUDIO GREEK IDEALS OF BEAUTY AND BALANCE
THE PRINT AS A REPRODUCIBLE ART FORM ROMAN REALISM AND MONUMENTALITY
PART 5: PHOTOGRAPHY, FILM, AND DIGITAL ARTS ART OF EARLY CHRISTIANITY
PHOTOGRAPHY AS FINE ART BYZANTINE AND ISLAMIC INFLUENCES
THE EVOLUTION OF FILM AS ART ROMANESQUE AND GOTHIC CATHEDRALS
VIDEO ART AND INSTALLATION THE ARTISTIC VISION OF THE MIDDLE AGES
DIGITAL ART: TOOLS AND INNOVATIONS PART 9: FROM THE RENAISSANCE TO THE TWENTIETH CENTURY
THE ROLE OF TECHNOLOGY IN CREATIVE EXPRESSION THE INNOVATIONS OF THE ITALIAN RENAISSANCE
EXPLORING IMAGING TECHNIQUES NORTHERN RENAISSANCE ART AND REALISM
ETHICAL CONSIDERATIONS IN DIGITAL ART BAROQUE DRAMA AND EMOTION
NEW MEDIA AND INTERACTIVE ART ROCOCO AND NEOCLASSICISM
THE ARTIST AS A DIGITAL CREATOR ROMANTICISM AND THE IMAGINATION
VISUAL STORYTELLING THROUGH IMAGING REALISM AND SOCIAL COMMENTARY
PART 6: ART IN THREE DIMENSIONS IMPRESSIONISM AND VISUAL PERCEPTION
SCULPTURE TECHNIQUES AND MATERIALS POST-IMPRESSIONISM AND SYMBOLISM
CARVING, MODELING, AND ASSEMBLING MODERN ART AND THE AVANT-GARDE
INSTALLATION ART AND ENVIRONMENTAL WORKS ART IN THE INDUSTRIAL AGE
THE ROLE OF THE VIEWER IN 3D ART PART 10: CONTEMPORARY ART AND GLOBAL PERSPECTIVES
SITE-SPECIFIC AND PUBLIC ART EARLY TWENTIETH-CENTURY ART MOVEMENTS
INDUSTRIAL AND PRODUCT DESIGN DADA, SURREALISM, AND ABSTRACT EXPRESSIONISM
FUNCTIONAL ART IN DAILY LIFE POP ART AND CONCEPTUAL ART
ART AND ARCHITECTURE INTERSECTIONS MINIMALISM AND PERFORMANCE ART
ART IN URBAN AND RURAL SETTINGS FEMINIST AND POSTCOLONIAL ART
SUSTAINABILITY AND DESIGN IN SCULPTURE ART SINCE 1945: THE GLOBAL SHIFT
PART 7: CRAFT AND ARCHITECTURAL FORMS NEW MATERIALS AND TECHNIQUES IN CONTEMPORARY ART
ART AS CRAFT AND CRAFT AS ART ART IN THE DIGITAL AND GLOBAL AGE
CERAMICS AND POTTERY TRADITIONS CONTEMPORARY FILIPINO AND SOUTHEAST ASIAN ART
THE FUTURE OF ART IN A CHANGING WORLD AGRICULTURAL SYSTEMS AND SUSTAINABILITY
SOIL FORMATION AND COMPOSITION
ENVIRONMENTAL SCIENCE CAUSES AND CONSEQUENCES OF SOIL DEGRADATION
ORGANIC AND INDUSTRIAL FARMING PRACTICES
TITLE OF THE BOOK: ENVIRONMENTAL SCIENCE: PRINCIPLES, PROBLEMS, GENETIC ENGINEERING AND FOOD PRODUCTION
AND PROSPECTS FOR A SUSTAINABLE FUTURE PEST MANAGEMENT STRATEGIES
PART 1: FOUNDATIONS OF ENVIRONMENTAL SCIENCE INTEGRATED PEST MANAGEMENT (IPM)
INTRODUCTION TO ENVIRONMENTAL SCIENCE AND SUSTAINABILITY IMPACT OF PESTICIDES ON ECOSYSTEMS
HUMAN IMPACT ON THE ENVIRONMENT SUSTAINABLE FOOD SYSTEMS
ENVIRONMENTAL WORLDVIEWS AND ETHICS SOIL CONSERVATION AND RESTORATION
SCIENTIFIC PRINCIPLES IN ENVIRONMENTAL STUDY PART 5: WATER AND MINERAL RESOURCES
SYSTEMS THINKING IN ENVIRONMENTAL SCIENCE THE HYDROLOGICAL CYCLE
MATTER AND ENERGY IN ECOSYSTEMS FRESHWATER RESOURCES AND USAGE
NATURAL CYCLES AND ENERGY FLOW WATER SCARCITY AND CONSERVATION
THE LAWS OF THERMODYNAMICS IN ECOLOGY GROUNDWATER AND SURFACE WATER CONTAMINATION
SCIENTIFIC METHODS AND ENVIRONMENTAL RESEARCH WATER TREATMENT AND POLLUTION CONTROL
TOOLS AND TECHNOLOGY FOR ENVIRONMENTAL ANALYSIS OCEAN RESOURCES AND MARINE CONSERVATION
PART 2: ECOSYSTEMS AND BIODIVERSITY GEOLOGY AND EARTH'S RESOURCES
STRUCTURE AND FUNCTION OF ECOSYSTEMS ROCK CYCLE AND PLATE TECTONICS
PHOTOSYNTHESIS AND NUTRIENT CYCLING MINERAL EXTRACTION AND ENVIRONMENTAL IMPACT
POPULATION ECOLOGY AND DYNAMICS MANAGING NONRENEWABLE MINERAL RESOURCES
BIODIVERSITY: IMPORTANCE AND THREATS PART 6: ENERGY AND SUSTAINABILITY
NATURAL SELECTION AND EVOLUTION OVERVIEW OF GLOBAL ENERGY USE
HABITAT FRAGMENTATION AND LOSS FOSSIL FUELS: COAL, OIL, AND NATURAL GAS
SPECIES INTERACTIONS AND ECOLOGICAL SUCCESSION ENVIRONMENTAL EFFECTS OF ENERGY EXTRACTION
PREDATION, PARASITISM, AND MUTUALISM NUCLEAR ENERGY: BENEFITS AND RISKS
POPULATION REGULATION AND CARRYING CAPACITY TRANSITION TO RENEWABLE ENERGY
KEYSTONE SPECIES AND ECOLOGICAL NICHES SOLAR AND WIND ENERGY TECHNOLOGIES
PART 3: BIOMES, CLIMATE, AND CONSERVATION GEOTHERMAL AND HYDROPOWER ENERGY
CLIMATE ZONES AND TERRESTRIAL BIOMES BIOMASS AND BIOFUELS
AQUATIC ECOSYSTEMS AND THEIR IMPORTANCE ENERGY EFFICIENCY AND CONSERVATION
CLIMATE AND WEATHER PATTERNS DESIGNING SUSTAINABLE ENERGY SYSTEMS
HUMAN-INDUCED CLIMATE CHANGE PART 7: HUMAN POPULATION AND URBANIZATION
ECOSYSTEM SERVICES AND BIODIVERSITY PRESERVATION GLOBAL POPULATION TRENDS AND IMPACTS
CONSERVATION BIOLOGY AND STRATEGIES POPULATION GROWTH AND RESOURCE USE
PROTECTED AREAS AND WILDLIFE CORRIDORS DEMOGRAPHIC TRANSITION MODEL
ENDANGERED SPECIES AND RECOVERY PROGRAMS URBAN DEVELOPMENT AND LAND USE
BIODIVERSITY HOTSPOTS SMART GROWTH AND URBAN PLANNING
INVASIVE SPECIES AND ECOSYSTEM DISRUPTION TRANSPORTATION AND INFRASTRUCTURE
PART 4: LAND, FOOD, AND SOIL MANAGEMENT URBAN ECOSYSTEMS AND GREEN SPACES
WASTE MANAGEMENT IN CITIES TITLE OF THE BOOK: LOGIC: FOUNDATIONS OF REASONING AND CRITICAL
CLIMATE ADAPTATION IN URBAN AREAS THINKING
SUSTAINABLE CITIES AND COMMUNITIES PART 1: INTRODUCTION TO LOGIC AND REASONING
PART 8: ENVIRONMENTAL HEALTH AND POLLUTION UNDERSTANDING LOGIC AND ITS RELEVANCE
ENVIRONMENTAL RISKS AND TOXICOLOGY BASIC CONCEPTS AND DEFINITIONS IN LOGIC
EXPOSURE TO CHEMICALS AND POLLUTANTS TRUTH, VALIDITY, AND SOUNDNESS
EMERGING DISEASES AND ENVIRONMENTAL FACTORS DEDUCTIVE VS. INDUCTIVE REASONING
AIR POLLUTION: SOURCES AND EFFECTS THE STRUCTURE OF ARGUMENTS
INDOOR AIR QUALITY LOGICAL SYMBOLS AND NOTATION
CLIMATE CHANGE: SCIENCE AND EVIDENCE INTRODUCTION TO CRITICAL THINKING
THE GREENHOUSE EFFECT AND GLOBAL WARMING LOGIC IN EVERYDAY LIFE
OZONE LAYER DEPLETION AND RECOVERY HISTORICAL DEVELOPMENT OF LOGIC
HUMAN HEALTH IMPACTS OF POLLUTION THE IMPORTANCE OF LOGICAL THINKING
POLLUTION PREVENTION AND CONTROL MEASURES PART 2: LANGUAGE, MEANING, AND CLARITY
PART 9: WASTE AND RESOURCE MANAGEMENT THE ROLE OF LANGUAGE IN LOGIC
TYPES OF SOLID AND HAZARDOUS WASTE DENOTATION AND CONNOTATION
WASTE DISPOSAL METHODS VAGUENESS AND AMBIGUITY
LANDFILLS, INCINERATION, AND RECYCLING DEFINITION TYPES AND USES
E-WASTE AND EMERGING WASTE STREAMS THE LOGIC OF MEANING
ZERO WASTE AND CIRCULAR ECONOMY PRINCIPLES EMOTIVE LANGUAGE AND PERSUASION
INDUSTRIAL WASTE AND POLLUTION PREVENTION SLANTING AND EUPHEMISMS
CLEANING UP CONTAMINATED SITES EVALUATING DEFINITIONS
LEGAL FRAMEWORKS FOR WASTE MANAGEMENT LEXICAL AND STIPULATIVE DEFINITIONS
LIFE CYCLE ASSESSMENT OF PRODUCTS CLARIFYING COMPLEX IDEAS
INNOVATIONS IN SUSTAINABLE PACKAGING PART 3: INFORMAL FALLACIES AND ARGUMENT FLAWS
PART 10: ENVIRONMENTAL POLICY AND GLOBAL ACTION INTRODUCTION TO INFORMAL FALLACIES
ENVIRONMENTAL ECONOMICS AND MARKET-BASED TOOLS FALLACIES OF RELEVANCE
VALUING ECOSYSTEM SERVICES FALLACIES OF AMBIGUITY
INTERNATIONAL ENVIRONMENTAL AGREEMENTS FALLACIES OF PRESUMPTION
GOVERNMENT AGENCIES AND ENVIRONMENTAL LAWS AD HOMINEM AND STRAW MAN FALLACIES
PUBLIC PARTICIPATION AND ENVIRONMENTAL ADVOCACY RED HERRING AND APPEAL TO IGNORANCE
ENVIRONMENTAL JUSTICE AND EQUITY SLIPPERY SLOPE AND FALSE DILEMMA
ENVIRONMENTAL EDUCATION AND COMMUNICATION HASTY GENERALIZATION AND WEAK ANALOGY
CORPORATE SUSTAINABILITY PRACTICES DETECTING FALLACIES IN DISCOURSE
GLOBAL ENVIRONMENTAL CHALLENGES STRENGTHENING ARGUMENTS
TOWARD A SUSTAINABLE AND RESILIENT FUTURE PART 4: CLASSICAL LOGIC AND CATEGORICAL THINKING
INTRODUCTION TO CATEGORICAL PROPOSITIONS
LOGIC THE FOUR STANDARD FORMS (A, E, I, O)
QUALITY, QUANTITY, AND DISTRIBUTION
VENN DIAGRAMS AND CATEGORICAL LOGIC
SQUARE OF OPPOSITION UNDERSTANDING CAUSALITY
IMMEDIATE INFERENCES NECESSARY AND SUFFICIENT CONDITIONS
INTRODUCTION TO CATEGORICAL SYLLOGISMS COMMON CAUSAL FALLACIES
RULES OF VALID CATEGORICAL SYLLOGISMS MILL’S METHODS: AGREEMENT AND DIFFERENCE
VENN DIAGRAM EVALUATION OF SYLLOGISMS JOINT METHOD AND RESIDUE
LOGICAL EQUIVALENTS IN CATEGORICAL FORM METHOD OF CONCOMITANT VARIATION
PART 5: PROPOSITIONAL LOGIC AND DEDUCTIVE SYSTEMS CAUSAL CHAINS AND COMPLEXITY
WHAT IS PROPOSITIONAL LOGIC? CAUSATION VS. CORRELATION
SIMPLE AND COMPOUND PROPOSITIONS DESIGNING LOGICAL EXPERIMENTS
LOGICAL CONNECTIVES (AND, OR, NOT) CAUSAL REASONING IN EVERYDAY LIFE
TRUTH TABLES AND LOGICAL EQUIVALENCE PART 9: PROBABILITY, STATISTICS, AND INDUCTIVE REASONING
TAUTOLOGIES AND CONTRADICTIONS INTRODUCTION TO PROBABILITY LOGIC
CONDITIONAL STATEMENTS BASIC PROBABILITY PRINCIPLES
RULES OF INFERENCE IN PROPOSITIONAL LOGIC PROBABILISTIC ARGUMENTS AND ANALYSIS
CONSTRUCTING LOGICAL PROOFS STATISTICAL RELEVANCE AND SIGNIFICANCE
COMMON DEDUCTION TECHNIQUES EVALUATING STATISTICAL DATA
NATURAL DEDUCTION: INTRODUCTION AND USE COMMON ERRORS IN STATISTICAL REASONING
PART 6: PREDICATE LOGIC AND QUANTIFICATION CORRELATION AND REGRESSION
INTRODUCTION TO PREDICATE LOGIC SAMPLING AND MARGIN OF ERROR
PREDICATES AND QUANTIFIERS RISK ASSESSMENT AND DECISION MAKING
SYMBOLIZING STATEMENTS IN PREDICATE LOGIC INDUCTIVE STRENGTH AND COGENCY
UNIVERSAL AND EXISTENTIAL STATEMENTS PART 10: SCIENTIFIC REASONING, SUPERSTITION, AND RATIONAL BELIEF
NEGATING QUANTIFIED STATEMENTS SCIENTIFIC METHOD AND HYPOTHESIS TESTING
LOGICAL TRANSLATION OF ARGUMENTS LOGIC IN SCIENTIFIC EXPLANATION
RULES OF INFERENCE FOR PREDICATE LOGIC THE ROLE OF OBSERVATION AND EXPERIMENTATION
QUANTIFIER LOGIC IN ARGUMENTS PSEUDOSCIENCE AND LOGICAL FALLACIES
LOGIC PUZZLES AND PROBLEM SOLVING SUPERSTITION AND THE LACK OF EVIDENCE
APPLICATIONS OF PREDICATE LOGIC SCIENTIFIC SKEPTICISM AND LOGIC
PART 7: ANALOGICAL, LEGAL, AND MORAL REASONING EVALUATING SCIENTIFIC THEORIES
THE NATURE OF ANALOGICAL REASONING SCIENTIFIC PROGRESS AND LOGICAL FOUNDATIONS
EVALUATING ANALOGIES FOR VALIDITY RATIONALITY, BELIEF, AND EVIDENCE
ANALOGIES IN LAW AND ETHICS LOGIC AS A TOOL FOR ENLIGHTENMENT
PRECEDENTS AND LEGAL ARGUMENTS
PRINCIPLES IN MORAL REASONING FIRST AID AND WATER SURVIVAL
RIGHTS AND DUTIES IN LOGIC
LOGICAL STRUCTURE OF MORAL JUDGMENTS TITLE OF THE BOOK: FIRST AID AND WATER SURVIVAL: LIFESAVING SKILLS
JUSTICE AND LOGICAL CONSISTENCY FOR EMERGENCIES AND THE OUTDOORS
MORAL DILEMMAS AND LOGICAL RESOLUTION PART 1: FOUNDATIONS OF FIRST AID AND SAFETY
STRENGTHENING ETHICAL ARGUMENTS INTRODUCTION TO FIRST AID AND EMERGENCY CARE
PART 8: CAUSAL REASONING AND SCIENTIFIC METHOD THE ROLE OF A FIRST RESPONDER
SAFETY ASSESSMENT AND SCENE MANAGEMENT EYE, NOSE, AND MOUTH INJURIES
ACTIVATING EMERGENCY MEDICAL SERVICES AMPUTATIONS AND SEVERE TRAUMA
LEGAL AND ETHICAL CONSIDERATIONS IN FIRST AID PART 5: ENVIRONMENTAL AND OUTDOOR EMERGENCIES
STANDARD PRECAUTIONS AND PERSONAL SAFETY FIRST AID FOR DROWNING VICTIMS
FIRST AID KIT ESSENTIALS COLD WEATHER INJURIES AND FROSTBITE
BASIC FIRST AID TERMINOLOGIES HEAT-RELATED ILLNESSES
COMMUNICATION DURING EMERGENCIES LIGHTNING STRIKES AND SAFETY
EMERGENCY ACTION PLANS EARTHQUAKE PREPAREDNESS AND RESPONSE
PART 2: CARDIOPULMONARY RESUSCITATION (CPR) AND BASIC LIFE WILDFIRE SAFETY AND SMOKE INHALATION
SUPPORT FLOOD SURVIVAL TACTICS
THE ABCS OF CPR AVALANCHE AND SNOW EMERGENCIES
HANDS-ONLY CPR FOR LAY RESPONDERS EMERGENCY PREPAREDNESS KITS
CPR FOR ADULTS PERSONAL SAFETY IN NATURAL DISASTERS
CPR FOR CHILDREN AND INFANTS PART 6: POISONS, BITES, AND STINGS
RESCUE BREATHING TECHNIQUES POISON CONTROL AND FIRST AID RESPONSE
USING AN AUTOMATED EXTERNAL DEFIBRILLATOR (AED) INGESTED POISONS AND TREATMENTS
CHOKING EMERGENCIES AND HEIMLICH MANEUVER INHALED AND INJECTED POISONS
RECOVERY POSITION AND MONITORING VICTIMS SNAKEBITE IDENTIFICATION AND TREATMENT
CPR PROTOCOLS FOR SPECIAL SITUATIONS INSECT AND SPIDER BITES
POST-CPR CARE AND CONSIDERATIONS MARINE ANIMAL STINGS AND INJURIES
PART 3: MANAGING MEDICAL EMERGENCIES ANIMAL BITES AND RABIES
RECOGNIZING MEDICAL EMERGENCIES ALLERGIC REACTIONS TO BITES AND STINGS
FIRST AID FOR HEART ATTACKS AVOIDING POISONOUS PLANTS
STROKE RECOGNITION AND RESPONSE PREVENTIVE MEASURES FOR OUTDOOR EXPOSURE
DIABETIC EMERGENCIES PART 7: WATER SAFETY AND SURVIVAL TECHNIQUES
ASTHMA AND RESPIRATORY DISTRESS INTRODUCTION TO WATER SAFETY
SEIZURES AND EPILEPSY PERSONAL FLOTATION DEVICES AND THEIR USE
ALLERGIC REACTIONS AND ANAPHYLAXIS BASIC SWIMMING SURVIVAL SKILLS
FAINTING AND SHOCK RESCUING DROWNING VICTIMS SAFELY
HEAT EXHAUSTION AND HEATSTROKE WATER ENTRY TECHNIQUES
HYPOTHERMIA AND COLD STRESS SURVIVAL FLOATING AND TREADING WATER
PART 4: INJURIES, WOUNDS, AND BLEEDING CONTROL EMERGENCY SIGNALS IN WATER
TYPES OF WOUNDS AND THEIR TREATMENT GROUP SURVIVAL IN WATER
BLEEDING CONTROL TECHNIQUES NAVIGATING CURRENTS AND TIDES
BANDAGING AND DRESSING WOUNDS SELF-RESCUE STRATEGIES
PUNCTURE WOUNDS AND IMPALED OBJECTS PART 8: ADVANCED OUTDOOR SURVIVAL SKILLS
SPRAINS AND STRAINS SHELTER BUILDING AND INSULATION
BONE FRACTURES AND IMMOBILIZATION FIRE STARTING WITHOUT MATCHES
HEAD AND SPINAL INJURIES FINDING AND PURIFYING WATER
BURNS AND SCALDS TREATMENT IDENTIFYING EDIBLE AND MEDICINAL PLANTS
SIGNALING FOR HELP IN REMOTE AREAS HISTORICAL DEVELOPMENT OF GOVERNANCE
ORIENTEERING AND COMPASS USE COLONIAL INFLUENCES ON PHILIPPINE POLITICS
SURVIVAL PRIORITIES AND DECISION-MAKING THE REPUBLICAN AND DEMOCRATIC IDEALS
WEATHER FORECASTING AND ADAPTATION SOVEREIGNTY AND GOVERNANCE
PACKING AN OUTDOOR EMERGENCY KIT PART 2: THE PHILIPPINE CONSTITUTION AND ITS FRAMEWORK
PSYCHOLOGICAL PREPAREDNESS AND MORALE CONCEPT OF CONSTITUTION
PART 9: DISASTER READINESS AND COMMUNITY RESPONSE HISTORICAL BACKGROUND OF PHILIPPINE CONSTITUTIONS
CREATING A HOME EMERGENCY PLAN THE 1935 CONSTITUTION
FAMILY EMERGENCY COMMUNICATION PLANS THE 1973 CONSTITUTION
WORKPLACE FIRST AID READINESS THE 1987 CONSTITUTION: AN OVERVIEW
COMMUNITY FIRST AID TRAINING PROGRAMS CORE PRINCIPLES OF CONSTITUTIONALISM
EMERGENCY DRILLS AND SIMULATIONS PREAMBLE AND ITS SIGNIFICANCE
PREPARING FOR MASS CASUALTY EVENTS INTRODUCTION TO CONSTITUTIONAL PROVISIONS
COLLABORATING WITH EMERGENCY RESPONDERS IMPORTANCE OF CONSTITUTIONAL REFORM
CRISIS INTERVENTION AND PSYCHOLOGICAL FIRST AID COMPARATIVE CONSTITUTIONAL SYSTEMS
VOLUNTEERISM AND RELIEF EFFORTS PART 3: NATIONAL TERRITORY, PRINCIPLES, AND POLICIES
BUILDING COMMUNITY RESILIENCE NATIONAL TERRITORY: SCOPE AND DEFINITION
PART 10: REVIEW, PRACTICE, AND LIFELONG LEARNING MARITIME AND ARCHIPELAGIC PRINCIPLES
REVIEWING CORE FIRST AID CONCEPTS DECLARATION OF PRINCIPLES AND STATE POLICIES
PRACTICING CPR AND AED SKILLS SOVEREIGNTY AND INDEPENDENCE
SIMULATED EMERGENCY SCENARIOS RULE OF LAW AND DUE PROCESS
EVALUATING AND UPDATING EMERGENCY SKILLS STATE OBLIGATIONS TO PROMOTE WELFARE
CERTIFICATIONS AND CONTINUING EDUCATION CIVIL-MILITARY RELATIONS
TEACHING FIRST AID TO OTHERS PEACE AND NATIONAL SECURITY
COMMON MISTAKES AND HOW TO AVOID THEM THE ROLE OF THE ARMED FORCES
STAYING INFORMED ON HEALTH AND SAFETY TRENDS FOREIGN POLICY PRINCIPLES
LIFELONG PREPAREDNESS MINDSET PART 4: RIGHTS, CITIZENSHIP, AND DEMOCRATIC PARTICIPATION
BECOMING A LIFESAVING LEADER IN YOUR COMMUNITY BILL OF RIGHTS: OVERVIEW
CIVIL AND POLITICAL RIGHTS
PHILIPPINE GOVERNMENT AND POLITICS SOCIAL AND ECONOMIC RIGHTS
PROTECTION AGAINST ABUSE OF POWER
TITLE OF THE BOOK: PHILIPPINE GOVERNMENT AND POLITICS: STRUCTURE, CITIZENSHIP: TYPES AND ACQUISITION
CONSTITUTION, AND DEMOCRATIC PRINCIPLES DUAL CITIZENSHIP AND NATURALIZATION
PART 1: FOUNDATIONS OF POLITICAL SCIENCE AND GOVERNMENT RESPONSIBILITIES OF FILIPINO CITIZENS
UNDERSTANDING THE STUDY OF POLITICAL SCIENCE SUFFRAGE: MEANING AND IMPORTANCE
KEY CONCEPTS: STATE AND GOVERNMENT ELECTORAL PROCESSES AND REFORMS
TYPES AND FORMS OF GOVERNMENT ROLE OF COMELEC IN ELECTIONS
PHILIPPINE POLITICAL SYSTEM OVERVIEW PART 5: STRUCTURE OF GOVERNMENT – THE LEGISLATIVE BRANCH
THE EVOLUTION OF PHILIPPINE GOVERNMENT LEGISLATIVE DEPARTMENT: OVERVIEW
GOVERNMENT OF THE PHILIPPINES IN TRANSITION COMPOSITION AND POWERS OF CONGRESS
SENATE: ROLES AND RESPONSIBILITIES CIVIL SOCIETY AND ADVOCACY
HOUSE OF REPRESENTATIVES: FUNCTIONS PART 9: DEVELOPMENT, CULTURE, AND THE FAMILY
LAWMAKING PROCESS EDUCATION AS A CONSTITUTIONAL MANDATE
LEGISLATIVE COMMITTEES SCIENCE AND TECHNOLOGY IN NATIONAL GROWTH
LEGISLATIVE OVERSIGHT ARTS, CULTURE, AND HERITAGE
IMPEACHMENT PROCESS SPORTS DEVELOPMENT AND YOUTH PARTICIPATION
CHECKS AND BALANCES IN THE LEGISLATURE CULTURAL RIGHTS AND INDIGENOUS PEOPLES
RELATIONSHIP WITH OTHER BRANCHES PROTECTION OF THE FILIPINO FAMILY
PART 6: STRUCTURE OF GOVERNMENT – EXECUTIVE AND JUDICIARY ROLE OF THE FAMILY IN NATION BUILDING
EXECUTIVE DEPARTMENT: OVERVIEW MARRIAGE AND FAMILY LAW
POWERS AND FUNCTIONS OF THE PRESIDENT WOMEN AND CHILDREN’S RIGHTS
CABINET MEMBERS AND EXECUTIVE OFFICES PROMOTING NATIONAL IDENTITY
PRESIDENTIAL APPOINTMENTS AND VETO POWER PART 10: FINAL CONSTITUTIONAL PROVISIONS AND REFORMS
EMERGENCY POWERS AND MARTIAL LAW GENERAL PROVISIONS OF THE CONSTITUTION
VICE PRESIDENT AND THEIR ROLES CONSTITUTIONAL MANDATES ON PUBLIC SERVICE
JUDICIAL DEPARTMENT: OVERVIEW ARMED FORCES AND NATIONAL DEFENSE
THE SUPREME COURT AND LOWER COURTS TRANSITORY PROVISIONS EXPLAINED
JUDICIAL REVIEW AND INDEPENDENCE SIGNIFICANCE OF THE ORDINANCE
RULE OF LAW AND ACCESS TO JUSTICE PROCESSES OF CONSTITUTIONAL AMENDMENT
PART 7: CONSTITUTIONAL COMMISSIONS AND LOCAL GOVERNMENT REVISION AND THE PEOPLE’S INITIATIVE
CONSTITUTIONAL COMMISSIONS: DEFINITION CONSTITUTIONAL REFORM MOVEMENTS
CIVIL SERVICE COMMISSION CHALLENGES TO CONSTITUTIONAL IMPLEMENTATION
COMMISSION ON ELECTIONS THE FUTURE OF PHILIPPINE GOVERNMENT AND POLITICS
COMMISSION ON AUDIT
FUNCTIONS AND INDEPENDENCE OF COMMISSIONS INTRUSION PREVENTION SYSTEMS
LOCAL GOVERNMENT CODE OVERVIEW
POWERS OF LOCAL GOVERNMENT UNITS TITLE OF THE BOOK: INTRUSION PREVENTION SYSTEMS: CONCEPTS,
DECENTRALIZATION AND DEVOLUTION TECHNOLOGIES, AND DEPLOYMENT STRATEGIES
BARANGAY GOVERNANCE PART 1: FOUNDATIONS OF INTRUSION PREVENTION SYSTEMS
RELATIONSHIP BETWEEN NATIONAL AND LOCAL GOVERNMENTS INTRODUCTION TO INTRUSION PREVENTION SYSTEMS
PART 8: ACCOUNTABILITY, ECONOMY, AND HUMAN RIGHTS EVOLUTION FROM IDS TO IPS
ACCOUNTABILITY OF PUBLIC OFFICERS ROLE OF IPS IN MODERN CYBERSECURITY
OFFICE OF THE OMBUDSMAN COMPARISON BETWEEN PREVENTION AND DETECTION
ANTI-CORRUPTION MECHANISMS CORE FUNCTIONS OF INTRUSION PREVENTION
CODE OF CONDUCT AND ETHICAL STANDARDS IPS VS FIREWALLS AND ANTIVIRUS
NATIONAL ECONOMY AND PATRIMONY THE SECURITY LIFECYCLE AND IPS
ECONOMIC PLANNING AND DEVELOPMENT TYPES OF INTRUSIONS AND ATTACKS PREVENTED
PUBLIC FINANCE AND TAXATION THREAT INTELLIGENCE AND IPS
SOCIAL JUSTICE IN GOVERNANCE IPS IN A LAYERED SECURITY APPROACH
HUMAN RIGHTS PROTECTION PART 2: SIGNATURES AND SECURITY RESPONSES
UNDERSTANDING SIGNATURES IN IPS ENDPOINT VISIBILITY AND CONTROL
SIGNATURE-BASED VS ANOMALY-BASED DETECTION INTEGRATING HIPS WITH EDR SOLUTIONS
BEHAVIOR AND HEURISTIC SIGNATURES UPDATING AND MAINTAINING HIPS
TUNING SIGNATURES FOR PERFORMANCE PART 6: NETWORK-BASED INTRUSION PREVENTION SYSTEMS (NIPS)
WRITING CUSTOM IPS SIGNATURES INTRODUCTION TO NETWORK IPS
RESPONSE ACTIONS: ALLOW, DROP, ALERT ARCHITECTURAL MODELS OF NIPS
SEVERITY LEVELS AND ACTION MAPPING KEY NIPS COMPONENTS AND ROLES
SIGNATURE UPDATES AND MANAGEMENT INLINE VS PASSIVE DEPLOYMENT
FALSE POSITIVES AND TUNING TECHNIQUES HARDWARE VS VIRTUAL NIPS
SIGNATURE LIFECYCLE MANAGEMENT NIPS PERFORMANCE METRICS
PART 3: DAY-TO-DAY OPERATIONS AND MANAGEMENT DETECTING NETWORK THREATS
OPERATIONAL TASKS IN IPS MANAGEMENT SEGMENT-BASED DEPLOYMENT PLANNING
DAILY MONITORING AND ALERT REVIEW BYPASS AND FAILOVER MECHANISMS
LOG ANALYSIS AND EVENT CORRELATION LOAD BALANCING IN NIPS NETWORKS
IPS DASHBOARD INTERPRETATION PART 7: CISCO SECURITY AGENT AND HOST DEPLOYMENT
WEEKLY AND MONTHLY IPS REPORTS INTRODUCTION TO CISCO SECURITY AGENT (CSA)
POLICY CREATION AND CHANGE MANAGEMENT FEATURES AND CAPABILITIES OF CSA
RESPONDING TO IPS ALERTS PREPARING THE ENVIRONMENT FOR CSA
INCIDENT HANDLING INTEGRATION DEPLOYMENT BEST PRACTICES
IPS PERFORMANCE OPTIMIZATION ENDPOINT GROUPING AND POLICIES
AUDIT TRAILS AND COMPLIANCE APPLICATION BEHAVIOR CONTROL
PART 4: DEFENSE IN DEPTH AND IPS INTEGRATION SYSTEM HARDENING USING CSA
CONCEPT OF SECURITY IN DEPTH REPORTING AND ALERTS WITH CSA
LAYERED SECURITY ARCHITECTURE CSA TROUBLESHOOTING AND LOGS
IPS AND FIREWALLS INTEGRATION POLICY UPDATES AND MAINTENANCE
WORKING WITH SIEM PLATFORMS PART 8: DEPLOYING CISCO NETWORK IPS
INTEGRATION WITH THREAT HUNTING TOOLS CISCO NIPS OVERVIEW
COMPLEMENTING ENDPOINT SECURITY APPLIANCE-BASED VS INTEGRATED CISCO IPS
IPS IN THE ZERO TRUST MODEL CISCO IPS MANAGER EXPRESS
CLOUD-BASED SECURITY LAYERS INITIAL CONFIGURATION AND SETUP
STRATEGIC PLACEMENT OF IPS ACCESS CONTROL POLICIES
POLICY HARMONIZATION ACROSS LAYERS CISCO IPS EVENT VIEWER
PART 5: HOST-BASED INTRUSION PREVENTION SYSTEMS (HIPS) IPS AND ASA INTEGRATION
INTRODUCTION TO HOST INTRUSION PREVENTION REGULAR SIGNATURE AND FIRMWARE UPDATES
HOW HIPS WORKS ON ENDPOINTS MANAGING CISCO IPS FROM CLI AND GUI
CORE COMPONENTS OF HIPS TROUBLESHOOTING CISCO NIPS
ADVANTAGES OF HIPS OVER ANTIVIRUS PART 9: SCENARIOS AND REAL-WORLD APPLICATIONS
SYSTEM RESOURCE UTILIZATION ENTERPRISE NETWORK IPS DEPLOYMENT
USE CASES FOR HIPS IN ENTERPRISES DATACENTER IPS DEPLOYMENT
HIPS AND INSIDER THREATS REMOTE OFFICE AND BRANCH PROTECTION
CLOUD AND HYBRID IPS SCENARIOS THREATS TO CRITICAL INFRASTRUCTURE
VIRTUALIZED ENVIRONMENT DEPLOYMENT SUPPLY CHAIN AND THIRD-PARTY THREATS
CAMPUS NETWORK PROTECTION EMERGING TECHNOLOGIES AND NEW RISKS
THREAT ISOLATION USING IPS THREATS IN THE CLOUD AND HYBRID ENVIRONMENTS
DISTRIBUTED DEPLOYMENT ARCHITECTURE INDUSTRY-SPECIFIC THREAT ENVIRONMENTS
REDUNDANCY AND HIGH AVAILABILITY PART 3: APPLYING INTELLIGENCE TO SECURITY OPERATIONS
BUILDING RESILIENT IPS FRAMEWORKS INTEGRATING INTELLIGENCE INTO THE SOC
PART 10: FUTURE TRENDS AND EVOLVING THREATS INTELLIGENCE-DRIVEN INCIDENT RESPONSE
EVOLUTION OF THREATS IN CYBERSECURITY THREAT INTELLIGENCE AND THREAT HUNTING
ROLE OF MACHINE LEARNING IN IPS ENHANCING DETECTION AND RESPONSE CAPABILITIES
THREAT INTELLIGENCE AND PREDICTIVE PREVENTION INDICATORS OF COMPROMISE AND TACTICS, TECHNIQUES, AND
IPS IN THE IOT LANDSCAPE PROCEDURES
IPS FOR OPERATIONAL TECHNOLOGY (OT) THREAT INTELLIGENCE FEEDS AND PLATFORMS
AI-POWERED INTRUSION PREVENTION PRIORITIZING AND OPERATIONALIZING INTELLIGENCE
MOVING TOWARDS AUTONOMOUS SYSTEMS BUILDING INTELLIGENCE INTO SECURITY POLICIES
REGULATORY REQUIREMENTS AND IPS COLLABORATION WITH EXTERNAL ORGANIZATIONS
IPS IN A POST-QUANTUM WORLD LEGAL AND REGULATORY IMPLICATIONS OF INTELLIGENCE USE
PREPARING FOR THE NEXT GENERATION OF THREATS PART 4: COLLECTION METHODS AND TOOLS
INTELLIGENCE COLLECTION FUNDAMENTALS
CYBER THREAT INTELLIGENCE OPEN-SOURCE INTELLIGENCE (OSINT)
HUMAN INTELLIGENCE (HUMINT)
TITLE OF THE BOOK: CYBER THREAT INTELLIGENCE: STRATEGIES, TECHNICAL INTELLIGENCE (TECHINT)
TECHNIQUES, AND APPLICATIONS IN MODERN SECURITY OPERATIONS SOCIAL MEDIA INTELLIGENCE (SOCMINT)
PART 1: FOUNDATIONS OF CYBER THREAT INTELLIGENCE USE OF AUTOMATED COLLECTION TOOLS
UNDERSTANDING CYBER THREAT INTELLIGENCE WEB CRAWLERS AND DARK WEB INTELLIGENCE
THE ROLE OF INTELLIGENCE IN CYBERSECURITY SENSOR-BASED DATA COLLECTION
EVOLUTION OF THREAT INTELLIGENCE PRACTICES ETHICAL CONSTRAINTS IN INTELLIGENCE GATHERING
KEY CONCEPTS AND DEFINITIONS CENTRALIZING COLLECTED DATA
CATEGORIES OF THREAT INTELLIGENCE PART 5: INTELLIGENCE GENERATION AND ANALYSIS
STRATEGIC VS TACTICAL INTELLIGENCE FROM RAW DATA TO ACTIONABLE INTELLIGENCE
THREAT INTELLIGENCE LIFE CYCLE INTELLIGENCE CORRELATION AND CONTEXTUALIZATION
INTELLIGENCE REQUIREMENTS AND PLANNING LINK ANALYSIS AND VISUALIZATION
CHALLENGES IN MODERN CTI USE OF THREAT INTELLIGENCE PLATFORMS
ETHICS AND LEGAL CONSIDERATIONS IN CTI INTELLIGENCE REPORTING STRUCTURES
PART 2: NAVIGATING THE THREAT ENVIRONMENT ANALYTICAL MODELS AND FRAMEWORKS
DEFINING THE THREAT LANDSCAPE INTELLIGENCE VALIDATION AND CONFIDENCE LEVELS
STATE-SPONSORED THREAT ACTORS CREATING INTELLIGENCE BRIEFINGS
HACKTIVISTS AND IDEOLOGICALLY MOTIVATED THREATS COMMUNICATING THREAT INTELLIGENCE TO EXECUTIVES
CYBERCRIMINAL GROUPS AND MOTIVATIONS REDUCING ANALYST BIAS IN INTELLIGENCE PRODUCTION
INSIDER THREATS AND ORGANIZATIONAL RISKS PART 6: ATTRIBUTION AND THREAT ACTOR PROFILING
INTRODUCTION TO ATTRIBUTION IN CYBERSECURITY CASE STUDY: INSIDER THREATS EXPOSED
ATTRIBUTION TECHNIQUES AND CHALLENGES CASE STUDY: TARGETED APT CAMPAIGNS
INDICATORS FOR THREAT ACTOR IDENTIFICATION CASE STUDY: INTELLIGENCE IN ELECTION SECURITY
UNDERSTANDING ADVERSARY MOTIVATIONS PART 10: STRATEGIC PLANNING AND ORGANIZATIONAL INTEGRATION
BEHAVIORAL PROFILING OF THREAT GROUPS BUILDING A THREAT INTELLIGENCE PROGRAM
TRACKING THREAT ACTOR INFRASTRUCTURE ALIGNING CTI WITH BUSINESS OBJECTIVES
NATION-STATE ATTRIBUTION CASE EXAMPLES ESTABLISHING INTELLIGENCE REQUIREMENTS
LEGAL AND DIPLOMATIC IMPACTS OF ATTRIBUTION SELECTING THE RIGHT INTELLIGENCE TOOLS
ATTRIBUTION IN A COURT OF LAW BUDGETING AND RESOURCE ALLOCATION
FUTURE OF ATTRIBUTION TECHNOLOGY COLLABORATION WITH GOVERNMENT AND INDUSTRY
PART 7: PROFESSIONALISM AND INTELLIGENCE ETHICS MATURITY MODELS FOR THREAT INTELLIGENCE
THE ROLE OF THE INTELLIGENCE ANALYST METRICS FOR EVALUATING CTI EFFECTIVENESS
SKILLS AND QUALIFICATIONS FOR CTI PROFESSIONALS ADAPTING TO ORGANIZATIONAL CHANGE
INTELLIGENCE TRADECRAFT AND BEST PRACTICES FUTURE DIRECTIONS FOR CYBER THREAT INTELLIGENCE
BUILDING A CAREER IN CYBER THREAT INTELLIGENCE
ETHICS IN INTELLIGENCE COLLECTION CYBERSECURITY ARCHITECTURE
AVOIDING BIAS AND MISJUDGMENT
CONFIDENTIALITY AND INFORMATION HANDLING TITLE OF THE BOOK: CYBERSECURITY ARCHITECTURE: DESIGNING RESILIENT
WORKING IN MULTI-DISCIPLINARY TEAMS AND SCALABLE SECURITY SYSTEMS
INTELLIGENCE SHARING PROTOCOLS PART 1: FOUNDATIONS OF CYBERSECURITY ARCHITECTURE
STAYING CURRENT IN AN EVOLVING FIELD DEFINING CYBERSECURITY ARCHITECTURE
PART 8: FUTURE THREATS AND EVOLVING TECHNIQUES THE ROLE OF ARCHITECTURE IN MODERN CYBER DEFENSE
THE RISE OF AI-POWERED THREATS HISTORICAL EVOLUTION OF CYBERSECURITY MODELS
QUANTUM COMPUTING AND ENCRYPTION RISKS SECURITY BY DESIGN: CORE CONCEPTS
DEEPFAKES AND SYNTHETIC MEDIA IN CYBER THREATS UNDERSTANDING ARCHITECTURE LAYERS AND FRAMEWORKS
THREATS TO SPACE-BASED INFRASTRUCTURE STAKEHOLDERS AND ORGANIZATIONAL ROLES
AUTONOMOUS SYSTEMS AS ATTACK VECTORS ALIGNING ARCHITECTURE WITH BUSINESS GOALS
THREAT INTELLIGENCE IN THE INTERNET OF THINGS SECURITY ARCHITECTURE VS. SECURITY ENGINEERING
CLOUD-NATIVE THREAT ACTOR TECHNIQUES GOVERNANCE, RISK, AND COMPLIANCE IN ARCHITECTURE
GLOBAL CYBER WARFARE TRENDS INTRODUCTION TO ARCHITECTURE METHODOLOGIES (E.G., SABSA, TOGAF,
ANTICIPATING THREAT EVOLUTION ZACHMAN)
DEVELOPING FUTURE-READY CTI CAPABILITIES PART 2: THE CORE OF SOLUTION BUILDING
PART 9: REAL-WORLD APPLICATIONS AND CASE STUDIES MAPPING THE THREAT LANDSCAPE
CASE STUDY: SOLARWINDS SUPPLY CHAIN ATTACK IDENTIFYING SECURITY REQUIREMENTS
CASE STUDY: WANNACRY RANSOMWARE RISK MANAGEMENT FUNDAMENTALS
CASE STUDY: NOTPETYA AND HYBRID WARFARE SELECTING SECURITY CONTROLS BASED ON RISK
CASE STUDY: COLONIAL PIPELINE ATTACK IDENTITY, AUTHENTICATION, AND AUTHORIZATION
CASE STUDY: STUXNET AND INDUSTRIAL ESPIONAGE NETWORK SECURITY ARCHITECTURE ESSENTIALS
CASE STUDY: TWITTER SOCIAL ENGINEERING BREACH ENDPOINT SECURITY ARCHITECTURE
CASE STUDY: THREAT INTELLIGENCE SUPPORTING LAW ENFORCEMENT CLOUD AND HYBRID ARCHITECTURE CONSIDERATIONS
DEFINING SECURITY ZONES AND TRUST BOUNDARIES AUTHENTICATION AND AUTHORIZATION MODELS
THE ROLE OF ZERO TRUST IN MODERN ARCHITECTURE SECURE CODE REVIEW AND TESTING STRATEGIES
PART 3: SCOPE AND REQUIREMENTS FOR ARCHITECTURE DATA PROTECTION IN APPLICATION DESIGN
REQUIREMENTS GATHERING TECHNIQUES APPLICATION LAYER ENCRYPTION MODELS
IDENTIFYING REGULATORY AND COMPLIANCE DRIVERS INTEGRATION WITH CI/CD PIPELINES
ASSET IDENTIFICATION AND CLASSIFICATION MANAGING SECRETS AND CONFIGURATION
APPLICATION AND DATA FLOW MAPPING PART 7: APPLYING ARCHITECTURE MODELS
DEFINING SECURITY OBJECTIVES AND CONSTRAINTS APPLYING THE SABSA FRAMEWORK
BUSINESS CONTINUITY AND DISASTER RECOVERY REQUIREMENTS IMPLEMENTING TOGAF FOR SECURITY ARCHITECTURE
BUILDING USE CASES AND THREAT MODELS ZACHMAN FRAMEWORK USE CASES IN CYBERSECURITY
OPERATIONAL AND NON-FUNCTIONAL REQUIREMENTS LEVERAGING MITRE ATT&CK FOR THREAT MODELING
PERFORMANCE, SCALABILITY, AND USABILITY APPLYING ZERO TRUST ARCHITECTURE PRINCIPLES
CREATING THE ARCHITECTURE REQUIREMENTS DOCUMENT ARCHITECTURE FOR SECURE DATA CENTERS
PART 4: TOOLS AND TECHNIQUES FOR BUILDING SECURE INFRASTRUCTURE AS CODE (IAC) MODELS
SELECTING THE RIGHT SECURITY TOOLS SERVICE-ORIENTED AND EVENT-DRIVEN ARCHITECTURES
ENTERPRISE ARCHITECTURE TOOLS OVERVIEW RED TEAMING THE ARCHITECTURE DESIGN
ARCHITECTURE MODELING LANGUAGES (E.G., UML, ARCHIMATE) OPERATIONALIZING THE ARCHITECTURE IN THE REAL WORLD
THREAT MODELING FRAMEWORKS (E.G., STRIDE, PASTA) PART 8: FUTURE-PROOFING YOUR ARCHITECTURE
SECURITY ARCHITECTURE ASSESSMENT TOOLS ANTICIPATING FUTURE THREATS AND TRENDS
INTEGRATING DEVSECOPS IN ARCHITECTURE DESIGN BUILDING FOR FLEXIBILITY AND CHANGE
LEVERAGING AUTOMATION AND ORCHESTRATION SCALABLE IDENTITY AND ACCESS MODELS
OPEN-SOURCE TOOLS FOR ARCHITECTURE PLANNING PRIVACY AND ETHICS IN FUTURE ARCHITECTURES
EVALUATING VENDOR SOLUTIONS INTEGRATING AI AND ML SECURELY
DOCUMENTATION AND VERSION CONTROL PRACTICES SECURING QUANTUM-RESISTANT ARCHITECTURES
PART 5: DEVELOPING ENTERPRISE BLUEPRINTS MONITORING EMERGING TECHNOLOGIES AND RISKS
CREATING AN ENTERPRISE SECURITY BLUEPRINT SUSTAINABILITY IN SECURITY ARCHITECTURE
UNDERSTANDING ENTERPRISE CONTEXT AND SCOPE CONTINUOUS IMPROVEMENT WITH ARCHITECTURE REVIEWS
DESIGNING THE SECURITY OPERATING MODEL LONG-TERM MAINTENANCE STRATEGIES
FRAMEWORK ALIGNMENT: NIST, ISO/IEC, CIS CONTROLS PART 9: REAL-WORLD CASE STUDIES AND SCENARIOS
MAPPING BUSINESS CAPABILITIES TO SECURITY CONTROLS ARCHITECTURE FOR FINANCIAL INSTITUTIONS
NETWORK SEGMENTATION STRATEGY SECURITY ARCHITECTURE FOR HEALTHCARE SYSTEMS
CLOUD ADOPTION STRATEGY AND ARCHITECTURE CYBERSECURITY ARCHITECTURE IN E-COMMERCE
IDENTITY AND ACCESS MANAGEMENT IN THE ENTERPRISE BLUEPRINT FOR A GOVERNMENT AGENCY
ENTERPRISE ENCRYPTION AND KEY MANAGEMENT CRITICAL INFRASTRUCTURE PROTECTION MODELS
ENTERPRISE-LEVEL INCIDENT DETECTION AND RESPONSE DESIGNING FOR MULTINATIONAL ORGANIZATIONS
PART 6: DESIGNING APPLICATION BLUEPRINTS SMALL BUSINESS ARCHITECTURE FRAMEWORK
APPLICATION THREAT MODELING POST-INCIDENT ARCHITECTURE REDESIGN
SECURE SOFTWARE DEVELOPMENT LIFECYCLE (SDLC) CLOUD MIGRATION AND ARCHITECTURE REBUILD
MICROSERVICES AND CONTAINER SECURITY LESSONS LEARNED FROM REAL-WORLD BREACHES
API GATEWAY AND SECURITY ARCHITECTURE PART 10: INTEGRATION AND EXECUTION
INTEGRATING SECURITY ARCHITECTURE WITH ENTERPRISE ARCHITECTURE EVALUATING EXISTING TECHNOLOGIES AND TOOLS
BUILDING CROSS-FUNCTIONAL COLLABORATION IDENTIFYING SECURITY GAPS AND WEAKNESSES
COMMUNICATING ARCHITECTURE TO EXECUTIVES INTERVIEWING STAKEHOLDERS FOR INSIGHT
TRAINING SECURITY ARCHITECTS AND TEAMS MAPPING IAM SERVICES ACROSS THE ORGANIZATION
MEASURING ARCHITECTURE EFFECTIVENESS INVENTORY OF APPLICATIONS AND ACCESS METHODS
AUDITING AND ARCHITECTURE COMPLIANCE POLICY AND PROCEDURE EVALUATION
TRANSITIONING FROM LEGACY SYSTEMS DOCUMENTATION OF EXISTING ROLES AND ACCESS
ARCHITECTURE HANDOVER AND KNOWLEDGE TRANSFER PREPARING A CURRENT STATE REPORT
ARCHITECTURE GOVERNANCE AND REVIEW BOARDS PART 4: CHALLENGES, GAPS, AND OPPORTUNITIES
BRINGING IT ALL TOGETHER: THE FINAL ARCHITECTURE FRAMEWORK COMMON IAM CHALLENGES IN ENTERPRISES
FRAGMENTED SYSTEMS AND SILOED ACCESS
IDENTITY AND ACCESS MANAGEMENT LACK OF GOVERNANCE AND OVERSIGHT
COMPLEXITY IN ROLE DEFINITIONS
TITLE OF THE BOOK: IDENTITY AND ACCESS MANAGEMENT: STRATEGY, USER RESISTANCE AND CHANGE MANAGEMENT
IMPLEMENTATION, AND INNOVATION IN THE DIGITAL AGE LEGACY SYSTEMS AND INTEGRATION ISSUES
PART 1: BUSINESS FOUNDATIONS OF IAM COMPLIANCE VIOLATIONS AND AUDIT FAILURES
UNDERSTANDING BUSINESS REQUIREMENTS IN IDENTITY MANAGEMENT IAM IN MERGERS AND ACQUISITIONS
BUILDING THE BUSINESS CASE FOR IAM INITIATIVES OPPORTUNITY IDENTIFICATION IN IAM MODERNIZATION
ALIGNING IAM WITH BUSINESS OBJECTIVES AND COMPLIANCE BUILDING THE CASE FOR TRANSFORMATION
STAKEHOLDER IDENTIFICATION AND ENGAGEMENT PART 5: FUTURE STATE AND VISIONING
COST-BENEFIT ANALYSIS AND ROI ESTIMATION DEFINING THE FUTURE STATE ARCHITECTURE
RISK MANAGEMENT IN IAM PROJECTS DESIGNING SCALABLE IAM SOLUTIONS
GOVERNANCE AND EXECUTIVE SPONSORSHIP INCORPORATING AUTOMATION AND AI IN IAM
BUDGETING AND RESOURCE ALLOCATION ALIGNING IAM WITH CLOUD AND MOBILE STRATEGIES
BUSINESS DRIVERS BEHIND IDENTITY INITIATIVES INTEGRATION WITH ITSM AND SIEM PLATFORMS
COMMUNICATING IAM VALUE TO THE ENTERPRISE ENABLING BUSINESS AGILITY THROUGH IAM
PART 2: IAM FUNDAMENTALS AND FRAMEWORKS REDEFINING ROLES AND ACCESS GOVERNANCE
CORE CONCEPTS OF IDENTITY AND ACCESS MANAGEMENT DEVELOPING AN IDENTITY-CENTRIC SECURITY MODEL
THE IAM LIFECYCLE AND FUNCTIONAL DOMAINS IAM FOR REMOTE WORK AND HYBRID ENVIRONMENTS
KEY DEFINITIONS: IDENTITY, ACCESS, ROLES, ENTITLEMENTS ESTABLISHING SUCCESS METRICS FOR THE FUTURE STATE
GLOBAL IAM STANDARDS AND BEST PRACTICES PART 6: STRATEGIC ROADMAPPING
THE ROLE OF AUTHENTICATION, AUTHORIZATION, AND ACCOUNTABILITY CREATING A MULTI-PHASE IAM ROADMAP
IAM MODELS: RBAC, ABAC, PBAC PRIORITIZING IAM INITIATIVES
REGULATORY REQUIREMENTS IMPACTING IAM MILESTONES, DELIVERABLES, AND TIMELINES
IAM FRAMEWORKS: NIST, ISO/IEC 27001, CIS STAKEHOLDER ROLES IN ROADMAP EXECUTION
THE IMPORTANCE OF IDENTITY GOVERNANCE CHANGE MANAGEMENT AND COMMUNICATION STRATEGY
IDENTITY FEDERATION AND SSO FOUNDATIONS RISK MITIGATION PLANNING
PART 3: ASSESSING CURRENT CAPABILITIES BUILDING ORGANIZATIONAL READINESS
CONDUCTING A CURRENT STATE ANALYSIS LEVERAGING INDUSTRY TRENDS AND INNOVATIONS
IAM CAPABILITY MATURITY MODELS IAM PROJECT PORTFOLIO MANAGEMENT
ENSURING LONG-TERM SUSTAINABILITY DIGITAL IDENTITY IN A POST-PANDEMIC WORLD
PART 7: ACCESS INTELLIGENCE AND RISK-BASED IAM LEGAL AND ETHICAL CONSIDERATIONS IN IAM
RISK-BASED AUTHENTICATION APPROACHES CAREER PATHS IN IDENTITY MANAGEMENT
IDENTITY ANALYTICS AND INTELLIGENCE LESSONS LEARNED FROM IAM FAILURES AND SUCCESSES
BEHAVIORAL ANALYTICS FOR ACCESS DECISIONS THE FUTURE OF IDENTITY: TOWARD A SECURE DIGITAL SOCIETY
DYNAMIC AUTHORIZATION STRATEGIES
REAL-TIME THREAT DETECTION AND RESPONSE CLOUD SECURITY
ADAPTIVE IAM MODELS
INTEGRATING IAM WITH SECURITY OPERATIONS TITLE OF THE BOOK: CLOUD SECURITY: PRINCIPLES, ARCHITECTURE, AND
RISK SCORING FOR IDENTITIES AND ACCESS RISK MITIGATION IN THE DIGITAL ERA
MINIMIZING THE ATTACK SURFACE WITH IDENTITY DATA PART 1: FOUNDATIONS OF CLOUD COMPUTING
FUTURE THREAT MODELS AND IAM DEFENSE INTRODUCTION TO CLOUD COMPUTING
PART 8: CLOUD IAM AND MODERN ENABLEMENT THE EVOLUTION OF CLOUD TECHNOLOGIES
CLOUD IDENTITY MODELS AND PROVIDERS CLOUD SERVICE MODELS: IAAS, PAAS, SAAS
IAM IN SAAS, PAAS, AND IAAS ENVIRONMENTS DEPLOYMENT MODELS: PUBLIC, PRIVATE, HYBRID, COMMUNITY
CLOUD ACCESS SECURITY BROKER (CASB) ROLE BENEFITS AND LIMITATIONS OF CLOUD COMPUTING
IDENTITY FEDERATION AND SINGLE SIGN-ON (SSO) IN THE CLOUD KEY TERMINOLOGIES IN CLOUD ENVIRONMENTS
CLOUD-BASED IDENTITY PROVIDERS (AZURE AD, OKTA) THE SHARED RESPONSIBILITY MODEL
INTEGRATION WITH CLOUD-NATIVE APPLICATIONS SERVICE LEVEL AGREEMENTS AND CLOUD PROVIDERS
API SECURITY AND IDENTITY TOKENS CLOUD USE CASES IN MODERN BUSINESS
ZERO TRUST ARCHITECTURE AND IAM TRENDS SHAPING THE CLOUD INDUSTRY
MULTI-CLOUD IDENTITY MANAGEMENT STRATEGIES PART 2: UNDERSTANDING CLOUD ARCHITECTURE
ENABLING AGILITY WITH CLOUD IAM PLATFORMS COMPONENTS OF CLOUD ARCHITECTURE
PART 9: IMPLEMENTATION AND TECHNOLOGY SELECTION FRONTEND AND BACKEND INFRASTRUCTURE
IAM IMPLEMENTATION METHODOLOGIES CLOUD RESOURCE POOLING AND MULTI-TENANCY
ACCESS REQUEST WORKFLOW DESIGN VIRTUALIZATION AND CONTAINERIZATION
IDENTITY PROVISIONING AND DEPROVISIONING STORAGE SOLUTIONS IN THE CLOUD
ROLE ENGINEERING AND ROLE MINING NETWORKING IN CLOUD ENVIRONMENTS
PRIVILEGED ACCESS MANAGEMENT (PAM) INTEGRATION CLOUD ORCHESTRATION AND AUTOMATION
IDENTITY CERTIFICATION AND ACCESS REVIEWS API MANAGEMENT AND GATEWAY SECURITY
POLICY ENFORCEMENT POINTS AND DECISION POINTS IDENTITY AND DIRECTORY SERVICES IN THE CLOUD
SELECTING THE RIGHT IAM TOOLS AND VENDORS CASE STUDIES IN CLOUD ARCHITECTURE DESIGN
CASE STUDY: IAM IMPLEMENTATION LIFECYCLE PART 3: FUNDAMENTALS OF CLOUD SOFTWARE SECURITY
MANAGING TECHNICAL DEBT IN IAM PROJECTS SECURE SOFTWARE DEVELOPMENT LIFECYCLE IN THE CLOUD
PART 10: THE FUTURE OF IAM CLOUD APPLICATION SECURITY PRINCIPLES
INNOVATIONS SHAPING THE IAM LANDSCAPE SECURE APIS AND MICROSERVICES
IAM FOR IOT, AI, AND MACHINE IDENTITIES CLOUD-NATIVE SECURITY CONTROLS
DECENTRALIZED IDENTITY AND BLOCKCHAIN IAM VULNERABILITY MANAGEMENT IN CLOUD SOFTWARE
PRIVACY-ENHANCING TECHNOLOGIES AND IAM SECURE CONFIGURATION MANAGEMENT
IAM AS A SERVICE (IDAAS) MODELS CLOUD SECURITY POSTURE MANAGEMENT (CSPM)
CODE SCANNING AND SECURE DEPLOYMENT PIPELINES SECURITY CONSIDERATIONS DURING CLOUD IMPLEMENTATION
THIRD-PARTY SOFTWARE RISKS IN CLOUD ENVIRONMENTS POST-MIGRATION SECURITY EVALUATIONS
DEVSECOPS INTEGRATION FOR CLOUD APPLICATIONS CLOUD RESOURCE LIFECYCLE MANAGEMENT
PART 4: IDENTIFYING CLOUD RISK ISSUES DECOMMISSIONING AND DATA SANITIZATION
RISK ASSESSMENT IN CLOUD MIGRATION ENSURING SECURITY IN CLOUD BACKUP AND RESTORE
DATA EXPOSURE AND BREACH RISKS CHANGE MANAGEMENT IN CLOUD INFRASTRUCTURE
VENDOR LOCK-IN AND EXIT STRATEGIES POLICY ENFORCEMENT THROUGHOUT THE LIFECYCLE
LEGAL AND REGULATORY COMPLIANCE RISKS PART 8: STRATEGIC APPROACHES TO CLOUD SECURITY
INSIDER THREATS IN CLOUD ENVIRONMENTS BUILDING A CLOUD SECURITY STRATEGY
THREAT LANDSCAPE IN CLOUD PLATFORMS CLOUD SECURITY GOVERNANCE MODELS
CLOUD MISCONFIGURATION RISKS DEVELOPING A CLOUD RISK MANAGEMENT PLAN
DATA RESIDENCY AND JURISDICTIONAL CHALLENGES CLOUD SECURITY TRAINING AND AWARENESS
MULTI-TENANCY SECURITY CONCERNS CREATING INCIDENT RESPONSE PLAYBOOKS
EVALUATING RISK MANAGEMENT FRAMEWORKS BUSINESS ALIGNMENT WITH CLOUD SECURITY
PART 5: CLOUD SECURITY CHALLENGES AND REALITIES VENDOR AND THIRD-PARTY RISK MANAGEMENT
COMMON SECURITY THREATS IN THE CLOUD BUILDING SECURITY INTO PROCUREMENT PROCESSES
ATTACK VECTORS IN CLOUD PLATFORMS CLOUD SECURITY CERTIFICATION AND COMPLIANCE
INSIDER AND EXTERNAL ATTACKS CASE STUDIES IN SUCCESSFUL CLOUD SECURITY PROGRAMS
ENSURING DATA INTEGRITY AND AVAILABILITY PART 9: TOOLS AND TECHNOLOGIES FOR CLOUD SECURITY
BUSINESS CONTINUITY AND DISASTER RECOVERY SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
ENCRYPTION CHALLENGES IN THE CLOUD CLOUD ACCESS SECURITY BROKERS (CASB)
LOGGING AND MONITORING LIMITATIONS ENDPOINT DETECTION AND RESPONSE (EDR)
INCIDENT RESPONSE IN CLOUD SETTINGS WEB APPLICATION FIREWALLS (WAFS)
CHALLENGES WITH COMPLIANCE AUDITING ENCRYPTION AS A SERVICE (EAAS)
SECURITY METRICS AND KPIS FOR CLOUD ENVIRONMENTS IDENTITY AS A SERVICE (IDAAS)
PART 6: DESIGNING CLOUD SECURITY ARCHITECTURE CLOUD WORKLOAD PROTECTION PLATFORMS (CWPP)
CLOUD SECURITY FRAMEWORKS AND STANDARDS SECURITY ORCHESTRATION, AUTOMATION, AND RESPONSE (SOAR)
SECURE NETWORK ARCHITECTURE FOR CLOUD BEHAVIORAL ANALYTICS IN CLOUD SECURITY
ENCRYPTION MECHANISMS AND KEY MANAGEMENT AI AND ML IN CLOUD THREAT DETECTION
IDENTITY AND ACCESS MANAGEMENT (IAM) IN CLOUD PART 10: LOOKING AHEAD: THE FUTURE OF CLOUD SECURITY
FEDERATED IDENTITY AND SSO EVOLVING THREATS IN THE CLOUD LANDSCAPE
ZERO TRUST ARCHITECTURE IN THE CLOUD INNOVATIONS IN CLOUD SECURITY TECHNOLOGIES
SECURITY OPERATIONS CENTER (SOC) FOR CLOUD ENVIRONMENTS PREPARING FOR QUANTUM COMPUTING AND CLOUD SECURITY
CLOUD-NATIVE THREAT DETECTION SYSTEMS THE ROLE OF BLOCKCHAIN IN CLOUD SECURITY
BUILDING SECURE CI/CD PIPELINES REGULATORY TRENDS IMPACTING CLOUD ADOPTION
INTEGRATION OF CLOUD SECURITY TOOLS AND PLATFORMS CLOUD SECURITY SKILLS AND WORKFORCE DEVELOPMENT
PART 7: LIFECYCLE SECURITY IN THE CLOUD BUILDING RESILIENT CLOUD SYSTEMS
CLOUD ADOPTION LIFECYCLE OVERVIEW CYBERSECURITY INSURANCE FOR CLOUD PROVIDERS
SECURING CLOUD PLANNING AND ASSESSMENT COLLABORATION ACROSS INDUSTRY FOR CLOUD DEFENSE
SAFE CLOUD MIGRATION PRACTICES THE FUTURE OF TRUST IN A CLOUD-DRIVEN WORLD
AVOIDING BUFFER OVERFLOWS AND MEMORY CORRUPTION
APPLICATION SECURITY INPUT VALIDATION AND OUTPUT ENCODING
SECURE SESSION MANAGEMENT
TITLE OF THE BOOK: APPLICATION SECURITY: BUILDING RESILIENT AUTHENTICATION AND AUTHORIZATION BEST PRACTICES
SOFTWARE IN THE MODERN ERA MANAGING SECRETS AND CRYPTOGRAPHY
PART 1: INTRODUCTION TO APPLICATION SECURITY PREVENTING INJECTION ATTACKS
UNDERSTANDING SECURITY FUNDAMENTALS SECURE FILE HANDLING
THE ROLE OF APPLICATION SECURITY IN SOFTWARE DEVELOPMENT SECURE LOGGING AND ERROR HANDLING
KEY SECURITY PRINCIPLES: CONFIDENTIALITY, INTEGRITY, AVAILABILITY CODE REVIEWS FOR SECURITY
THREATS AND VULNERABILITIES IN THE MODERN LANDSCAPE PART 5: AVOIDING COMMON PITFALLS
THE EVOLUTION OF APPLICATION SECURITY SQL INJECTION AND ITS VARIANTS
CYBERSECURITY VS APPLICATION SECURITY CROSS-SITE SCRIPTING (XSS)
THE COST OF INSECURE APPLICATIONS CROSS-SITE REQUEST FORGERY (CSRF)
THE IMPORTANCE OF SECURITY IN THE SDLC INSECURE DESERIALIZATION
REGULATIONS AND COMPLIANCE IN APPSEC SECURITY MISCONFIGURATIONS
THE FUTURE OF APPLICATION SECURITY BROKEN ACCESS CONTROL
PART 2: DEFINING SECURITY REQUIREMENTS INSECURE APIS
IDENTIFYING SECURITY OBJECTIVES POOR SESSION MANAGEMENT
GATHERING SECURITY REQUIREMENTS FROM STAKEHOLDERS INSECURE STORAGE OF SENSITIVE DATA
PRIVACY CONSIDERATIONS IN REQUIREMENTS GATHERING IMPROPER ERROR MESSAGES AND INFORMATION DISCLOSURE
REGULATORY AND COMPLIANCE REQUIREMENTS PART 6: TESTING AND SECURE DEPLOYMENT
RISK ASSESSMENT AND THREAT MODELING STATIC APPLICATION SECURITY TESTING (SAST)
USE CASES AND ABUSE CASES DYNAMIC APPLICATION SECURITY TESTING (DAST)
CREATING SECURITY REQUIREMENT SPECIFICATIONS INTERACTIVE APPLICATION SECURITY TESTING (IAST)
SECURITY ACCEPTANCE CRITERIA SOFTWARE COMPOSITION ANALYSIS (SCA)
PRIORITIZING SECURITY REQUIREMENTS PENETRATION TESTING FOR APPLICATIONS
DOCUMENTING AND MANAGING REQUIREMENTS SECURITY TESTING IN DEVOPS (DEVSECOPS)
PART 3: DESIGNING SECURE APPLICATIONS SECURE CI/CD PIPELINES
PRINCIPLES OF SECURE DESIGN SECURE DEPLOYMENT STRATEGIES
SECURE ARCHITECTURE PATTERNS POST-DEPLOYMENT SECURITY CHECKS
DESIGNING FOR LEAST PRIVILEGE ONGOING VULNERABILITY SCANNING AND PATCH MANAGEMENT
DESIGNING FOR FAIL-SAFE DEFAULTS PART 7: BUILDING AN APPSEC PROGRAM
DEFENSE IN DEPTH AND LAYERED SECURITY INTRODUCTION TO AN APPSEC PROGRAM
MINIMIZING ATTACK SURFACE ESTABLISHING GOVERNANCE AND POLICY
SECURE DATA FLOW DESIGN APPSEC ROLES AND RESPONSIBILITIES
THREAT MODELING IN DESIGN INTEGRATING SECURITY INTO AGILE AND DEVOPS
SECURITY DESIGN REVIEWS TRAINING AND AWARENESS PROGRAMS
SECURE DESIGN CASE STUDIES SECURITY CHAMPIONS AND DEVELOPER ENABLEMENT
PART 4: WRITING SECURE CODE METRICS AND REPORTING IN APPSEC
SECURE CODING STANDARDS AND GUIDELINES MANAGING RISK IN THE APPLICATION PORTFOLIO
COMMUNICATING WITH STAKEHOLDERS PART 1: FOUNDATIONS OF SPEAKING
SCALING APPLICATION SECURITY IN THE ENTERPRISE UNDERSTANDING THE NATURE AND PURPOSE OF SPEAKING
PART 8: SECURING MODERN APPLICATIONS AND SYSTEMS THE ROLE OF LISTENING IN EFFECTIVE COMMUNICATION
SECURITY IN WEB APPLICATIONS ETHICS IN SPEECH COMMUNICATION
SECURITY IN MOBILE APPLICATIONS IDENTIFYING AND MANAGING SPEECH ANXIETY
CLOUD-NATIVE APPLICATION SECURITY THE COMMUNICATION PROCESS: SENDER, MESSAGE, RECEIVER, FEEDBACK
CONTAINER SECURITY AND KUBERNETES VERBAL AND NONVERBAL COMMUNICATION IN SPEAKING
API SECURITY AND MICROSERVICES BARRIERS TO EFFECTIVE COMMUNICATION
SECURING SERVERLESS ARCHITECTURES BUILDING SPEAKER CONFIDENCE AND PRESENCE
THIRD-PARTY COMPONENTS AND SUPPLY CHAIN RISK FUNDAMENTALS OF INTERPERSONAL AND PUBLIC SPEAKING
EDGE AND IOT APPLICATION SECURITY INTRODUCTION TO SPEECH COMMUNICATION AS A DISCIPLINE
INTEGRATING AI AND MACHINE LEARNING SECURELY PART 2: PLANNING AND PREPARATION
SECURITY IN BLOCKCHAIN-BASED APPLICATIONS THE IMPORTANCE OF PLANNING IN PUBLIC SPEAKING
PART 9: DEVELOPING SECURE HABITS IDENTIFYING PURPOSE: TO INFORM, PERSUADE, OR ENTERTAIN
SECURE CODING CULTURE SELECTING AND NARROWING A SPEECH TOPIC
THE ROLE OF CONTINUOUS EDUCATION UNDERSTANDING AUDIENCE EXPECTATIONS
SECURITY AS A DAILY PRACTICE CONDUCTING AUDIENCE ANALYSIS
PEER REVIEWS AND COLLABORATIVE SECURITY CONTEXTUAL CONSIDERATIONS IN SPEECH PREPARATION
STAYING UP TO DATE ON THREATS AND TRENDS TIME MANAGEMENT IN SPEECH PLANNING
USING SECURITY TOOLS EFFECTIVELY ETHICAL RESPONSIBILITIES IN PREPARATION
RESPONSIBLE DISCLOSURE AND BUG BOUNTY PROGRAMS INTEGRATING FEEDBACK INTO PREPARATION
JOINING DEVELOPER SECURITY COMMUNITIES USING PLANNING TOOLS AND TEMPLATES
MENTORING OTHERS IN APPLICATION SECURITY PART 3: RESEARCH AND CONTENT DEVELOPMENT
MEASURING AND IMPROVING PERSONAL SECURITY PRACTICES EFFECTIVE RESEARCH TECHNIQUES FOR SPEAKERS
PART 10: CONTINUOUS LEARNING AND MOVING FORWARD EVALUATING SOURCES FOR CREDIBILITY AND RELEVANCE
EMBRACING LIFELONG LEARNING IN APPSEC GATHERING EVIDENCE AND SUPPORTING MATERIALS
FOLLOWING SECURITY NEWS AND ALERTS USING STATISTICS, TESTIMONY, AND EXAMPLES
LEVERAGING ONLINE COURSES AND CERTIFICATIONS AVOIDING PLAGIARISM AND CITING SOURCES
PARTICIPATING IN CONFERENCES AND WORKSHOPS TRANSFORMING RESEARCH INTO CLEAR SPEECH POINTS
READING SECURITY RESEARCH AND WHITEPAPERS BUILDING ARGUMENTS AND DEVELOPING REASONING
CONTRIBUTING TO OPEN SOURCE SECURITY PROJECTS ALIGNING EVIDENCE WITH SPEECH OBJECTIVES
LEARNING FROM REAL-WORLD BREACHES USING VISUAL AND AUDIO EVIDENCE APPROPRIATELY
PLANNING CAREER GROWTH IN APPLICATION SECURITY REFINING CONTENT THROUGH PEER REVIEW
REFLECTING ON THE SECURITY JOURNEY PART 4: ORGANIZING AND STRUCTURING SPEECHES
FINAL THOUGHTS AND CALL TO ACTION STRUCTURING THE BODY OF A SPEECH
CRAFTING EFFECTIVE INTRODUCTIONS
SPEECH COMMUNICATION CREATING MEMORABLE CONCLUSIONS
USING SPEECH OUTLINES FOR CLARITY
TITLE OF THE BOOK: THE ART AND PRACTICE OF SPEECH COMMUNICATION: TYPES OF OUTLINES: WORKING, PREPARATION, AND SPEAKING
MASTERING THE SPOKEN WORD ACROSS CONTEXTS
UTILIZING CONNECTIVES: TRANSITIONS, SIGNPOSTS, AND INTERNAL READING THE ROOM AND AUDIENCE ADAPTATION
PREVIEWS ADDRESSING DIVERSE AUDIENCES
LOGICAL AND TOPICAL STRUCTURES RESPONDING TO QUESTIONS CONFIDENTLY
PROBLEM-SOLUTION AND CAUSE-EFFECT STRUCTURES MANAGING Q&A SESSIONS AND INTERRUPTIONS
NARRATIVE AND CHRONOLOGICAL STRUCTURES ADAPTING SPEECHES FOR ONLINE OR HYBRID SETTINGS
DEVELOPING FLOW AND COHERENCE EVALUATING SPEECH SITUATIONS AND ENVIRONMENTS
PART 5: STYLE AND LANGUAGE SPEAKING IN EDUCATIONAL SETTINGS
UNDERSTANDING LANGUAGE AND ITS IMPACT COMMUNICATION IN THE WORKPLACE
CHOOSING WORDS FOR CLARITY AND PRECISION SPEAKING AT CEREMONIAL OR SOCIAL EVENTS
USING FIGURATIVE LANGUAGE AND IMAGERY CIVIC AND POLITICAL SPEAKING OPPORTUNITIES
ADAPTING LANGUAGE TO THE AUDIENCE PART 9: SPECIALIZED CONTEXTS OF COMMUNICATION
CREATING A PERSONAL SPEAKING STYLE CLASSROOM PRESENTATIONS AND GROUP DISCUSSIONS
ENHANCING CLARITY THROUGH CONCISENESS LEADERSHIP AND PUBLIC SPEAKING
AVOIDING JARGON, SLANG, AND BIASED LANGUAGE TRAINING AND INSTRUCTIONAL SPEAKING
RHYTHM AND REPETITION IN LANGUAGE INTERVIEWING AND CAREER-RELATED COMMUNICATION
HUMOR, WIT, AND WORDPLAY IN STYLE CEREMONIAL SPEAKING: TOASTS, TRIBUTES, EULOGIES
REVISING AND REFINING LANGUAGE CHOICES DEBATES AND ARGUMENTATIVE SPEAKING
PART 6: ENGAGING THE AUDIENCE ADVOCACY AND SOCIAL ISSUE PRESENTATIONS
TECHNIQUES FOR GAINING ATTENTION MEDIA AND BROADCAST COMMUNICATION
SUSTAINING AUDIENCE INTEREST THROUGHOUT THE SPEECH CROSS-CULTURAL AND GLOBAL SPEECH COMMUNICATION
ESTABLISHING SPEAKER CREDIBILITY LEGAL AND JUDICIAL SPEAKING CONTEXTS
USING PERSONAL STORIES AND EXPERIENCES PART 10: MASTERY AND LIFELONG DEVELOPMENT
BUILDING COMMON GROUND WITH THE AUDIENCE ANALYZING FAMOUS SPEECHES FOR TECHNIQUE
EMOTIONAL AND LOGICAL APPEALS REFLECTING ON YOUR SPEECH GROWTH
UNDERSTANDING MOTIVATIONAL APPEALS SETTING LONG-TERM SPEAKING GOALS
CREATING IDENTIFICATION WITH THE AUDIENCE USING FEEDBACK FOR CONTINUOUS IMPROVEMENT
HANDLING AUDIENCE DISENGAGEMENT JOINING SPEAKING CLUBS AND ORGANIZATIONS
ADJUSTING SPEECH IN REAL-TIME LEVERAGING TECHNOLOGY FOR SPEECH PRACTICE
PART 7: DELIVERY AND PERFORMANCE BUILDING A PERSONAL BRAND THROUGH SPEECH
EXPLORING THE MODES OF DELIVERY TEACHING AND MENTORING OTHERS IN SPEECH
SPEAKING EXTEMPORANEOUSLY PREPARING FOR PUBLIC SPEAKING CAREERS
PRACTICING WITH PURPOSE AND FEEDBACK LIFELONG LEARNING IN SPEECH COMMUNICATION
USING VOCAL VARIETY AND EXPRESSIVENESS
MANAGING PITCH, RATE, AND VOLUME PHILIPPINE LITERATURE
AVOIDING FILLER WORDS AND VOCALIZED PAUSES
USING GESTURES EFFECTIVELY TITLE OF THE BOOK: VOICES OF THE ARCHIPELAGO: A JOURNEY THROUGH
FACIAL EXPRESSIONS AND EYE CONTACT PHILIPPINE LITERATURE
MOVEMENT AND POSTURE DURING DELIVERY PART 1: FOUNDATIONS OF PHILIPPINE LITERARY HERITAGE
INTEGRATING PRESENTATION AIDS SMOOTHLY AN INTRODUCTION TO THE STUDY OF PHILIPPINE LITERATURE
PART 8: ADAPTING TO CONTEXTS DEFINING LITERATURE AND ITS FUNCTIONS
ORAL TRADITION IN EARLY PHILIPPINE SOCIETY LITERARY PUBLICATIONS OF THE AMERICAN PERIOD
THEMES AND SYMBOLS IN INDIGENOUS LITERATURE PART 5: THE JAPANESE PERIOD (1941 – 1945)
FOLKTALES, MYTHS, AND LEGENDS OF THE PRECOLONIAL PERIOD WARTIME RESTRICTIONS AND CENSORSHIP
POETRY AND RITUAL IN PRE-SPANISH PHILIPPINES REVIVAL OF THE FILIPINO LANGUAGE IN LITERATURE
BAYBAYIN AND OTHER EARLY WRITING SYSTEMS THEMES OF STRUGGLE AND RESISTANCE
PHILIPPINE EPICS AND HEROIC NARRATIVES LITERATURE AS NATIONAL DEFENSE
LITERARY FORMS BEFORE COLONIZATION SHORT STORIES IN TAGALOG DURING OCCUPATION
CULTURAL INFLUENCES ON PRE-HISPANIC LITERATURE POETRY OF SUFFERING AND PATRIOTISM
PART 2: THE SPANISH PERIOD (1565 – 1898) THE ROLE OF UNDERGROUND LITERATURE
ARRIVAL OF THE SPANIARDS AND THE ROLE OF RELIGION LITERARY JOURNALISM DURING THE JAPANESE PERIOD
THE INFLUENCE OF SPANISH CULTURE ON LITERATURE SYMBOLISM AND ALLEGORY IN WARTIME PROSE
RELIGIOUS DRAMAS: SENAKULO AND MORIONES THE JAPANESE INFLUENCE ON LITERARY FORM
DOCTRINA CHRISTIANA AND EARLY RELIGIOUS TEXTS PART 6: THE REBIRTH OF FREEDOM (1946 – 1970)
PASYON AND OTHER DEVOTIONAL LITERATURE INDEPENDENCE AND LITERARY EXPRESSION
CORRIDO AND AWIT: NARRATIVE POETRY OF THE SPANISH PERIOD POST-WAR THEMES OF REBUILDING AND RECOVERY
LITERARY THEMES OF COLONIAL OBEDIENCE AND DEVOTION EMERGENCE OF NEW LITERARY VOICES
SPANISH LANGUAGE IN EARLY WRITINGS PHILIPPINE LITERATURE IN ENGLISH AND FILIPINO
SPANISH-FILIPINO LITERARY FIGURES LITERARY AWARDS AND RECOGNITION
THE ROLE OF THE CHURCH IN LITERARY PRODUCTION THE DEVELOPMENT OF MODERN POETRY
PART 3: THE PERIOD OF ENLIGHTENMENT (1872 – 1898) THEMATIC SHIFTS IN THE SHORT STORY
THE CAVITE MUTINY AND THE RISE OF NATIONALISM THEATER AND THE REEMERGENCE OF NATIONAL IDENTITY
PROPAGANDA MOVEMENT AND THE BIRTH OF REFORMIST LITERATURE THE INFLUENCE OF MASS MEDIA ON LITERATURE
LA SOLIDARIDAD AND ITS CONTRIBUTORS REGIONAL LITERATURE IN POST-WAR PHILIPPINES
DR. JOSE RIZAL: LIFE, WORKS, AND LEGACY PART 7: PERIOD OF ACTIVISM (1970 – 1972)
NOLI ME TANGERE: A LITERARY AND SOCIAL CRITIQUE SOCIO-POLITICAL UNREST AND REVOLUTIONARY THEMES
EL FILIBUSTERISMO: REVOLUTION THROUGH FICTION LITERATURE AS PROTEST AND SOCIAL COMMENTARY
MARCELO H. DEL PILAR AND SATIRICAL PROSE THE ROLE OF WRITERS IN SOCIAL MOVEMENTS
GRACIANO LOPEZ JAENA AND ORATORY POEMS AND SONGS OF DISSENT
ESSAYS, ARTICLES, AND EDITORIALS FOR REFORM THE NEW JOURNALISM IN THE PHILIPPINES
SEEDS OF REVOLUTION IN PHILIPPINE LITERATURE THEATER AS A TOOL FOR PROTEST
PART 4: THE AMERICAN REGIME (1898 – 1941) FICTION OF THE WORKING CLASS AND THE MARGINALIZED
THE SHIFT FROM SPANISH TO ENGLISH LITERARY ORGANIZATIONS AND COLLECTIVE ACTION
EDUCATION AND THE SPREAD OF AMERICAN INFLUENCE THE VOICE OF STUDENT MOVEMENTS
EARLY FILIPINO WRITERS IN ENGLISH UNDERGROUND LITERATURE OF THE MARTIAL LAW ERA
THE RISE OF THE SHORT STORY AND FREE VERSE PART 8: PERIOD OF THE NEW SOCIETY (1972 – 1980)
THEMES OF COLONIAL INFLUENCE AND MODERNIZATION MARTIAL LAW AND LITERARY CENSORSHIP
CARLOS P. ROMULO AND THE RISE OF JOURNALISM GOVERNMENT-SPONSORED CULTURAL CAMPAIGNS
PAZ MARQUEZ BENITEZ AND EARLY FICTION LITERATURE OF CONFORMITY AND RESISTANCE
LITERARY GUILDS AND CIRCLES IN THE 1920S THE KOMIKS PHENOMENON
POETRY AND NATIONAL IDENTITY IN ENGLISH NATIONAL ARTIST AWARDS AND CULTURAL RECOGNITION
SHIFT IN LITERARY THEMES DURING AUTHORITARIANISM MORAL DILEMMAS AND DECISION-MAKING
VISUAL AND PERFORMANCE LITERATURE THE RELEVANCE OF ETHICS IN A MODERN WORLD
THE ROLE OF THE PRESS IN CONTROLLED EXPRESSION ETHICS AND THE QUEST FOR A GOOD LIFE
REGIONAL WRITERS DURING THE NEW SOCIETY PART 2: RELIGION, CULTURE, AND MORAL DIVERSITY
REVIVAL OF FOLK AND ETHNIC LITERATURE RELIGION AND GLOBAL ETHICS
PART 9: PERIOD OF THE THIRD REPUBLIC AND BEYOND (1981 – 1999) ETHICS ACROSS MAJOR WORLD RELIGIONS
LITERATURE DURING POLITICAL TRANSITION THE INTERSECTION OF FAITH AND MORALITY
EDSA REVOLUTION AND LITERARY REFLECTION MORAL PLURALISM IN A GLOBALIZED WORLD
LITERATURE OF FREEDOM AND DEMOCRACY THE PROBLEM OF MORAL DISAGREEMENT
THE RISE OF FEMINIST VOICES IN LITERATURE CULTURAL NORMS AND ETHICAL BOUNDARIES
ENVIRONMENTAL THEMES IN PHILIPPINE WRITING RELIGION, LAW, AND MORAL AUTHORITY
MULTICULTURALISM AND INDIGENOUS LITERATURE RELIGIOUS EXTREMISM AND ETHICAL QUESTIONS
THE BOOM OF CAMPUS JOURNALISM DIALOGUE BETWEEN SECULAR AND RELIGIOUS ETHICS
LITERARY FESTIVALS AND WORKSHOPS ETHICAL THEORIES AND INTERFAITH UNDERSTANDING
REPRESENTATIVE COMPOSITIONS THROUGH THE YEARS PART 3: MORAL THEORIES AND PERSPECTIVES
LITERARY CONTRIBUTIONS FROM 1986–1999 ETHICAL RELATIVISM
PART 10: CONTEMPORARY PHILIPPINE LITERATURE CULTURAL RELATIVISM VS. UNIVERSAL ETHICS
LITERATURE IN THE 21ST CENTURY PSYCHOLOGICAL AND ETHICAL EGOISM
DIGITAL PLATFORMS AND THE MODERN READER EGOISM, ALTRUISM, AND THE SOCIAL CONTRACT
NEW GENRES AND LITERARY EXPERIMENTATION UTILITARIANISM: FOUNDATIONS AND APPLICATIONS
POPULAR LITERATURE AND MASS READERSHIP CRITIQUES OF UTILITARIAN THINKING
YOUTH AND SPOKEN WORD MOVEMENTS DEONTOLOGICAL ETHICS AND MORAL DUTY
FILIPINO DIASPORA AND GLOBAL LITERATURE KANTIAN ETHICS IN CONTEMPORARY SOCIETY
LGBTQ+ REPRESENTATION IN PHILIPPINE LITERATURE NATURAL LAW AND HUMAN RIGHTS
LITERATURE IN REGIONAL LANGUAGES TODAY NATURAL RIGHTS IN MODERN POLITICAL THOUGHT
GOVERNMENT SUPPORT AND LITERARY SUSTAINABILITY PART 4: VIRTUE AND CARE-BASED ETHICS
FUTURE DIRECTIONS OF PHILIPPINE LITERATURE VIRTUE ETHICS: ARISTOTLE TO THE PRESENT
DEVELOPING MORAL CHARACTER
ETHICS PRACTICAL WISDOM AND THE GOOD LIFE
FEMINIST THOUGHT AND THE ETHICS OF CARE
TITLE OF THE BOOK: FOUNDATIONS AND FRONTIERS OF ETHICS: EXPLORING JUSTICE, EMPATHY, AND MORAL RESPONSIBILITY
MORAL THOUGHT AND GLOBAL RESPONSIBILITY INTERPERSONAL ETHICS IN RELATIONSHIPS
PART 1: FOUNDATIONS OF ETHICAL THOUGHT CARE ETHICS IN SOCIAL WORK AND EDUCATION
INTRODUCTION TO ETHICS AND ETHICAL THEORY CRITICISMS OF TRADITIONAL MORAL THEORIES
DEFINING MORALITY AND ETHICS INTEGRATING VIRTUE AND CARE ETHICS
THE IMPORTANCE OF ETHICS IN DAILY LIFE NEW DIRECTIONS IN CHARACTER-BASED ETHICS
HISTORICAL ROOTS OF ETHICAL THINKING PART 5: MEDICAL AND BIOTECHNOLOGICAL ETHICS
METAETHICS VS. NORMATIVE ETHICS HEALTHCARE ETHICS
ETHICAL THEORIES IN GLOBAL PHILOSOPHICAL TRADITIONS THE ETHICS OF BIRTHING AND DYING
THE ROLE OF REASON AND EMOTION IN ETHICS PATIENTS' RIGHTS AND INFORMED CONSENT
ETHICAL ISSUES IN END-OF-LIFE CARE PART 9: ENVIRONMENTAL AND ANIMAL ETHICS
BIOTECHNOLOGY AND BIOENGINEERING ENVIRONMENTAL ETHICS
CLONING AND GENETIC MODIFICATION THE ETHICS OF CLIMATE CHANGE
ARTIFICIAL INTELLIGENCE IN MEDICINE CONSERVATION AND SUSTAINABILITY
THE ETHICS OF VACCINE DISTRIBUTION INDIGENOUS KNOWLEDGE AND LAND ETHICS
ACCESS TO HEALTHCARE AS A MORAL ISSUE ENVIRONMENTAL JUSTICE AND MARGINALIZED COMMUNITIES
PUBLIC HEALTH AND ETHICAL RESPONSIBILITY ANIMAL ETHICS—AND BEYOND
PART 6: JUSTICE AND HUMAN RIGHTS ANIMAL RIGHTS AND HUMAN OBLIGATIONS
EQUALITY AND DISCRIMINATION ETHICAL FARMING AND FOOD CHOICES
THE ETHICS OF RACE AND IDENTITY WILDLIFE CONSERVATION AND ECOSYSTEM ETHICS
DISABILITY AND INCLUSION FUTURE GENERATIONS AND INTERGENERATIONAL RESPONSIBILITY
ECONOMIC JUSTICE AND DISTRIBUTION PART 10: CONTEMPORARY CHALLENGES AND THE FUTURE OF ETHICS
GLOBAL POVERTY AND MORAL OBLIGATION ETHICS IN THE DIGITAL AGE
LABOR RIGHTS AND FAIR WAGES SOCIAL MEDIA AND MORAL DISCOURSE
SEXUAL MORALITY AND GENDER JUSTICE CORPORATE RESPONSIBILITY AND BUSINESS ETHICS
LGBTQ+ RIGHTS AND ETHICAL RECOGNITION ETHICAL LEADERSHIP IN GLOBAL CRISES
SOCIAL MOVEMENTS AND MORAL CHANGE CONSUMERISM AND MORAL MINIMALISM
TECHNOLOGY AND THE DIGITAL DIVIDE ARTIFICIAL INTELLIGENCE AND ETHICAL DESIGN
PART 7: POLITICAL AND LEGAL ETHICS GLOBAL CITIZENSHIP AND MORAL EDUCATION
GLOBAL JUSTICE AND DEVELOPMENT ETHICS THE ROLE OF PHILOSOPHY IN PUBLIC ETHICS
POLITICAL CORRUPTION AND INTEGRITY CONTINUOUS ETHICAL REFLECTION AND PRACTICE
ETHICS OF PUBLIC SERVICE AND LEADERSHIP CLOSING REFLECTIONS: ETHICS FOR A SHARED FUTURE
PUNISHMENT AND THE DEATH PENALTY
ETHICS OF POLICING AND SURVEILLANCE MARKSMANSHIP AND COMBAT SHOOTING
THE ROLE OF LAW IN ETHICAL GOVERNANCE
HUMAN RIGHTS AND INTERNATIONAL LAW TITLE OF THE BOOK: MASTERY UNDER FIRE: THE ART AND SCIENCE OF
REFUGEES, BORDERS, AND MORAL RESPONSIBILITY MARKSMANSHIP AND COMBAT SHOOTING
CIVIL DISOBEDIENCE AND ETHICAL PROTEST PART 1: FOUNDATIONS OF PRECISION SHOOTING
DEMOCRACY AND MORAL ACCOUNTABILITY INTRODUCTION TO THE FUNDAMENTALS OF MARKSMANSHIP
PART 8: ETHICS OF CONFLICT AND VIOLENCE STANCE, GRIP, SIGHT ALIGNMENT, AND TRIGGER CONTROL
VIOLENCE AND WAR UNDERSTANDING BREATHING AND FOLLOW-THROUGH
THE ETHICS OF JUST WAR THEORY EYE DOMINANCE AND AIMING TECHNIQUES
PACIFISM AND NONVIOLENT RESISTANCE MENTAL DISCIPLINE AND FOCUS IN SHOOTING
TERRORISM AND MORAL JUDGMENT FUNDAMENTALS OF PISTOL AND RIFLE ACCURACY
HUMANITARIAN INTERVENTION AND SOVEREIGNTY IMPORTANCE OF REPETITION AND MUSCLE MEMORY
WAR CRIMES AND INTERNATIONAL TRIBUNALS ENVIRONMENTAL FACTORS IN MARKSMANSHIP
THE ETHICS OF WEAPONS AND WARFARE TECHNOLOGY SAFETY PROTOCOLS IN THE RANGE AND FIELD
POST-WAR RECONSTRUCTION AND RECONCILIATION BUILDING A PERSONAL TRAINING ROUTINE
TRAUMA, HEALING, AND MORAL RECOVERY PART 2: SHOT PROCESS AND ACCURACY DEVELOPMENT
PEACEBUILDING AND GLOBAL ETHICS OVERVIEW OF SHOT SEQUENCE IN BULLSEYE SHOOTING
TARGET ACQUISITION AND SIGHT PICTURE SHOOTING ANGLES AND POSITIONAL ADVANTAGE
TIMING AND TRIGGER PRESS SYNCHRONIZATION ENGAGING TARGETS WHILE IN MOTION
GROUPING PATTERNS AND ERROR CORRECTION PART 6: GOING PRONE AND LONG-RANGE SHOOTING
DRY FIRE PRACTICE TECHNIQUES INTRODUCTION TO THE PRONE POSITION
RANGE DRILLS FOR PRECISION SETTING UP IN THE PRONE
VISUALIZATION TECHNIQUES IN COMPETITIVE SHOOTING STABILITY AND RECOIL CONTROL WHILE PRONE
COMMON MISTAKES IN SHOT EXECUTION LONG-RANGE SIGHT ALIGNMENT AND HOLDS
ANALYZING SHOT PATTERNS PRONE VS. BENCHREST ACCURACY
IMPROVING SHOT-TO-SHOT CONSISTENCY TACTICAL APPLICATIONS OF THE PRONE
PART 3: APPLYING MARKSMANSHIP UNDER PRESSURE BARRICADE AND FIELD POSITION INTEGRATIONS
APPLYING THE FUNDAMENTALS IN LIVE FIRE SHOOTING UPHILL AND DOWNHILL FROM PRONE
TRANSITIONING FROM DRY FIRE TO LIVE FIRE USE OF BIPODS AND SLINGS
SIMULATED STRESS TRAINING CAMOUFLAGE AND LOW-PROFILE SHOOTING
SPLIT-TIME AND PERFORMANCE TRACKING PART 7: RAPID FIRE CONTROL AND TECHNIQUES
SCENARIO-BASED SHOOTING INTRODUCTION TO RAPID FIRE
SHOOTING WHILE MOVING MAINTAINING SIGHT PICTURE IN RAPID SEQUENCES
MAINTAINING ACCURACY IN COMBAT CONDITIONS MANAGING RECOIL FOR FOLLOW-UP SHOTS
TACTICAL SHOOTING MINDSET TRIGGER RESET AND RHYTHM CONTROL
SITUATIONAL AWARENESS IN THE FIELD BURST FIRE AND CONTROLLED PAIRS
TRAINING FOR HIGH-STAKES ENVIRONMENTS MULTIPLE TARGET RAPID ENGAGEMENT
PART 4: THE DRAW AND ENGAGEMENT READINESS TIME-BASED SHOOTING DRILLS
INTRODUCTION TO THE DRAW TECHNIQUE BALANCING SPEED AND ACCURACY
DRAWING FROM OPEN CARRY AND CONCEALED HOLSTERS PSYCHOLOGICAL CONDITIONING FOR RAPID FIRE
GRIP ESTABLISHMENT DURING THE DRAW TRAINING FOR COMBAT SPEED
DRAW TO FIRST SHOT TIME OPTIMIZATION PART 8: NIGHT FIRING AND LOW LIGHT COMBAT
ONE-HANDED DRAWS AND MALFUNCTION DRILLS PRINCIPLES OF NIGHT FIRING
DRAWING UNDER DURESS FLASHLIGHT TECHNIQUES AND TACTICAL LIGHTS
MULTIPLE TARGET ENGAGEMENTS TARGET IDENTIFICATION IN LOW LIGHT
DRAWING IN LOW VISIBILITY SITUATIONS NIGHT VISION TOOLS AND INTEGRATION
SAFE DRAW PRACTICES USING IRON SIGHTS IN THE DARK
DEFENSIVE DRAW AND FIRE DRILLS OPTICAL AIDS AND RED DOT USAGE AT NIGHT
PART 5: SHOOTING POSITIONS AND TACTICAL MOVEMENT FLASH MUZZLE AND SIGNATURE MANAGEMENT
OVERVIEW OF SHOOTING POSITIONS NAVIGATING IN DARKNESS SAFELY
STANDING AND ISOSCELES TECHNIQUE NIGHT FIRING DRILLS AND SAFETY
MODIFIED WEAVER AND COMBAT STANCES COMBAT ENGAGEMENT AFTER SUNSET
KNEELING POSITION ADVANTAGES AND PRACTICE PART 9: GUN HANDLING AND FIREARM MASTERY
TRANSITIONING BETWEEN SHOOTING POSITIONS CORE GUN HANDLING SKILLS
SHOOTING FROM COVER MALFUNCTION IDENTIFICATION AND CORRECTION
DYNAMIC MOVEMENT IN TACTICAL ENVIRONMENTS FIREARM CLEANING AND MAINTENANCE
CLOSE QUARTERS VS. OPEN TERRAIN TECHNIQUES TRANSITIONS BETWEEN WEAPONS
ONE-HANDED AND OFF-HAND TECHNIQUES BRAIN PLASTICITY AND DEVELOPMENT
SAFE CARRY AND TRANSPORT PRACTICES BIOLOGICAL RHYTHMS AND SLEEP-WAKE CYCLES
MANAGING MAGAZINE AND ROUND COUNT BEHAVIORAL NEUROSCIENCE APPLICATIONS
HOLSTER AND EQUIPMENT SELECTION THE BIOPSYCHOSOCIAL MODEL
TRAINING WITH SIMULATED AMMUNITION PART 3: SENSATION, PERCEPTION, AND AWARENESS
PSYCHOLOGICAL READINESS AND RESPONSIBILITY INTRODUCTION TO SENSATION AND PERCEPTION
PART 10: RELOADING AND TACTICAL EFFICIENCY THE VISUAL SYSTEM
INTRODUCTION TO RELOADING THE AUTO PISTOL THE AUDITORY SYSTEM
TACTICAL RELOAD VS. EMERGENCY RELOAD TASTE, SMELL, AND TOUCH
SPEED RELOAD TECHNIQUES PERCEPTUAL ORGANIZATION AND INTERPRETATION
MANAGING AMMO UNDER STRESS DEPTH, MOTION, AND CONSTANCY
DRILLS FOR EFFICIENT RELOADING PAIN PERCEPTION AND THE BRAIN
RELOADING WHILE IN COVER OR ON THE MOVE SENSORY INTEGRATION AND PERCEPTUAL DISORDERS
COMMON MISTAKES AND THEIR CORRECTIONS ALTERED STATES OF CONSCIOUSNESS
ONE-HANDED RELOADING SCENARIOS SLEEP, DREAMS, AND SLEEP DISORDERS
RELOADING IN ADVERSE CONDITIONS PART 4: LEARNING AND MEMORY
BUILDING ENDURANCE AND RELOADING REFLEX CLASSICAL CONDITIONING
OPERANT CONDITIONING
GENERAL PSYCHOLOGY OBSERVATIONAL LEARNING
COGNITIVE APPROACHES TO LEARNING
TITLE OF THE BOOK: THE MIND UNVEILED: A COMPREHENSIVE GUIDE TO LEARNING IN THE DIGITAL AGE
GENERAL PSYCHOLOGY STAGES OF MEMORY
PART 1: FOUNDATIONS OF PSYCHOLOGY ENCODING AND STORAGE PROCESSES
UNDERSTANDING THE SCIENCE OF PSYCHOLOGY RETRIEVAL AND FORGETTING
HISTORY AND EVOLUTION OF PSYCHOLOGY MEMORY CONSTRUCTION AND DISTORTION
MAJOR THEORETICAL PERSPECTIVES IMPROVING MEMORY TECHNIQUES
PSYCHOLOGY AS A RESEARCH-BASED DISCIPLINE PART 5: COGNITION AND INTELLIGENCE
METHODS OF PSYCHOLOGICAL RESEARCH INTRODUCTION TO COGNITION AND THINKING
ETHICS IN PSYCHOLOGICAL RESEARCH PROBLEM SOLVING AND DECISION MAKING
CAREERS IN PSYCHOLOGY CREATIVITY AND CRITICAL THINKING
PSYCHOLOGY IN EVERYDAY LIFE LANGUAGE ACQUISITION AND DEVELOPMENT
PSYCHOLOGY AND SCIENTIFIC THINKING THE STRUCTURE OF LANGUAGE
CULTURAL AND GENDER INFLUENCES IN PSYCHOLOGY INTELLIGENCE AND ITS THEORIES
PART 2: BIOLOGICAL BASES OF BEHAVIOR MEASURING INTELLIGENCE
THE STRUCTURE AND FUNCTION OF THE NERVOUS SYSTEM EMOTIONAL INTELLIGENCE
THE BRAIN AND ITS MAJOR REGIONS NATURE AND NURTURE IN INTELLIGENCE
NEURONS AND NEUROTRANSMITTERS CONTROVERSIES IN INTELLIGENCE TESTING
THE ENDOCRINE SYSTEM AND HORMONAL INFLUENCE PART 6: MOTIVATION AND EMOTION
GENETICS AND BEHAVIOR BIOLOGICAL AND PSYCHOLOGICAL MOTIVATORS
BRAIN IMAGING AND RESEARCH TECHNOLOGIES THEORIES OF MOTIVATION
HUNGER, SEX, AND ACHIEVEMENT MOTIVATION MENTAL HEALTH IN THE COMMUNITY
INTRINSIC VS. EXTRINSIC MOTIVATION PART 10: SOCIAL PSYCHOLOGY AND THERAPEUTIC APPROACHES
EMOTION AND THE BRAIN INTRODUCTION TO SOCIAL PSYCHOLOGY
THEORIES OF EMOTION ATTITUDES AND PERSUASION
CULTURAL ASPECTS OF EMOTION CONFORMITY, OBEDIENCE, AND GROUP INFLUENCE
FACIAL EXPRESSIONS AND BODY LANGUAGE PREJUDICE AND DISCRIMINATION
STRESS AND COPING MECHANISMS INTERPERSONAL ATTRACTION AND RELATIONSHIPS
MOTIVATION AND GOAL SETTING PROSOCIAL BEHAVIOR AND ALTRUISM
PART 7: LIFESPAN DEVELOPMENT INTRODUCTION TO PSYCHOLOGICAL THERAPIES
INTRODUCTION TO HUMAN DEVELOPMENT COGNITIVE AND BEHAVIORAL THERAPIES
PRENATAL DEVELOPMENT AND BIRTH HUMANISTIC AND PSYCHODYNAMIC APPROACHES
INFANCY AND EARLY CHILDHOOD FUTURE DIRECTIONS IN PSYCHOLOGY AND THERAPY
COGNITIVE DEVELOPMENT IN CHILDHOOD
EMOTIONAL AND SOCIAL DEVELOPMENT BASIC THEOLOGY
ADOLESCENCE AND IDENTITY
ADULTHOOD AND LIFE TASKS TITLE OF THE BOOK: BASIC THEOLOGY: FOUNDATIONS OF FAITH AND
AGING AND COGNITIVE CHANGES CHRISTIAN LIVING
DEATH AND DYING PART 1: THE AUTHORITY AND POWER OF THE BIBLE
DEVELOPMENTAL PSYCHOLOGY APPLICATIONS THE ORIGIN OF THE BIBLE
PART 8: PERSONALITY AND INDIVIDUAL DIFFERENCES THE SUPERIORITY OF THE BIBLE
THEORIES OF PERSONALITY THE COMPLETE MESSAGE OF THE BIBLE
TRAIT AND TYPE THEORIES HOW TO STUDY THE BIBLE EFFECTIVELY
PSYCHODYNAMIC THEORIES BIBLE STUDY METHODS AND INTERPRETATION
HUMANISTIC APPROACHES SCRIPTURE AS DIVINE REVELATION
SOCIAL-COGNITIVE PERSPECTIVES THE BIBLE'S RELEVANCE IN MODERN LIFE
PERSONALITY ASSESSMENT TOOLS INSPIRATION, INFALLIBILITY, AND INERRANCY
BIOLOGICAL BASES OF PERSONALITY THE ROLE OF THE HOLY SPIRIT IN SCRIPTURE
CULTURAL INFLUENCES ON PERSONALITY APPLYING THE BIBLE IN DAILY LIVING
PERSONALITY AND BEHAVIOR PREDICTION PART 2: SALVATION AND THE NEW BIRTH
SELF-CONCEPT AND SELF-ESTEEM THE CONCEPT OF THE NEW BIRTH
PART 9: PSYCHOLOGICAL HEALTH AND DISORDERS THE SIGNIFICANCE OF THE NEW BIRTH
DEFINING PSYCHOLOGICAL DISORDERS SALVATION BY GRACE THROUGH FAITH
CLASSIFICATION SYSTEMS: DSM AND ICD THE ROLE OF REPENTANCE
ANXIETY DISORDERS ASSURANCE OF SALVATION
MOOD DISORDERS ETERNAL DESTINATIONS: HEAVEN AND HELL
PERSONALITY DISORDERS THE WORK OF THE HOLY SPIRIT IN REGENERATION
SCHIZOPHRENIA SPECTRUM AND PSYCHOTIC DISORDERS BAPTISM AND ITS SYMBOLISM
TRAUMA AND STRESSOR-RELATED DISORDERS LIVING A TRANSFORMED LIFE
NEURODEVELOPMENTAL DISORDERS BECOMING A NEW CREATION
STIGMA AND MENTAL ILLNESS PART 3: DEVELOPING AN EFFECTIVE PRAYER LIFE
HOW TO RECEIVE ANSWERED PRAYER LIVING WITH PURPOSE AND PASSION
HOW TO PRAY EFFECTIVELY THE POWER AND BEAUTY OF THE WORDS OF JESUS
MODELS OF PRAYER IN SCRIPTURE ABIDING IN CHRIST
THE LORD’S PRAYER EXPLAINED PART 7: THE CHRISTIAN JOURNEY AND SPIRITUAL DECLINE
INTERCESSORY PRAYER AND SPIRITUAL AUTHORITY A BIBLICAL STUDY ON BACKSLIDING
HINDRANCES TO PRAYER THE CAUSES AND PSYCHOLOGY OF BACKSLIDING
PRAYING WITH FAITH AND EXPECTATION THE CONDITION OF BACKSLIDING AND APOSTASY
PRAYER AND FASTING RESTORATION AND RENEWAL
WORSHIP AND THANKSGIVING IN PRAYER RECOGNIZING EARLY SIGNS OF SPIRITUAL DRIFT
THE POWER OF PERSISTENT PRAYER HOW TO GUARD YOUR HEART
PART 4: FAITH AND RIGHTEOUS LIVING SPIRITUAL DISCIPLINES FOR CONSISTENCY
SAVING FAITH THE MINISTRY OF RECONCILIATION
LIVING BY FAITH, NOT BY SIGHT THE ROLE OF THE CHURCH IN RESTORATION
OBEDIENCE AND TRUST STAYING ROOTED IN THE FAITH
GROWING IN GRACE AND KNOWLEDGE PART 8: BIBLICAL MODELS OF GODLY SUCCESS
FAITH IN TIMES OF TRIAL UNPARALLELED SUCCESS
FRUITS OF THE SPIRIT THE ABRAHAMIC SUCCESS PARADIGM
PURSUING HOLINESS FAITH AND OBEDIENCE IN ABRAHAM’S LIFE
FAITH THAT WORKS THROUGH LOVE COVENANT PROMISES AND BLESSINGS
FAITH AND WORKS: A BIBLICAL BALANCE THE DAVIDIC SUCCESS PARADIGM
WALKING IN THE SPIRIT INTEGRITY AND WORSHIP IN DAVID’S LEADERSHIP
PART 5: IDENTIFYING AND OVERCOMING SIN THE SOLOMONIC SUCCESS PARADIGM
THE SIN OF IMMORALITY WISDOM AND WEALTH UNDER GOD'S GUIDANCE
THE SINS OF THE TONGUE PITFALLS OF SUCCESS WITHOUT GOD
THE SIN OF ACCUSATION SUCCESS REDEFINED THROUGH SCRIPTURE
EMPLOYEES OF THE ACCUSER PART 9: UNDERSTANDING SATAN AND DEMONIC ACTIVITY
THE POWER OF ACCUSATION THE ATTRIBUTES AND NAMES OF SATAN
SILENCING THE ACCUSER THE WORKS OF SATAN
THE SIN OF HYPOCRISY DECEPTION AND TEMPTATION
THE SIN OF UNFORGIVENESS THE FALL OF LUCIFER
CONFESSION AND REPENTANCE SIGNS OF DEMONIC ACTIVITY
THE POWER OF FORGIVENESS THE NATURE OF DEMONS
PART 6: GROWING IN RELATIONSHIP WITH GOD DEMONOLOGY IN BIBLICAL CONTEXT
DEVELOPING A PERSONAL RELATIONSHIP WITH GOD RECOGNIZING THE ENEMY’S STRATEGIES
PRACTICING DAILY DEVOTION AUTHORITY OVER DARKNESS
HEARING GOD'S VOICE STANDING FIRM IN SPIRITUAL WARFARE
WALKING IN OBEDIENCE PART 10: SPIRITUAL WARFARE AND DELIVERANCE
WORSHIP AS A LIFESTYLE THE STRATEGY OF DEMONS
KEY PRIORITIES FOR THE CHRISTIAN THE ARMOR OF GOD
DISCERNING GOD'S WILL BREAKING DOWN STRONGHOLDS
DELIVERANCE THROUGH CHRIST WORKING WITH MULTIPLE WORKSHEETS
WEAPONS OF OUR WARFARE EXCEL FUNCTIONS AND TOOLS FOR BUSINESS
THE POWER OF THE NAME OF JESUS SORTING, FILTERING, AND MANAGING DATA
VICTORY THROUGH THE BLOOD OF CHRIST DATA VALIDATION AND PROTECTION IN EXCEL
LIVING AS MORE THAN CONQUERORS PRINTING AND SHARING EXCEL WORKBOOKS
WALKING IN FREEDOM PART 4: PRESENTATIONS WITH POWERPOINT
REMAINING VICTORIOUS UNTIL THE END GETTING STARTED WITH POWERPOINT ESSENTIALS
DESIGNING EFFECTIVE SLIDES
INFORMATION TECHNOLOGY USING SLIDE LAYOUTS AND THEMES
ENHANCING PRESENTATIONS WITH MULTIMEDIA EFFECTS
TITLE OF THE BOOK: INFORMATION TECHNOLOGY: A COMPREHENSIVE INSERTING IMAGES, AUDIO, AND VIDEO
GUIDE TO DIGITAL SKILLS AND SYSTEMS APPLYING TRANSITIONS AND ANIMATIONS
PART 1: FOUNDATIONS OF COMPUTING CREATING INTERACTIVE PRESENTATIONS
INTRODUCTION TO COMPUTERS AND OPERATING SYSTEMS PRESENTATION BEST PRACTICES
SOFTWARE AND HARDWARE INTERACTION EXPLAINED PRESENTER TOOLS AND DELIVERY TIPS
UNDERSTANDING WINDOWS FILE MANAGEMENT SAVING AND EXPORTING POWERPOINT PROJECTS
CUSTOMIZING THE OPERATING SYSTEM PART 5: DATABASE MANAGEMENT WITH ACCESS
INTRODUCTION TO COMPUTER HARDWARE GETTING STARTED WITH ACCESS ESSENTIALS
CLASSIFYING AND EVALUATING COMPUTER TYPES UNDERSTANDING DATABASE STRUCTURES
MANAGING SOFTWARE INSTALLATIONS AND UPDATES CREATING AND MANAGING TABLES
EXPLORING SOFTWARE APPLICATIONS DESIGNING QUERIES FOR DATA RETRIEVAL
FUNDAMENTALS OF COMPUTER TROUBLESHOOTING MANAGING AND REPORTING DATABASE INFORMATION
DATA AND HARDWARE PROTECTION STRATEGIES WORKING WITH FORMS IN ACCESS
PART 2: WORD PROCESSING WITH MICROSOFT WORD BUILDING REPORTS FROM DATA
EXPLORING MICROSOFT OFFICE 2013 OVERVIEW RELATIONAL DATABASES AND RELATIONSHIPS
GETTING STARTED WITH WORD ESSENTIALS IMPORTING AND EXPORTING DATA IN ACCESS
EDITING AND FORMATTING WORD DOCUMENTS SECURITY AND MAINTENANCE OF DATABASES
SHARING AND COLLABORATING ON DOCUMENTS PART 6: NETWORKING FUNDAMENTALS
WORKING WITH TABLES IN WORD UNDERSTANDING NETWORK FUNDAMENTALS
ENHANCING DOCUMENTS WITH LAYOUT TOOLS TYPES OF NETWORKS AND TOPOLOGIES
INSERTING AND MANAGING GRAPHICS IN WORD INTRODUCTION TO NETWORK DEVICES
TEMPLATES AND DOCUMENT DESIGN NETWORK PROTOCOLS AND STANDARDS
USING REVIEW TOOLS AND COMMENTS IP ADDRESSING AND SUBNETTING BASICS
PREPARING DOCUMENTS FOR PRINTING AND PUBLISHING NETWORK SECURITY ESSENTIALS
PART 3: SPREADSHEET SKILLS WITH EXCEL SETTING UP A BASIC HOME NETWORK
GETTING STARTED WITH EXCEL ESSENTIALS WIRED VS. WIRELESS NETWORKS
ORGANIZING DATA IN EXCEL WORKSHEETS TROUBLESHOOTING NETWORK ISSUES
FORMATTING AND ENHANCING WORKSHEETS NETWORK TRENDS AND FUTURE TECHNOLOGIES
CREATING FORMULAS FOR DATA ANALYSIS PART 7: COMMUNICATION AND COLLABORATION TOOLS
CHARTING AND VISUALIZING DATA COMMUNICATION SERVICES OVERVIEW
EMAIL SYSTEMS AND ETIQUETTE ETHICAL HACKING AND PENETRATION TESTING
ONLINE COLLABORATION PLATFORMS BUILDING A CULTURE OF CYBER RESPONSIBILITY
CLOUD STORAGE AND FILE SHARING
VIRTUAL MEETINGS AND CONFERENCING TOOLS WEB SECURITY
MESSAGING APPLICATIONS AND FORUMS
SOCIAL MEDIA IN PROFESSIONAL CONTEXTS TITLE OF THE BOOK: MASTERING WEB SECURITY: A COMPLETE GUIDE TO
PRODUCTIVITY TOOLS FOR TEAMWORK PROTECTING DIGITAL ASSETS
COLLABORATION IN THE CLOUD PART 1: FOUNDATIONS OF INFORMATION SECURITY
EMERGING COMMUNICATION TECHNOLOGIES INTRODUCTION TO INFORMATION SECURITY PRINCIPLES
PART 8: INTERNET AND WEB LITERACY THE IMPORTANCE OF CYBERSECURITY IN THE DIGITAL AGE
USING THE INTERNET AND THE WORLD WIDE WEB HISTORY AND EVOLUTION OF WEB SECURITY
BROWSERS AND SEARCH ENGINES TYPES OF SECURITY DOMAINS
EVALUATING ONLINE INFORMATION SECURITY GOALS: CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY
UNDERSTANDING WEB ADDRESSES AND DOMAINS SECURITY IN THE WEB APPLICATION CONTEXT
INTRODUCTION TO WEB CONTENT MANAGEMENT SECURITY AWARENESS AND HUMAN FACTORS
CREATING BASIC WEB PAGES LEGAL AND ETHICAL ASPECTS OF WEB SECURITY
WEB PUBLISHING TOOLS INDUSTRY USE CASES OF INFORMATION SECURITY
INTERNET SAFETY AND BEST PRACTICES FUTURE TRENDS IN WEB SECURITY
MANAGING ONLINE PRIVACY PART 2: BUILDING AND MANAGING SECURITY PROCESSES
FUTURE OF THE WEB AND DIGITAL CONNECTIVITY UNDERSTANDING SECURITY PROCESSES AND FRAMEWORKS
PART 9: TECHNOLOGY IN MODERN SOCIETY SECURITY GOVERNANCE AND POLICY DEVELOPMENT
TECHNOLOGY AND SOCIETY: AN OVERVIEW RISK MANAGEMENT AND SECURITY CONTROLS
IMPACT OF IT ON DAILY LIFE SECURITY AUDITING AND ACCOUNTABILITY
TECHNOLOGY IN EDUCATION AND LEARNING THE ROLE OF SECURITY OPERATIONS CENTERS
IT IN BUSINESS AND COMMERCE INCIDENT MANAGEMENT PROCESSES
INFORMATION TECHNOLOGY IN HEALTHCARE MANAGING VULNERABILITY LIFE CYCLES
SOCIAL MEDIA AND PUBLIC DISCOURSE CHANGE MANAGEMENT AND SECURITY
ETHICAL ISSUES IN TECHNOLOGY USE METRICS AND REPORTING IN SECURITY OPERATIONS
TECHNOLOGY AND ENVIRONMENTAL SUSTAINABILITY INTEGRATING SECURITY INTO IT OPERATIONS
DIGITAL LITERACY AND INCLUSION PART 3: IDENTIFYING AND ADDRESSING IT THREATS
PREPARING FOR THE DIGITAL FUTURE OVERVIEW OF THREATS TO IT ASSETS
PART 10: CYBERSECURITY AND ETHICS MALWARE AND VIRUS ATTACKS
COMPUTER SAFETY AND ETHICS OVERVIEW RANSOMWARE AND TROJANS
PROTECTING PERSONAL INFORMATION ONLINE PHISHING AND SOCIAL ENGINEERING
UNDERSTANDING MALWARE AND CYBER THREATS INSIDER THREATS AND COUNTERMEASURES
SAFE INTERNET BROWSING PRACTICES ADVANCED PERSISTENT THREATS (APTS)
PASSWORD SECURITY AND MANAGEMENT DENIAL-OF-SERVICE AND DISTRIBUTED ATTACKS
UNDERSTANDING CYBERBULLYING AND ONLINE BEHAVIOR ZERO-DAY EXPLOITS AND THREAT INTELLIGENCE
LEGAL AND ETHICAL USE OF IT THREAT MODELING TECHNIQUES
WORKPLACE IT SECURITY POLICIES REAL-WORLD CASE STUDIES OF IT THREATS
PART 4: ENCRYPTION AND SECURE COMMUNICATIONS ANOMALY DETECTION WITH MACHINE LEARNING
BASICS OF CRYPTOGRAPHY IDS IN THE CLOUD ENVIRONMENT
SYMMETRIC ENCRYPTION METHODS BEST PRACTICES FOR IDS DEPLOYMENT
ASYMMETRIC ENCRYPTION AND PUBLIC KEY INFRASTRUCTURE EVALUATING IDS SOLUTIONS
HASHING ALGORITHMS AND MESSAGE INTEGRITY PART 8: FUNDAMENTALS OF SYSTEM SECURITY
SSL/TLS PROTOCOLS FOR WEB ENCRYPTION INTRODUCTION TO SYSTEM HARDENING
DIGITAL CERTIFICATES AND CERTIFICATE AUTHORITIES SECURITY BASELINES FOR SYSTEMS
SECURE KEY EXCHANGE PROTOCOLS MANAGING SYSTEM VULNERABILITIES
IMPLEMENTING ENCRYPTION IN WEB APPLICATIONS SECURE SYSTEM CONFIGURATION
ENCRYPTION TOOLS AND LIBRARIES PATCH MANAGEMENT AND UPDATES
EVALUATING THE STRENGTH OF ENCRYPTION ENDPOINT DETECTION AND RESPONSE
PART 5: FUNDAMENTALS OF NETWORK SECURITY FILE INTEGRITY AND ACCESS CONTROL
INTRODUCTION TO NETWORK SECURITY ARCHITECTURE LEAST PRIVILEGE AND SECURE ADMIN PRACTICES
FIREWALLS AND PERIMETER DEFENSE BACKUP AND DISASTER RECOVERY PLANNING
VIRTUAL PRIVATE NETWORKS AND TUNNELING SYSTEM SECURITY AUTOMATION TOOLS
SECURE SOCKET LAYERS AND HTTPS PART 9: OPERATING SYSTEM SECURITY
WEB PROXIES AND NETWORK MONITORING UNIX SYSTEM SECURITY FUNDAMENTALS
NETWORK SEGMENTATION AND ISOLATION UNIX FILE PERMISSIONS AND OWNERSHIP
SECURE CONFIGURATION OF ROUTERS AND SWITCHES MANAGING SERVICES AND DAEMONS ON UNIX
COMMON NETWORK PROTOCOL VULNERABILITIES SECURING UNIX AUTHENTICATION AND LOGS
BUILDING SECURE WIRELESS NETWORKS WINDOWS SYSTEM SECURITY FUNDAMENTALS
NETWORK SECURITY BEST PRACTICES USER ACCOUNT MANAGEMENT IN WINDOWS
PART 6: DETECTING AND PREVENTING NETWORK THREATS GROUP POLICY AND SECURITY TEMPLATES
NETWORK THREAT TAXONOMY AND CLASSIFICATION WINDOWS DEFENDER AND ANTIVIRUS TOOLS
UNDERSTANDING PACKET SNIFFING AND ANALYSIS WINDOWS PATCH MANAGEMENT
PORT SCANNING AND DEFENSE MECHANISMS OS-LEVEL SECURITY COMPARISON: UNIX VS. WINDOWS
MAN-IN-THE-MIDDLE ATTACKS PART 10: COMPLIANCE, STANDARDS, AND SECURITY TESTING
SPOOFING AND SESSION HIJACKING IMPORTANCE OF SECURITY STANDARDS AND FRAMEWORKS
DNS AND ARP POISONING INTRODUCTION TO ISO/IEC 27001
DETECTING NETWORK INTRUSIONS IN REAL TIME UNDERSTANDING NIST CYBERSECURITY FRAMEWORK
BEHAVIORAL AND SIGNATURE-BASED DETECTION GDPR AND PRIVACY COMPLIANCE
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) PCI-DSS FOR WEB APPLICATIONS
CREATING RESPONSE PLANS FOR NETWORK THREATS ROLE OF AUDITING IN COMPLIANCE
PART 7: INTRUSION DETECTION AND PREVENTION SYSTEMS FUNDAMENTALS OF SECURITY TESTING
OVERVIEW OF INTRUSION DETECTION SYSTEMS (IDS) PENETRATION TESTING TECHNIQUES
HOST-BASED VS. NETWORK-BASED IDS WEB VULNERABILITY SCANNING TOOLS
INTRUSION PREVENTION SYSTEMS (IPS) CREATING A SECURE DEVELOPMENT AND TESTING ENVIRONMENT
LOGGING AND MONITORING FOR INTRUSIONS
RULES AND SIGNATURE MANAGEMENT DATABASE SECURITY
INCIDENT RESPONSE FOR DETECTED INTRUSIONS
TITLE OF THE BOOK: DATABASE SECURITY: COMPREHENSIVE STRATEGIES ENCRYPTING DATA IN SQL SERVER
FOR PROTECTING INFORMATION ASSETS TRANSPARENT DATA ENCRYPTION (TDE)
PART 1: FOUNDATIONS OF DATABASE SECURITY SQL SERVER AUDITING FEATURES
SECURITY AND INFORMATION TECHNOLOGY IN THE MODERN WORLD MONITORING AND ALERTS IN SQL SERVER
IMPORTANCE OF DATABASE SECURITY IN IT INFRASTRUCTURE SECURE DEVELOPMENT PRACTICES IN SQL SERVER
SECURITY GOALS AND PRINCIPLES APPLIED TO DATABASES DEFENDING SQL SERVER FROM EXTERNAL ATTACKS
OVERVIEW OF THREATS TO DATA AND DATABASES PART 5: SECURING ORACLE DATABASES
ROLE OF DATABASE SECURITY IN COMPLIANCE AND GOVERNANCE DATABASE INSTALLATION 3: ORACLE OVERVIEW
CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY IN DATA SYSTEMS ORACLE DATABASE SECURITY ARCHITECTURE
DATA BREACHES: CAUSES, IMPACTS, AND PREVENTION MANAGING USERS AND PROFILES IN ORACLE
AUTHENTICATION VS. AUTHORIZATION IN DATABASE SYSTEMS ORACLE ROLES AND PRIVILEGES
HISTORICAL DEVELOPMENTS IN DATABASE SECURITY ORACLE DATA ENCRYPTION TECHNIQUES
CURRENT TRENDS AND EMERGING TECHNOLOGIES ORACLE LABEL SECURITY
PART 2: UNDERSTANDING DATABASE SYSTEMS DATABASE VAULT AND AUDIT VAULT IN ORACLE
DATABASE REVIEW AND CORE CONCEPTS NETWORK ENCRYPTION IN ORACLE
RELATIONAL VS. NON-RELATIONAL DATABASES ORACLE BEST PRACTICES FOR SECURE SETUP
INTRODUCTION TO STRUCTURED QUERY LANGUAGE (SQL) ORACLE PATCH MANAGEMENT AND SECURITY UPDATES
DATABASE SCHEMA AND ARCHITECTURE PART 6: ACCESS CONTROL AND ROLE MANAGEMENT
TRANSACTIONS AND CONCURRENCY CONTROL PASSWORD SECURITY AND POLICIES
BACKUP AND RECOVERY CONCEPTS IMPLEMENTING PASSWORD COMPLEXITY RULES
USER ROLES AND ACCESS CONTROLS UNDERSTANDING PROFILES IN DATABASE MANAGEMENT
COMMON DATABASE USE CASES AND SECURITY RISKS ROLE-BASED ACCESS CONTROL (RBAC)
DATA LIFECYCLE AND ITS SECURITY CONSIDERATIONS PRIVILEGES: SYSTEM VS. OBJECT PRIVILEGES
COMPLIANCE REGULATIONS AFFECTING DATABASES CREATING AND ASSIGNING ROLES
PART 3: INSTALLING AND SECURING MYSQL ROLE INHERITANCE AND PRIVILEGE ESCALATION RISKS
DATABASE INSTALLATION 1: MYSQL OVERVIEW SESSION MANAGEMENT AND TIMEOUTS
SETTING UP A SECURE MYSQL ENVIRONMENT USER AUDITING AND SESSION TRACKING
MYSQL CONFIGURATION FOR SECURITY MANAGING THIRD-PARTY ACCESS
CREATING USERS AND MANAGING PERMISSIONS IN MYSQL PART 7: SQL INJECTION IDENTIFICATION AND DEFENSE
SECURE AUTHENTICATION METHODS IN MYSQL SQL INJECTION I: IDENTIFICATION OF VULNERABILITIES
LOGGING AND AUDITING IN MYSQL UNDERSTANDING INPUT VALIDATION FAILURES
ENCRYPTING DATA IN MYSQL EXPLORING CLASSIC SQL INJECTION EXAMPLES
BACKUP AND RESTORE SECURITY PRACTICES IN MYSQL BLIND SQL INJECTION TECHNIQUES
PROTECTING MYSQL AGAINST NETWORK THREATS ERROR-BASED SQL INJECTION
COMMON MYSQL VULNERABILITIES AND PATCHES BYPASSING AUTHENTICATION VIA SQL INJECTION
PART 4: SECURING MICROSOFT SQL SERVER AUTOMATED TOOLS FOR DETECTING SQL INJECTION
DATABASE INSTALLATION 2: MICROSOFT SQL SERVER OVERVIEW SQL INJECTION EXPLOITATION AND DEFENSE
SQL SERVER SECURITY ARCHITECTURE USING PREPARED STATEMENTS AND PARAMETERIZED QUERIES
AUTHENTICATION MODES AND LOGIN SECURITY APPLICATION DESIGN BEST PRACTICES FOR PREVENTION
DATABASE ROLES AND PERMISSIONS IN SQL SERVER PART 8: AUDITING AND MONITORING DATABASE ACTIVITY
INTRODUCTION TO SECURITY AUDITING SMARTPHONES VS. TABLETS: SECURITY CONSIDERATIONS
DATABASE ACTIVITY MONITORING (DAM) SOLUTIONS HOW MOBILE DEVICES IMPACT PERSONAL PRIVACY
CONFIGURING AUDIT TRAILS IN DATABASES OPERATING SYSTEMS AND BUILT-IN SECURITY FEATURES
RETAINING AND REVIEWING LOGS COMMON MISCONCEPTIONS ABOUT MOBILE SECURITY
IDENTIFYING SUSPICIOUS DATABASE ACTIVITIES MOBILE APP ECOSYSTEMS AND THEIR RISKS
ROLE OF MACHINE LEARNING IN DATABASE MONITORING INTEGRATING MOBILE DEVICES WITH ENTERPRISE NETWORKS
ALERTS AND AUTOMATED RESPONSES MOBILE ECOSYSTEM STAKEHOLDERS
INSIDER THREAT DETECTION VIA AUDITING THREAT EVOLUTION IN MOBILE ENVIRONMENTS
MAINTAINING COMPLIANCE WITH AUDIT TRAILS PART 2: RECOGNIZING MOBILE DEVICE THREATS
USING SIEM TOOLS FOR DATABASE SECURITY MONITORING WHY DO I CARE? THE MOBILE DEVICE THREAT
PART 9: SECURITY TESTING AND RISK ASSESSMENT MALWARE AND MOBILE OPERATING SYSTEMS
PRINCIPLES OF SECURITY TESTING UNDERSTANDING PHISHING AND SOCIAL ENGINEERING
COMMON VULNERABILITIES IN DATABASE SYSTEMS RISK FROM PUBLIC WI-FI AND ROGUE ACCESS POINTS
PENETRATION TESTING FOR DATABASES LOCATION TRACKING AND DATA HARVESTING RISKS
VULNERABILITY SCANNING TOOLS SPYWARE AND SURVEILLANCE THREATS
DATABASE FUZZING TECHNIQUES ZERO-DAY EXPLOITS ON MOBILE DEVICES
THREAT MODELING FOR DATABASE ENVIRONMENTS RISKS FROM APP PERMISSIONS AND OVERREACH
USING OWASP GUIDELINES FOR DATABASE SECURITY SMS AND BLUETOOTH-BASED ATTACKS
TESTING ROLE ASSIGNMENTS AND PRIVILEGES THREAT INTELLIGENCE FOR MOBILE SECURITY
SECURE CODE REVIEW PRACTICES PART 3: PLANNING FOR MOBILE INTEGRATION IN THE ENTERPRISE
CREATING A DATABASE SECURITY TESTING CHECKLIST PLANNING FOR MOBILE DEVICES IN THE ENTERPRISE
PART 10: TOWARD A SECURE DATABASE ENVIRONMENT ASSESSING MOBILE DEVICE USE CASES
DEVELOPING A DATABASE SECURITY POLICY IDENTIFYING MOBILE STAKEHOLDERS AND GOVERNANCE
SECURE DATABASE DESIGN PRINCIPLES DETERMINING SECURITY AND COMPLIANCE NEEDS
INTEGRATION WITH ENTERPRISE SECURITY ARCHITECTURES MANAGING DEVICE LIFECYCLES
SECURITY CONSIDERATIONS IN CLOUD DATABASES MOBILE DEVICE PROCUREMENT STRATEGIES
TRAINING AND AWARENESS FOR DATABASE ADMINISTRATORS DEVELOPING A MOBILE INTEGRATION ROADMAP
INCIDENT RESPONSE PLANNING FOR DATABASE BREACHES ENABLING BYOD SAFELY
BUILDING A CULTURE OF SECURITY ADDRESSING LEGAL AND REGULATORY CHALLENGES
REGULAR SECURITY REVIEW AND IMPROVEMENT DESIGNING A SCALABLE MOBILE SECURITY PLAN
CASE STUDIES IN DATABASE SECURITY BREACHES PART 4: BUILDING EFFECTIVE SECURITY POLICIES
THE FUTURE OF DATABASE SECURITY AND DATA PROTECTION CREATING MOBILE DEVICE SECURITY POLICIES
COMPONENTS OF A STRONG MOBILE SECURITY POLICY
MOBILE DEVICE SECURITY DEFINING ACCEPTABLE USE AND USER RESPONSIBILITIES
SETTING DEVICE SECURITY CONFIGURATION STANDARDS
TITLE OF THE BOOK: MOBILE DEVICE SECURITY: STRATEGIES FOR POLICY ENFORCEMENT MECHANISMS
PROTECTION IN A CONNECTED WORLD HANDLING POLICY VIOLATIONS AND EXCEPTIONS
PART 1: UNDERSTANDING MOBILE TECHNOLOGY AND RISK DATA CLASSIFICATION AND ACCESS RULES
WHAT’S SO SMART ABOUT A PHONE, ANYWAY? DEVICE DECOMMISSIONING PROTOCOLS
EVOLUTION OF MOBILE DEVICE FUNCTIONALITY POLICY UPDATE AND REVIEW PROCEDURES
ENSURING POLICY AWARENESS AND ADOPTION PROTECTING AGAINST LOSS AND THEFT
PART 5: MANAGING AND MONITORING MOBILE DEVICES REMOTE TRACKING AND RECOVERY TOOLS
MANAGING AND CONTROLLING DEVICES SECURING PORTS AND EXTERNAL CONNECTIONS
INTRODUCTION TO MOBILE DEVICE MANAGEMENT (MDM) ENABLING BIOMETRIC AND PIN PROTECTION
ENTERPRISE MOBILITY MANAGEMENT (EMM) SOLUTIONS FIRMWARE AND OS SECURITY PATCHING
REMOTE LOCK AND WIPE CAPABILITIES PART 9: MOBILE APPS AND DATA SECURITY
APPLICATION MANAGEMENT AND WHITELISTING EDUCATING USERS ABOUT BACKING UP DATA
DEVICE ENROLLMENT PROCESSES AUTOMATIC BACKUP AND RECOVERY SOLUTIONS
MANAGING UPDATES AND PATCHES SECURING MOBILE APPLICATIONS
MONITORING MOBILE USAGE AND ACTIVITY LOGS VETTING APPS BEFORE INSTALLATION
INTEGRATION WITH EXISTING IT INFRASTRUCTURE APP SANDBOXING AND ISOLATION TECHNIQUES
RESPONDING TO DEVICE INCIDENTS AND ALERTS APPLICATION SECURITY TESTING TOOLS
PART 6: ENSURING COMPLIANCE AND SECURE COMMUNICATIONS MOBILE APP THREAT INTELLIGENCE
CONFORMING TO CORPORATE COMPLIANCE POLICIES PROTECTING CLOUD-CONNECTED APPS
COMPLIANCE WITH GDPR, HIPAA, AND OTHER STANDARDS HANDLING APP STORE SECURITY LIMITATIONS
DATA ENCRYPTION FOR MOBILE DEVICES EDUCATING DEVELOPERS ON SECURE CODING
SECURING DATA IN TRANSIT WITH VPNS PART 10: RESOURCES, VENDORS, AND FUTURE TRENDS
VPN PROTOCOLS AND MOBILE COMPATIBILITY TOP TEN ONLINE INFORMATION SOURCES
MULTI-FACTOR AUTHENTICATION (MFA) FOR MOBILE ACCESS LEADING SECURITY BLOGS AND COMMUNITIES
CONTAINERIZATION OF CORPORATE DATA FORUMS FOR MOBILE SECURITY PROFESSIONALS
ENSURING SECURE EMAIL AND MESSAGING GOVERNMENT AND INDUSTRY PUBLICATIONS
MOBILE IDENTITY AND ACCESS MANAGEMENT TOP TEN MOBILE SECURITY VENDORS
CONDUCTING COMPLIANCE AUDITS CRITERIA FOR EVALUATING MOBILE SECURITY PRODUCTS
PART 7: NETWORK SECURITY AND DEVICE CONNECTIVITY INTEGRATION OF AI IN MOBILE SECURITY
CONNECTING TO WI-FI NETWORKS FUTURE THREATS TO MOBILE ENVIRONMENTS
RISKS OF PUBLIC WI-FI AND MITIGATION MEASURES PREPARING FOR THE NEXT GENERATION OF MOBILE TECH
SECURING PRIVATE AND CORPORATE NETWORKS FINAL REFLECTIONS ON MOBILE DEVICE SECURITY
USING CERTIFICATES AND PROFILES FOR NETWORK ACCESS
ENFORCING NETWORK USAGE POLICIES FORENSIC ANALYSIS
MONITORING NETWORK TRAFFIC FROM MOBILE DEVICES
USING NETWORK ACCESS CONTROL (NAC) TOOLS TITLE OF THE BOOK: MASTERING FORENSIC ANALYSIS: A COMPREHENSIVE
PREVENTING ROGUE NETWORK CONNECTIONS GUIDE TO DIGITAL INVESTIGATION
SECURE ROAMING AND CROSS-NETWORK TRANSITIONS PART 1: FOUNDATIONS OF FORENSIC ANALYSIS
EDUCATING USERS ON SAFE CONNECTIVITY PRACTICES UNDERSTANDING ANALYSIS CONCEPTS
PART 8: DEVICE HARDENING AND PHYSICAL PROTECTION THE ROLE OF FORENSIC ANALYSIS IN CYBERSECURITY
DEVICE SECURITY COMPONENT OVERVIEW CORE PRINCIPLES OF DIGITAL FORENSICS
HACKER PROTECTION AND ENFORCEABLE ENCRYPTION TOOLS AND TECHNIQUES IN FORENSIC ANALYSIS
SECURE BOOT AND TRUSTED EXECUTION DIGITAL EVIDENCE AND CHAIN OF CUSTODY
MOBILE ANTIVIRUS AND THREAT DETECTION TOOLS LEGAL AND ETHICAL CONSIDERATIONS
PHYSICAL DEVICE HARDENING TECHNIQUES TYPES OF DIGITAL INVESTIGATIONS
FORENSIC IMAGING AND ACQUISITION ANALYZING AUTO-START LOCATIONS
DOCUMENTATION AND PRESERVATION OF EVIDENCE USER ACCOUNT AND LOGIN ARTIFACTS
OVERVIEW OF DIGITAL INVESTIGATION FRAMEWORKS TIME STAMP AND LAST WRITE TIME ANALYSIS
PART 2: PREPARING FOR AN INCIDENT DETECTING PERSISTENCE MECHANISMS
INCIDENT PREPARATION ESSENTIALS REGISTRY HIVES AND THEIR IMPORTANCE
ROLES AND RESPONSIBILITIES IN INCIDENT RESPONSE REGISTRY VIEWER TOOLS AND TECHNIQUES
FORENSIC READINESS PLANNING REGISTRY EVIDENCE IN INSIDER THREAT CASES
CREATING AN INCIDENT RESPONSE PLAN PART 6: DETECTING AND ANALYZING MALWARE
SETTING UP FORENSIC LABS AND TOOLKITS MALWARE DETECTION FUNDAMENTALS
MAINTAINING INTEGRITY IN COLLECTION STATIC VS. DYNAMIC MALWARE ANALYSIS
ESTABLISHING TRIAGE PROCEDURES IDENTIFYING MALICIOUS EXECUTABLES
EVIDENCE COLLECTION BEST PRACTICES MEMORY DUMP ANALYSIS FOR MALWARE
INCIDENT CLASSIFICATION AND PRIORITIZATION UNDERSTANDING MALWARE PERSISTENCE
INITIAL RESPONSE AND CONTAINMENT ROOTKITS AND STEALTH TECHNIQUES
PART 3: WORKING WITH VOLUME SHADOW COPIES ANALYZING COMMAND-AND-CONTROL ACTIVITY
INTRODUCTION TO VOLUME SHADOW COPIES INVESTIGATING MALWARE INFECTION VECTORS
ACCESSING VOLUME SHADOW COPIES USING SANDBOXES FOR MALWARE BEHAVIOR
RECOVERING DELETED FILES FROM SHADOW COPIES CORRELATING MALWARE ARTIFACTS
EXPLORING VSS IN WINDOWS ENVIRONMENTS PART 7: BUILDING AND USING TIMELINES
FORENSIC TOOLS FOR SHADOW COPY ANALYSIS TIMELINE ANALYSIS IN DIGITAL FORENSICS
ARTIFACTS STORED IN SHADOW COPIES TYPES OF TIMELINE EVIDENCE
UNDERSTANDING SNAPSHOT SCHEDULES LOG FILE CORRELATION AND EVENT SEQUENCING
VSS IN RANSOMWARE INVESTIGATIONS CREATING TIMELINES FROM REGISTRY DATA
PRESERVING AND ANALYZING SHADOW COPIES MFT AND LOGFILE ANALYSIS FOR TIMELINES
LIMITATIONS AND CHALLENGES OF SHADOW COPY ANALYSIS INTEGRATING TIMESTAMPS FROM MULTIPLE SOURCES
PART 4: IN-DEPTH FILE ANALYSIS USING TOOLS LIKE PLASO AND LOG2TIMELINE
FILE SYSTEM STRUCTURES AND METADATA UNDERSTANDING GAPS AND INCONSISTENCIES
FILE CARVING TECHNIQUES VISUALIZING TIMELINES FOR REPORTS
RECOVERING DELETED FILES TIMELINES IN BREACH INVESTIGATIONS
ANALYZING FILE HEADERS AND EXTENSIONS PART 8: CORRELATING DIGITAL ARTIFACTS
DETECTING FILE MANIPULATION ARTIFACT CORRELATION FUNDAMENTALS
HASHING AND INTEGRITY CHECKS BUILDING A CASE THROUGH CORRELATION
EXPLORING FILE SIGNATURE ANOMALIES CONNECTING USER ACTIVITY TO EVENTS
IDENTIFYING HIDDEN AND OBFUSCATED FILES ANALYZING COMMUNICATION ARTIFACTS
CROSS-REFERENCING FILE TIMESTAMPS CORRELATING WEB BROWSING HISTORY
FORENSIC TOOLS FOR FILE ANALYSIS EMAIL AND MESSAGING ARTIFACT CORRELATION
PART 5: REGISTRY ANALYSIS TECHNIQUES LINK ANALYSIS TECHNIQUES
INTRODUCTION TO WINDOWS REGISTRY TIME AND CONTEXTUAL CORRELATION
KEY LOCATIONS OF INTEREST IN THE REGISTRY CROSS-PLATFORM ARTIFACT INTEGRATION
TRACKING USB DEVICE CONNECTIONS CASE STUDY ON ARTIFACT CORRELATION
PART 9: CREATING EFFECTIVE REPORTS ETHERNET PROTOCOL STRUCTURE AND FUNCTION
IMPORTANCE OF FORENSIC REPORTING ETHERNET FRAME FORMATS AND OPERATION
STRUCTURING A FORENSIC REPORT TOKEN RING NETWORK PROTOCOL OVERVIEW
DESCRIBING EVIDENCE AND FINDINGS FDDI CONCEPTS AND IMPLEMENTATION
USING VISUALS IN REPORTS MAC ADDRESSING AND DATA FRAMING
LEGAL CONSIDERATIONS IN REPORTING CSMA/CD AND ACCESS CONTROL METHODS
WRITING FOR TECHNICAL AND NON-TECHNICAL AUDIENCES DATA LINK LAYER DEVICES AND FUNCTIONS
DOCUMENTING METHODOLOGIES AND TOOLS SWITCHING AND FORWARDING AT LAYER 2
REPORTING LIMITATIONS AND ASSUMPTIONS TROUBLESHOOTING ETHERNET AND TOKEN RING
PRESENTING FINDINGS IN LEGAL PROCEEDINGS COMPARISON OF ETHERNET, FDDI, AND TOKEN RING
CREATING EXECUTIVE SUMMARIES PART 3: CORE NETWORK DEVICES AND BASIC OPERATIONS
PART 10: ADVANCED TOPICS AND FUTURE TRENDS INTRODUCTION TO BRIDGES AND SWITCHING
CLOUD FORENSICS AND CHALLENGES FUNCTIONALITY OF NETWORK ROUTERS
MOBILE DEVICE FORENSICS LAYER 2 VS. LAYER 3 OPERATIONS
IOT FORENSIC INVESTIGATIONS NETWORK INTERFACE CARDS AND ADDRESSING
NETWORK FORENSICS AND PACKET ANALYSIS PACKET SWITCHING VS. CIRCUIT SWITCHING
ENCRYPTION AND ANTI-FORENSICS TECHNIQUES BASIC IP CONFIGURATION AND SUBNETTING
AI AND AUTOMATION IN FORENSICS UNDERSTANDING NETWORK TABLES AND ARP
CROSS-BORDER LEGAL CONSIDERATIONS HOST-TO-HOST COMMUNICATION CONCEPTS
PREPARING FOR ADVANCED THREAT ACTORS PACKET FLOW THROUGH BRIDGES AND ROUTERS
EMERGING TOOLS AND TECHNIQUES TROUBLESHOOTING BRIDGE AND ROUTER CONNECTIVITY
FUTURE OF DIGITAL FORENSICS PART 4: IEEE STANDARDS AND EARLY NETWORKING SYSTEMS
OVERVIEW OF IEEE 802 STANDARDS
NETWORK PROTOCOLS AND ANALYSIS IEEE 802.2 LOGICAL LINK CONTROL (LLC)
ROLE OF LLC IN PROTOCOL MULTIPLEXING
TITLE OF THE BOOK: MASTERING NETWORK PROTOCOLS AND ANALYSIS: A INTRODUCTION TO XEROX NETWORK SYSTEM
LAYERED APPROACH TO NETWORK TECHNOLOGIES AND XNS PROTOCOL STACK OVERVIEW
COMMUNICATIONS INTERNETWORK DATAGRAM PROTOCOL (IDP)
PART 1: UNDERSTANDING THE NETWORK FOUNDATION XEROX PACKET EXCHANGE PROTOCOL
THE PHYSICAL LAYER EXPLAINED ROUTING IN XEROX NETWORK SYSTEM
SIGNAL TRANSMISSION AND MEDIA TYPES HISTORICAL RELEVANCE OF XNS
ENCODING METHODS AND STANDARDS COMPARISON OF IEEE 802.2 AND XNS
ERROR DETECTION AND CORRECTION BASICS PART 5: NOVELL AND PROPRIETARY NETWORK SYSTEMS
NETWORK TOPOLOGIES AND ARCHITECTURE NOVELL NETWARE ARCHITECTURE
CABLING STANDARDS AND CONNECTORS NETWARE CORE PROTOCOL (NCP)
LAYER 1 DEVICES AND FUNCTIONALITY SERVICE ADVERTISING PROTOCOL (SAP)
TROUBLESHOOTING PHYSICAL LAYER ISSUES IPX PROTOCOL OVERVIEW
PHYSICAL LAYER IN WIRED VS. WIRELESS CONFIGURING NOVELL NETWARE NETWORKS
REAL-WORLD PHYSICAL LAYER APPLICATIONS NETWARE DIRECTORY SERVICES
PART 2: DATA LINK TECHNOLOGIES AND LEGACY PROTOCOLS TROUBLESHOOTING NOVELL PROTOCOLS
LEGACY INTEGRATION IN MODERN NETWORKS DIGITAL NETWORK ARCHITECTURE (DECNET)
COMPARISON OF NETWARE AND TCP/IP PROTOCOL LAYERS IN DECNET
CASE STUDY ON NOVELL MIGRATION LOCAL AREA TRANSPORT (LAT) PROTOCOL
PART 6: CORE CONCEPTS IN TCP/IP NETWORKING CONFIGURATION AND USE OF LAT
INTRODUCTION TO TCP/IP LAYERS COMPARISON OF APPLETALK, DECNET, AND LAT
HISTORY AND DESIGN OF TCP/IP MIGRATION FROM PROPRIETARY PROTOCOLS
TCP VS. UDP OVERVIEW LEGACY PROTOCOL SUPPORT IN MODERN NETWORKS
TCP/IP MODEL VS. OSI MODEL PART 10: POINT-TO-POINT AND WAN PROTOCOLS
APPLICATION LAYER PROTOCOLS IN TCP/IP OVERVIEW OF POINT-TO-POINT PROTOCOL (PPP)
TCP/IP IN LAN AND WAN ENVIRONMENTS PPP FRAME STRUCTURE AND ENCAPSULATION
TCP/IP CONFIGURATION PARAMETERS AUTHENTICATION IN PPP (PAP/CHAP)
NETWORK COMMUNICATION FLOW WITH TCP/IP USING PPP WITH SERIAL CONNECTIONS
TROUBLESHOOTING TCP/IP NETWORKS INTRODUCTION TO FRAME RELAY NETWORKS
REAL-WORLD TCP/IP DEPLOYMENT EXAMPLES DLCI ADDRESSING AND VIRTUAL CIRCUITS
PART 7: DEEP DIVE INTO INTERNET PROTOCOLS FRAME RELAY CONGESTION MANAGEMENT
DETAILED EXPLORATION OF INTERNET PROTOCOL ISDN BASICS AND ARCHITECTURE
IPV4 ADDRESSING AND CLASSES ISDN PROTOCOL STACK AND SERVICES
SUBNETTING AND SUPERNETTING TECHNIQUES MODERN ALTERNATIVES TO FRAME RELAY AND ISDN
FRAGMENTATION AND MTU CONCEPTS
IP ROUTING AND FORWARDING CYBERSECURITY AUDITING
ROUTING PROTOCOLS OVERVIEW (RIP, OSPF, BGP)
STATIC VS. DYNAMIC ROUTING TITLE OF THE BOOK: CYBERSECURITY AUDITING: STRATEGIC PRACTICES,
DEFAULT GATEWAY AND PATH SELECTION MODELS, AND NATIONAL READINESS
IPV6 ADDRESSING AND HEADERS PART 1: THE RISE OF CYBERCRIME IN THE DIGITAL AGE
IPV6 TRANSITION MECHANISMS UNDERSTANDING CYBERCRIME AND ITS GLOBAL IMPACT
PART 8: TRANSMISSION AND COMMUNICATION PROTOCOLS TYPES AND CLASSIFICATIONS OF CYBERCRIMINALS
INTRODUCTION TO UDP CHARACTERISTICS MOTIVATIONS AND PROFILES OF CYBER THREAT ACTORS
USE CASES FOR UDP IN NETWORKING EMERGING TRENDS IN CYBERCRIME TACTICS
COMMON UDP-BASED PROTOCOLS THE EVOLUTION OF DIGITAL CRIMINAL NETWORKS
TCP SEGMENT STRUCTURE AND FLOW CONTROL LEGAL PERSPECTIVES ON CYBER OFFENSES
TCP CONNECTION ESTABLISHMENT AND TERMINATION CASE STUDIES OF MAJOR CYBERCRIME INCIDENTS
TCP RETRANSMISSION AND ACKNOWLEDGMENT CYBERCRIME AND THE DARK WEB
TCP CONGESTION CONTROL TECHNIQUES CYBERCRIME AND FINANCIAL FRAUD
SELECTED TCP/IP APPLICATIONS (HTTP, FTP, DNS) PREVENTING AND DISRUPTING CYBERCRIME OPERATIONS
IP MULTICAST PROTOCOLS AND USAGE PART 2: CYBERSECURITY INCIDENT RESPONSE AND MANAGEMENT
OTHER TCP/IP PROTOCOLS (ICMP, ARP, DHCP) INTRODUCTION TO CYBERSECURITY INCIDENT RESPONSE
PART 9: ALTERNATIVE AND LEGACY PROTOCOL ARCHITECTURES BUILDING AN EFFECTIVE INCIDENT RESPONSE PLAN
APPLETALK PROTOCOL STACK OVERVIEW THE INCIDENT RESPONSE LIFECYCLE
APPLETALK ADDRESSING AND ROUTING DETECTING AND IDENTIFYING SECURITY BREACHES
APPLETALK TRANSPORT AND SESSION LAYERS CONTAINMENT, ERADICATION, AND RECOVERY STRATEGIES
COORDINATING WITH LAW ENFORCEMENT UNDERSTANDING CYBER WARFARE CONCEPTS
MAINTAINING CHAIN OF CUSTODY DURING RESPONSE MILITARY DOCTRINE AND CYBER OPERATIONS
MEASURING INCIDENT IMPACT AND LESSONS LEARNED STATE-SPONSORED CYBER ATTACKS
CYBER INCIDENT SIMULATION AND TESTING HYBRID WARFARE AND THE CYBER DOMAIN
INCIDENT REPORTING STANDARDS AND PROTOCOLS ATTRIBUTION CHALLENGES IN CYBER WARFARE
PART 3: DIGITAL FORENSICS AND EVIDENCE COLLECTION CYBER ESPIONAGE AND INTELLIGENCE OPERATIONS
PRINCIPLES OF DIGITAL FORENSICS IN CYBERSECURITY LEGAL AND ETHICAL ISSUES IN CYBER CONFLICTS
ROLE OF FORENSICS IN CYBERCRIME INVESTIGATIONS DEFENDING CRITICAL INFRASTRUCTURE
COMMON FORENSIC TOOLS AND TECHNIQUES CYBERSECURITY IN THE ARMED FORCES
COLLECTING AND PRESERVING DIGITAL EVIDENCE FUTURE OF CYBER CONFLICT AND DETERRENCE
EXAMINING DISK IMAGES AND FILE SYSTEMS PART 7: AUDITING IN THE CONTEXT OF CYBERSECURITY
FORENSICS FOR EMAIL AND COMMUNICATION LOGS INTRODUCTION TO CYBERSECURITY AUDITS
CLOUD FORENSICS AND VIRTUAL ENVIRONMENTS AUDIT PRINCIPLES AND OBJECTIVES
ANALYZING MALWARE THROUGH FORENSICS TYPES OF CYBERSECURITY AUDITS
CHALLENGES IN INTERNATIONAL CYBER FORENSICS SCOPE AND PLANNING OF A SECURITY AUDIT
FORENSIC READINESS IN ORGANIZATIONS IDENTIFYING AUDIT CRITERIA AND FRAMEWORKS
PART 4: ELECTRONIC DISCOVERY IN CYBERSECURITY CONDUCTING RISK-BASED SECURITY ASSESSMENTS
INTRODUCTION TO ELECTRONIC DISCOVERY (E-DISCOVERY) EVALUATING INTERNAL CONTROLS AND COMPLIANCE
LEGAL FRAMEWORKS GOVERNING E-DISCOVERY REPORTING AND INTERPRETING AUDIT FINDINGS
E-DISCOVERY LIFECYCLE AND BEST PRACTICES COMMUNICATING WITH STAKEHOLDERS
IDENTIFICATION AND PRESERVATION OF ESI (ELECTRONICALLY STORED CONTINUOUS IMPROVEMENT AND AUDIT FOLLOW-UP
INFORMATION) PART 8: THE CYBERSECURITY AUDIT MODEL (CSAM)
COLLECTION AND PROCESSING OF DIGITAL EVIDENCE OVERVIEW OF THE CSAM FRAMEWORK
REVIEW AND ANALYSIS OF ESI CSAM’S CORE DOMAINS AND STRUCTURE
PRODUCTION AND PRESENTATION OF ESI IN LEGAL PROCEEDINGS RISK ASSESSMENT WITHIN CSAM
MANAGING E-DISCOVERY PROJECTS CONTROL DESIGN AND IMPLEMENTATION REVIEW
TOOLS FOR AUTOMATION IN E-DISCOVERY CSAM FOR GOVERNANCE AND LEADERSHIP
ETHICAL ISSUES IN E-DISCOVERY SECURITY MONITORING IN CSAM
PART 5: NATIONAL CYBERSECURITY STRATEGIES AND GOVERNANCE APPLYING CSAM IN ENTERPRISES
THE ROLE OF GOVERNMENTS IN CYBERSECURITY CSAM FOR SECTOR-SPECIFIC ENVIRONMENTS
DEVELOPING NATIONAL CYBERSECURITY FRAMEWORKS CASE STUDIES IN CSAM DEPLOYMENT
KEY COMPONENTS OF A NATIONAL CYBERSECURITY STRATEGY ENHANCING CSAM WITH AUTOMATION AND AI
INTER-AGENCY COORDINATION AND GOVERNANCE MODELS PART 9: CYBERSECURITY AWARENESS TRAINING AND BEHAVIOR
PUBLIC-PRIVATE PARTNERSHIPS IN CYBERSECURITY UNDERSTANDING THE HUMAN FACTOR IN CYBERSECURITY
CASE STUDIES OF GLOBAL CYBERSECURITY STRATEGIES DEVELOPING A CYBERSECURITY AWARENESS PROGRAM
CAPACITY BUILDING AND CYBER DEFENSE READINESS THE CYBERSECURITY AWARENESS TRAINING MODEL (CATRAM)
POLICY DEVELOPMENT AND LEGAL HARMONIZATION COMPONENTS AND DELIVERY METHODS IN CATRAM
METRICS FOR EVALUATING NATIONAL CYBERSECURITY EFFORTS BEHAVIORAL METRICS AND AWARENESS EVALUATION
INTERNATIONAL COOPERATION AND CYBER DIPLOMACY GAMIFICATION AND ENGAGEMENT STRATEGIES
PART 6: CYBER WARFARE AND NATIONAL DEFENSE CATRAM FOR DIFFERENT ORGANIZATION TYPES
ROLE-BASED SECURITY TRAINING REVIEWING CODE COLLABORATIVELY FOR SECURITY
COMBATING PHISHING AND SOCIAL ENGINEERING EDUCATING TEAMS ON SECURE CODING STANDARDS
SUSTAINING A CULTURE OF SECURITY AWARENESS CONFLICT RESOLUTION IN SECURITY DESIGN DECISIONS
PART 10: EMERGING TRENDS AND FUTURE DIRECTIONS IN CYBERSECURITY CREATING A CULTURE OF SHARED SECURITY OWNERSHIP
AUDITING PART 3: ALIGNING QUALITY WITH SECURITY
CYBERSECURITY IN THE AGE OF AI AND MACHINE LEARNING QUALITY AND SECURITY: THE FIRST FOCUS
AUTOMATION IN AUDIT AND RISK MANAGEMENT SECURE SOFTWARE ARCHITECTURE PATTERNS
AUDITING CLOUD AND HYBRID ENVIRONMENTS IMPLEMENTING DEFENSE IN DEPTH
ZERO TRUST ARCHITECTURE AND AUDIT IMPLICATIONS SECURE DESIGN PRINCIPLES
DATA PRIVACY REGULATIONS AND AUDIT COMPLIANCE SECURE CODE REVIEWS
AUDITING BLOCKCHAIN SYSTEMS STATIC CODE ANALYSIS TOOLS
CYBER RISK QUANTIFICATION AND METRICS SECURE REFACTORING PRACTICES
INTEGRATING CYBERSECURITY WITH ENTERPRISE RISK DESIGN FOR MAINTAINABILITY AND SECURITY
DEVELOPING CYBERSECURITY AUDIT COMPETENCIES BALANCING PERFORMANCE AND SECURITY
THE FUTURE OF CYBERSECURITY AUDITING AND ASSURANCE VALIDATING REQUIREMENTS FOR SECURITY
PART 4: LAUNCH AND DEPLOYMENT READINESS
SECURE SOFTWARE DEVELOPMENT GOING LIVE: WHAT TO DO ON DAY 1
FINALIZING A SECURE DEPLOYMENT CHECKLIST
TITLE OF THE BOOK: SECURE SOFTWARE DEVELOPMENT: BUILDING CODE VERIFYING SECURE CONFIGURATION
WITH INTEGRITY AND DEFENSE IN MIND SECURE SOFTWARE DISTRIBUTION PRACTICES
PART 1: FOUNDATIONS OF SECURE PROGRAMMING RISK MANAGEMENT FOR LAUNCH
WHY YOU NEED TO LEARN SECURE PROGRAMMING COMMUNICATION PROTOCOLS AND SECURITY
UNDERSTANDING THE ROLE OF SECURE CODING IN THE SOFTWARE POST-DEPLOYMENT MONITORING SETUP
LIFECYCLE LOGGING AND AUDITING STRATEGIES
KEY PRINCIPLES OF SOFTWARE SECURITY INCIDENT RESPONSE PLANNING FOR SOFTWARE RELEASES
IDENTIFYING COMMON SECURITY VULNERABILITIES CONTINUOUS INTEGRATION WITH SECURITY CONTROLS
THE COST OF INSECURE CODE PART 5: DEFINING AND MANAGING SECURITY REQUIREMENTS
ETHICS AND RESPONSIBILITY IN SECURE DEVELOPMENT SECURITY REQUIREMENTS
THE MINDSET OF A SECURE DEVELOPER GATHERING SECURITY NEEDS FROM STAKEHOLDERS
INTRODUCTION TO THREAT MODELING NON-FUNCTIONAL SECURITY REQUIREMENTS
SECURE DEVELOPMENT METHODOLOGIES ALIGNING BUSINESS GOALS WITH SECURITY POLICIES
BUILDING A CAREER IN SECURE PROGRAMMING PRIORITIZING SECURITY IN REQUIREMENTS ANALYSIS
PART 2: COLLABORATION AND COMMUNICATION IN SECURE CREATING USE AND MISUSE CASES
DEVELOPMENT DOCUMENTING REQUIREMENTS FOR AUDIT READINESS
CODING: NOT A SOLITARY PRACTICE ELICITING SECURITY REQUIREMENTS FOR APIS
BUILDING SECURE TEAMS AND PROCESSES BRIDGING THE GAP BETWEEN DEV AND SEC TEAMS
COMMUNICATING SECURITY EXPECTATIONS EVALUATING SECURITY REQUIREMENTS ACROSS PROJECTS
INTEGRATING SECURITY WITH AGILE PRACTICES PART 6: DESIGN THINKING AND SECURITY ARCHITECTURE
ROLE OF PRODUCT OWNERS AND ANALYSTS IN SECURITY COLLABORATING AT THE WHITEBOARD: SECURITY AND QUALITY ARE NO
DOCUMENTING SECURE CODE PRACTICES ACCIDENT
SECURE SOFTWARE DESIGN PATTERNS VULNERABILITY SCANNING TOOLS
ESTABLISHING A SECURE SDLC FRAMEWORK REMEDIATION AND RETESTING BEST PRACTICES
SECURE DATA FLOW DIAGRAMS PART 10: MAINTENANCE, EVOLUTION, AND CAREER SUSTAINABILITY
IDENTIFYING ARCHITECTURAL WEAK POINTS AFTER THE GLORY: MAINTAINING IT 9 TO 5
APPLYING THREAT MODELING IN DESIGN PATCH MANAGEMENT AND SECURE UPDATES
BUILDING SECURE SYSTEMS WITH MICROSERVICES LOGGING, MONITORING, AND INCIDENT RESPONSE
SECURE INTERFACE AND API DESIGN HANDLING VULNERABILITIES IN LEGACY CODE
AUTHENTICATION AND AUTHORIZATION FRAMEWORKS KEEPING UP WITH EVOLVING THREATS
SECURE THIRD-PARTY INTEGRATION PRACTICES THE SECURITY CONSULTING COMPANIES: KNOW WHO’S OUT THERE
PART 7: SELECTING AND USING DEVELOPMENT TOOLS SECURELY COLLABORATING WITH SECURITY RESEARCHERS
DEVELOPMENT TOOLS: HOW TO CHOOSE WISELY THE HORIZON: MAINTAINING YOUR PROFESSION
SECURE IDE CONFIGURATION CONTINUING EDUCATION AND CERTIFICATIONS
SECURE SOURCE CONTROL PRACTICES BECOMING A LEADER IN SECURE SOFTWARE DEVELOPMENT
MANAGING SECRETS AND CREDENTIALS
AUTOMATED SECURITY CHECKS IN BUILD TOOLS IOT SECURITY
TOOLCHAIN SECURITY HARDENING
MONITORING DEVELOPMENT ENVIRONMENTS TITLE OF THE BOOK: IOT SECURITY: SAFEGUARDING THE INTERNET OF
SECURE CODE LINTING AND FORMATTING TOOLS THINGS FROM EDGE TO CLOUD
RISKS OF USING OPEN SOURCE AND HOW TO MITIGATE THEM PART 1: FOUNDATIONS OF THE INTERNET OF THINGS AND ITS RISKS
SECURE PACKAGE AND DEPENDENCY MANAGEMENT A BRAVE NEW WORLD
PART 8: WRITING CODE WITH SECURITY IN MIND UNDERSTANDING THE IOT ECOSYSTEM
CODING IN THE CUBE: LET'S GET TO WORK LAYERS OF IOT ARCHITECTURE
INPUT VALIDATION AND SANITIZATION THE EXPLOSION OF CONNECTED DEVICES
PREVENTING SQL INJECTION SECURITY CHALLENGES IN A HYPERCONNECTED WORLD
PREVENTING CROSS-SITE SCRIPTING (XSS) INTRODUCTION TO IOT RISK ASSESSMENT
SECURE SESSION MANAGEMENT THE ROLE OF SECURITY IN SMART ENVIRONMENTS
CRYPTOGRAPHY BEST PRACTICES KEY SECURITY GOALS FOR IOT SYSTEMS
EXCEPTION HANDLING WITHOUT LEAKING INFO LEGAL AND ETHICAL ISSUES IN IOT DEPLOYMENTS
MANAGING ACCESS CONTROL IN CODE GLOBAL PERSPECTIVES ON IOT SECURITY
AVOIDING INSECURE DEFAULTS PART 2: THREATS, VULNERABILITIES, AND COUNTERMEASURES
PROTECTING AGAINST RACE CONDITIONS AND TIMING ATTACKS VULNERABILITIES, ATTACKS, AND COUNTERMEASURES
PART 9: TESTING AND VALIDATING SECURITY COMMON ATTACK VECTORS IN IOT
TESTING DEVICE-LEVEL EXPLOITS AND HARDWARE RISKS
UNIT TESTING FOR SECURITY FIRMWARE VULNERABILITIES AND PATCH MANAGEMENT
AUTOMATED SECURITY TESTING ATTACKS ON COMMUNICATION PROTOCOLS
PENETRATION TESTING IN DEV LIFECYCLE BOTNETS AND IOT-BASED DDOS ATTACKS
DYNAMIC APPLICATION SECURITY TESTING (DAST) COUNTERMEASURE DESIGN PRINCIPLES
FUZZ TESTING FOR INPUT ROBUSTNESS DEFENSE IN DEPTH FOR IOT NETWORKS
LOAD TESTING FOR SECURITY FLAWS CASE STUDIES IN IOT EXPLOITS
SECURITY REGRESSION TESTING THREAT INTELLIGENCE AND IOT
PART 3: ENGINEERING SECURITY INTO IOT DEVICES FEDERATION AND SINGLE SIGN-ON FOR IOT
SECURITY ENGINEERING FOR IOT DEVELOPMENT TRUST ANCHORS AND DEVICE TRUSTWORTHINESS
SECURE DEVELOPMENT LIFECYCLE FOR IOT SCALABLE IAM SYSTEMS FOR SMART CITIES
HARDWARE ROOT OF TRUST AND SECURE BOOT ACCESS GOVERNANCE IN INDUSTRIAL IOT
SECURE CODING FOR EMBEDDED SYSTEMS PART 7: PRIVACY IN THE AGE OF SMART DEVICES
DEVICE AUTHENTICATION TECHNIQUES MITIGATING IOT PRIVACY CONCERNS
DESIGNING FOR TAMPER RESISTANCE PRIVACY BY DESIGN IN IOT DEVELOPMENT
ONBOARDING AND PROVISIONING SECURELY DATA MINIMIZATION AND ANONYMIZATION
PROTECTING FIRMWARE INTEGRITY PRIVACY RISKS IN CONSUMER IOT
SECURE DEBUGGING AND TESTING PRACTICES USER CONSENT AND TRANSPARENCY IN SMART DEVICES
SECURE PRODUCT RETIREMENT AND DECOMMISSIONING MANAGING DATA OWNERSHIP AND CONTROL
PART 4: MANAGING THE IOT SECURITY LIFECYCLE REGULATIONS AND PRIVACY FRAMEWORKS
THE IOT SECURITY LIFECYCLE SECURE LOCATION AND BIOMETRIC DATA HANDLING
PLANNING FOR SECURE DEPLOYMENT CROSS-BORDER DATA PRIVACY CHALLENGES
SECURITY IN THE MANUFACTURING PHASE BUILDING TRUST THROUGH PRIVACY ASSURANCE
SECURE CONFIGURATION MANAGEMENT PART 8: IOT COMPLIANCE AND GOVERNANCE
ONGOING DEVICE MONITORING AND UPDATES SETTING UP A COMPLIANCE MONITORING PROGRAM FOR THE IOT
MANAGING KEY ROTATION AND CREDENTIAL EXPIRY INTRODUCTION TO IOT GOVERNANCE MODELS
LIFECYCLE AUTOMATION FOR SECURITY EVENTS DEVELOPING A SECURITY POLICY FOR IOT
PLANNING FOR END-OF-LIFE DEVICE SECURITY INDUSTRY STANDARDS AND FRAMEWORKS
SUPPLY CHAIN RISK MANAGEMENT NIST AND ISO GUIDELINES FOR IOT
CONTINUOUS SECURITY IMPROVEMENT IN IOT GDPR AND IOT SECURITY
PART 5: CRYPTOGRAPHY FOR IOT DEVICES MONITORING TOOLS FOR SECURITY COMPLIANCE
CRYPTOGRAPHIC FUNDAMENTALS FOR IOT SECURITY ENGINEERING AUDITING AND REPORTING IN IOT ENVIRONMENTS
LIGHTWEIGHT CRYPTOGRAPHY FOR CONSTRAINED DEVICES INTERNAL CONTROLS AND RISK ASSESSMENTS
SYMMETRIC AND ASYMMETRIC ENCRYPTION IN IOT PREPARING FOR REGULATORY INSPECTIONS
KEY GENERATION AND DISTRIBUTION PART 9: SECURING THE IOT CLOUD INFRASTRUCTURE
SECURE KEY STORAGE AND MANAGEMENT CLOUD SECURITY FOR THE IOT
DIGITAL SIGNATURES AND MESSAGE INTEGRITY IOT CLOUD ARCHITECTURE AND SERVICES
RANDOM NUMBER GENERATION CHALLENGES DEVICE-TO-CLOUD DATA PROTECTION
SECURE PROTOCOL DESIGN USING CRYPTOGRAPHY AUTHENTICATION AND AUTHORIZATION IN THE CLOUD
CERTIFICATE MANAGEMENT IN IOT CONTAINER SECURITY FOR IOT APPLICATIONS
QUANTUM-RESISTANT CRYPTOGRAPHY FOR FUTURE-PROOFING SECURE APIS FOR CLOUD-IOT INTERACTION
PART 6: IDENTITY, TRUST, AND ACCESS CONTROL MONITORING AND LOGGING IN IOT CLOUDS
IDENTITY AND ACCESS MANAGEMENT SOLUTIONS FOR THE IOT HYBRID CLOUD AND EDGE SECURITY CONSIDERATIONS
ESTABLISHING DEVICE IDENTITY THIRD-PARTY CLOUD PROVIDER EVALUATION
USER IDENTITY MANAGEMENT IN IOT PLATFORMS SECURING DATA LAKES AND IOT ANALYTICS
ROLE-BASED ACCESS CONTROL FOR IOT PART 10: INCIDENT RESPONSE AND FUTURE TRENDS
ATTRIBUTE-BASED ACCESS CONTROL MODELS IOT INCIDENT RESPONSE
ZERO TRUST ARCHITECTURE IN IOT ENVIRONMENTS PREPARING A RESPONSE PLAN FOR IOT BREACHES
DETECTING ANOMALIES IN IOT BEHAVIOR CIS CONTROLS FOR CYBER DEFENSE
FORENSIC ANALYSIS OF COMPROMISED DEVICES ITIL FOR SERVICE MANAGEMENT IN COMPLIANCE
INCIDENT COMMUNICATION AND CONTAINMENT BENCHMARKING AGAINST INDUSTRY LEADERS
LESSONS LEARNED AND POLICY UPDATES RISK-BASED APPROACHES TO STANDARDS
SECURITY AUTOMATION FOR IOT DEFENSE CUSTOMIZING FRAMEWORKS TO FIT YOUR ORGANIZATION
AI AND MACHINE LEARNING FOR IOT SECURITY CONTINUOUS IMPROVEMENT THROUGH BEST PRACTICES
EMERGING TRENDS IN IOT THREATS PART 4: MANAGING RISKS IN CYBERSECURITY COMPLIANCE
THE FUTURE OF SECURE IOT SYSTEMS RISK MANAGEMENT
IDENTIFYING SECURITY RISKS
COMPLIANCE IN CYBERSECURITY PERFORMING RISK ASSESSMENTS
RISK TOLERANCE AND ACCEPTANCE
TITLE OF THE BOOK: MASTERING COMPLIANCE IN CYBERSECURITY: THREAT MODELING TECHNIQUES
STRATEGIES, STANDARDS, AND SECURE OPERATIONS RISK MITIGATION STRATEGIES
PART 1: FOUNDATIONS OF CYBERSECURITY COMPLIANCE REGULATORY RISKS AND BUSINESS CONTINUITY
DEFINITION AND IMPORTANCE QUANTITATIVE VS. QUALITATIVE RISK ANALYSIS
THE ROLE OF COMPLIANCE IN INFORMATION SECURITY COMMUNICATING RISK TO STAKEHOLDERS
EVOLUTION OF CYBERSECURITY COMPLIANCE DOCUMENTING AND REVIEWING RISK DECISIONS
ORGANIZATIONAL BENEFITS OF COMPLIANCE PROGRAMS PART 5: IMPLEMENTING CONTROLS AND POLICIES
COMPLIANCE VS. SECURITY: UNDERSTANDING THE DIFFERENCE SECURITY CONTROLS
LEGAL AND ETHICAL DIMENSIONS OF COMPLIANCE ADMINISTRATIVE CONTROLS
COMMON COMPLIANCE CHALLENGES AND PITFALLS TECHNICAL CONTROLS
INTEGRATING COMPLIANCE INTO CYBERSECURITY STRATEGY PHYSICAL SECURITY CONTROLS
BUILDING A CULTURE OF COMPLIANCE ROLE-BASED ACCESS CONTROLS
COMPLIANCE IN A GLOBAL CONTEXT MULTI-FACTOR AUTHENTICATION CONTROLS
PART 2: REGULATORY FRAMEWORKS AND LEGAL MANDATES POLICIES AND PROCEDURES
REGULATORY FRAMEWORKS WRITING AND MAINTAINING EFFECTIVE POLICIES
UNDERSTANDING GDPR AND ITS IMPLICATIONS POLICY ENFORCEMENT AND COMPLIANCE
HIPAA COMPLIANCE FOR HEALTH DATA SECURITY CHANGE MANAGEMENT AND CONTROL DOCUMENTATION
PCI DSS REQUIREMENTS AND PRACTICES PART 6: INCIDENT PLANNING, MONITORING, AND RESPONSE
SOX COMPLIANCE IN THE CORPORATE ENVIRONMENT INCIDENT RESPONSE PLANNING
CCPA AND OTHER STATE-LEVEL DATA PRIVACY LAWS BUILDING AN INCIDENT RESPONSE TEAM
FERPA AND STUDENT DATA PROTECTION CREATING AND TESTING RESPONSE PLAYBOOKS
GOVERNMENT AND MILITARY COMPLIANCE MANDATES TYPES OF SECURITY INCIDENTS
LEGAL LIABILITIES FOR NON-COMPLIANCE POST-INCIDENT REVIEW AND COMPLIANCE UPDATES
MAPPING REGULATIONS TO BUSINESS NEEDS AUDITING AND MONITORING
PART 3: INDUSTRY STANDARDS AND BEST PRACTICES CONTINUOUS COMPLIANCE MONITORING
INDUSTRY STANDARDS AND BEST PRACTICES AUTOMATED AUDITING TOOLS
ISO/IEC 27001 IMPLEMENTATION INTERNAL AND EXTERNAL AUDIT PREPARATION
NIST CYBERSECURITY FRAMEWORK REGULATORY REPORTING OBLIGATIONS
COBIT FOR GOVERNANCE AND MANAGEMENT PART 7: DATA PROTECTION AND ACCESSIBILITY
DATA PROTECTION POPULAR CYBERSECURITY COMPLIANCE CERTIFICATIONS
ENCRYPTION STANDARDS AND TECHNIQUES BUILDING A CAREER IN CYBERSECURITY COMPLIANCE
DATA CLASSIFICATION AND HANDLING POLICIES PREPARING FOR THE FUTURE OF CYBERSECURITY REGULATIONS
SECURE DATA DESTRUCTION AND DISPOSAL
BACKUP AND DISASTER RECOVERY WORLD LITERATURE
ACCESSIBILITY COMPLIANCE
WEB ACCESSIBILITY GUIDELINES (WCAG) TITLE OF THE BOOK: EXPLORING WORLD LITERATURE: A JOURNEY
SECTION 508 AND ADA REQUIREMENTS THROUGH GLOBAL VOICES AND NARRATIVES
INCLUSIVE DESIGN AND COMPLIANCE INTEGRATION PART 1: FOUNDATIONS OF FICTION AND GLOBAL STORYTELLING
TESTING FOR ACCESSIBILITY STANDARDS UNDERSTANDING THE SHAPING DEVICES OF FICTION
PART 8: MANAGING THIRD PARTIES AND CLOUD COMPLIANCE PLOT, SETTING, AND STRUCTURE ACROSS CULTURES
THIRD-PARTY RISK MANAGEMENT CHARACTERIZATION AND CONFLICT IN WORLD NARRATIVES
VENDOR EVALUATION AND ONBOARDING THEMES AND MOTIFS IN GLOBAL LITERATURE
THIRD-PARTY AUDITS AND ASSESSMENTS NARRATORS AND POINTS OF VIEW IN FICTION
COMPLIANCE CLAUSES IN CONTRACTS LITERARY GENRES AND CROSS-CULTURAL VARIATIONS
MANAGING CLOUD SECURITY RISKS SYMBOLS AND ARCHETYPES IN INTERNATIONAL TEXTS
SHARED RESPONSIBILITY IN THE CLOUD COMPARATIVE LITERARY TECHNIQUES
COMPLIANCE WITH CLOUD PROVIDERS THE ROLE OF ORAL TRADITION IN GLOBAL STORIES
USING CLOUD COMPLIANCE TOOLS LITERARY ANALYSIS IN A GLOBALIZED CONTEXT
CROSS-BORDER DATA TRANSFER COMPLIANCE PART 2: INTO THE LITERATURE OF ASIA
CLOUD DATA RESIDENCY AND LEGAL CONSIDERATIONS HISTORICAL FOUNDATIONS OF ASIAN LITERATURE
PART 9: COMPLIANCE TOOLS AND EMERGING TECHNOLOGIES CLASSICAL CHINESE POETRY AND PHILOSOPHY
COMPLIANCE MANAGEMENT TOOLS INDIAN EPICS AND SANSKRIT TRADITION
GRC PLATFORMS (GOVERNANCE, RISK, AND COMPLIANCE) JAPANESE HAIKU AND NARRATIVE FORMS
AUTOMATED COMPLIANCE TRACKING SYSTEMS SOUTHEAST ASIAN FOLKTALES AND LEGENDS
SIEM (SECURITY INFORMATION AND EVENT MANAGEMENT) SYSTEMS PERSIAN POETRY AND MYSTICAL LITERATURE
INTEGRATION OF SIEM WITH OTHER TOOLS CONTEMPORARY ASIAN FICTION AND IDENTITY
VULNERABILITY MANAGEMENT TOOLS ASIAN DIASPORA VOICES IN LITERATURE
PATCH MANAGEMENT AND COMPLIANCE ASIAN WOMEN WRITERS AND FEMINIST THEMES
SECURITY CONFIGURATION MANAGEMENT LITERATURE AND SPIRITUALITY IN ASIA
PENETRATION TESTING AND COMPLIANCE CHECKS PART 3: INTO THE LITERATURE OF AUSTRALIA AND THE PACIFIC
ROLE OF AI IN COMPLIANCE AUTOMATION ABORIGINAL ORAL LITERATURE AND MYTHS
PART 10: TRAINING, CERTIFICATION, AND FUTURE COMPLIANCE EARLY COLONIAL WRITINGS OF AUSTRALIA
STAYING UP-TO-DATE AUSTRALIAN IDENTITY IN MODERN FICTION
TRACKING REGULATORY CHANGES PACIFIC ISLANDER STORYTELLING TRADITIONS
BUILDING A LEARNING ORGANIZATION ENVIRONMENTAL THEMES IN OCEANIC LITERATURE
CYBERSECURITY AWARENESS TRAINING WOMEN’S PERSPECTIVES IN PACIFIC LITERATURE
TRAINING STRATEGIES AND DELIVERY METHODS LITERATURE OF DISPLACEMENT AND RESILIENCE
EMPLOYEE TESTING AND KNOWLEDGE CHECKS INDIGENOUS RIGHTS AND RESISTANCE IN TEXTS
CERTIFICATION PROGRAMS POSTCOLONIAL VOICES IN THE PACIFIC
LANGUAGE AND HYBRIDITY IN OCEANIC WRITING INDIGENOUS VOICES AND REPRESENTATION
PART 4: INTO THE LITERATURE OF AFRICA THE BOOM GENERATION OF LATIN AMERICAN WRITERS
AFRICAN ORAL LITERATURE AND GRIOTS CONTEMPORARY LATIN AMERICAN POETRY
ANCIENT AFRICAN TEXTS AND HIEROGLYPHS LATIN AMERICAN DRAMA AND PERFORMANCE LITERATURE
COLONIALISM AND ITS LITERARY IMPACT URBANIZATION AND POLITICAL THEMES IN MODERN FICTION
POSTCOLONIAL AFRICAN FICTION AND POETRY PART 8: GLOBAL MOVEMENTS AND LITERARY EXCHANGE
AFRICAN WOMEN'S LITERATURE AND EMPOWERMENT POSTCOLONIAL THEORY AND WORLD LITERATURE
LITERATURE OF APARTHEID AND LIBERATION GLOBALIZATION IN MODERN FICTION
FOLKTALES, PROVERBS, AND WISDOM NARRATIVES MIGRATION AND THE TRANSNATIONAL NOVEL
THE AFRICAN DIASPORA IN GLOBAL LITERATURE LITERARY TRANSLATION AND CULTURAL INTERPRETATION
CONTEMPORARY AFRICAN AUTHORS AND THEMES DIASPORA WRITING ACROSS CONTINENTS
SPIRITUALITY AND MYTH IN AFRICAN WRITING LITERATURE OF EXILE AND RETURN
PART 5: INTO THE LITERATURE OF EUROPE COSMOPOLITANISM IN LITERATURE
ANCIENT GREEK AND ROMAN FOUNDATIONS CROSS-CULTURAL HYBRIDITY IN NARRATIVE
MEDIEVAL EUROPEAN NARRATIVES GLOBAL CONFLICTS AND PEACE NARRATIVES
RENAISSANCE AND HUMANIST TEXTS LITERATURE AND HUMAN RIGHTS
ENLIGHTENMENT IDEALS IN EUROPEAN LITERATURE PART 9: THEMATIC EXPLORATIONS ACROSS REGIONS
ROMANTICISM AND REVOLUTION IN EUROPE LOVE AND TRAGEDY IN GLOBAL LITERATURE
REALISM AND NATURALISM MOVEMENTS WAR AND PEACE: UNIVERSAL STORIES
MODERNISM AND POSTMODERNISM IN EUROPEAN FICTION NATURE AND ECOCRITICISM ACROSS CULTURES
WAR LITERATURE AND EUROPEAN HISTORY FAITH AND SPIRITUALITY IN LITERARY FORMS
CONTEMPORARY EUROPEAN VOICES POWER, POLITICS, AND PROTEST IN FICTION
MIGRATION AND IDENTITY IN EUROPEAN TEXTS GENDER ROLES AND IDENTITY IN WORLD TEXTS
PART 6: INTO THE LITERATURE OF NORTH AMERICA CHILDHOOD AND COMING OF AGE AROUND THE WORLD
NATIVE AMERICAN ORAL LITERATURE FAMILY AND KINSHIP IN CULTURAL CONTEXT
COLONIAL AND REVOLUTIONARY WRITINGS THE STRANGER AND THE OUTSIDER
AMERICAN ROMANTICISM AND GOTHIC FICTION TECHNOLOGY AND THE FUTURE IN GLOBAL STORIES
THE HARLEM RENAISSANCE AND BLACK LITERATURE PART 10: ENGAGING WITH WORLD LITERATURE TODAY
CANADIAN LITERATURE AND CULTURAL MOSAIC TEACHING WORLD LITERATURE IN A MODERN CLASSROOM
U.S. LITERATURE IN THE CIVIL WAR ERA BUILDING A GLOBAL READING LIST
MODERNISM IN AMERICAN LITERATURE THE ROLE OF LITERARY FESTIVALS AND TRANSLATION AWARDS
CONTEMPORARY LATINO LITERATURE READING ACROSS BORDERS: EMPATHY AND IMAGINATION
IMMIGRANT STORIES AND HYPHENATED IDENTITIES DIGITAL LITERATURE AND GLOBAL NARRATIVES
NATURE AND ENVIRONMENT IN NORTH AMERICAN WRITING LITERARY CRITICISM IN A GLOBAL ERA
PART 7: INTO THE LITERATURE OF LATIN AMERICA PUBLISHING AND CIRCULATING WORLD LITERATURE
PRE-COLUMBIAN MYTH AND ORAL TRADITIONS THE FUTURE OF WORLD LITERATURE STUDIES
COLONIAL NARRATIVES OF LATIN AMERICA LITERATURE AS A TOOL FOR GLOBAL UNDERSTANDING
MAGICAL REALISM AND ITS ORIGINS BECOMING A GLOBAL READER AND THINKER
LITERATURE OF REVOLUTION AND RESISTANCE
GENDER AND IDENTITY IN LATIN AMERICAN TEXTS RIZAL'S LIFE, WORKS, AND WRITINGS
RIZAL’S INTELLECTUAL INFLUENCES
TITLE OF THE BOOK: JOSE RIZAL: LIFE, WORKS, AND WRITINGS OF THE THE BERLIN SCIENTIFIC COMMUNITY
PHILIPPINE NATIONAL HERO NOLI ME TANGERE PUBLISHED IN BERLIN (1887)
PART 1: ROOTS OF A HEROIC SOUL THEMES AND MESSAGES IN THE NOVEL
ADVENT OF A NATIONAL HERO EUROPEAN RECEPTION OF THE NOVEL
BIRTH AND FAMILY BACKGROUND RIZAL’S VIEWS ON REFORM AND REVOLUTION
LIFE IN CALAMBA: SOCIAL AND CULTURAL LANDSCAPE REACTION OF THE SPANISH FRIARS
CHILDHOOD YEARS IN CALAMBA PART 5: TRAVELS AND ADVOCACY
EARLY EDUCATION IN CALAMBA AND BIÑAN RIZAL’S GRAND TOUR OF EUROPE WITH VIOLA (1887)
EARLY INFLUENCES AND FORMATIVE YEARS POLITICAL WRITINGS AND CORRESPONDENCE
RIZAL’S CREATIVE BEGINNINGS VISIT TO AUSTRIA AND ITALY
INTELLECTUAL AWAKENING IN BOYHOOD RIZAL’S OBSERVATIONS ON EUROPEAN SOCIETIES
LITERARY SPARKS AND EARLY POEMS FIRST HOMECOMING TO THE PHILIPPINES (1887–1888)
CULTIVATING PATRIOTISM IN YOUTH MEDICAL PRACTICE AND SOCIAL ADVOCACY
PART 2: ACADEMIC EXCELLENCE AND AWAKENING ATTACKS FROM THE CLERGY
SCHOLASTIC TRIUMPHS AT ATENEO DE MANILA (1872–1877) ESTABLISHMENT OF LA LIGA FILIPINA
ARTISTIC AND LITERARY DEVELOPMENT AT ATENEO IN HONG KONG AND MACAO (1888)
RIZAL AT THE UNIVERSITY OF SANTO TOMAS (1877–1882) RIZAL’S FAMILY LIFE IN HONG KONG
MEDICAL STUDIES AND SOCIAL AWARENESS PART 6: EAST ASIA AND THE AMERICAS
EARLY WRITINGS AND GROWING ACTIVISM ROMANTIC INTERLUDE IN JAPAN (1888)
CONFLICT WITH DOMINICAN FRIARS LIFE AND CULTURE IN TOKYO
AWAKENING TO COLONIAL INJUSTICE ROMANCE WITH O-SEI SAN
RIZAL’S FIRST LOVE: SEGUNDA KATIGBAK RIZAL'S REFLECTIONS ON JAPANESE SOCIETY
LEAVING THE PHILIPPINES FOR SPAIN RIZAL’S VISIT TO THE UNITED STATES (1888)
REASONS BEHIND THE DEPARTURE OBSERVATIONS ON AMERICAN SOCIETY AND RACISM
PART 3: RIZAL IN SPAIN AND SCHOLARLY PURSUITS JOURNEY ACROSS THE U.S.
IN SUNNY SPAIN (1882–1885) RIZAL IN LONDON (1888–1889)
LIFE AS A STUDENT IN MADRID RESEARCH ON PHILIPPINE HISTORY
ACADEMIC ACHIEVEMENTS IN SPAIN ANNOTATING MORGA’S SUCESOS DE LAS ISLAS FILIPINAS
FILIPINO COMMUNITY IN EUROPE PART 7: EUROPE REVISITED
RIZAL AND THE PROPAGANDA MOVEMENT RIZAL’S SECOND SOJOURN IN PARIS (1889)
PERSONAL STRUGGLES IN A FOREIGN LAND UNIVERSAL EXPOSITION OF 1889
POLITICAL CLIMATE IN SPAIN RIZAL’S CONTRIBUTIONS TO LA SOLIDARIDAD
RISE OF NATIONALIST SENTIMENTS RIZAL’S LITERARY AND HISTORICAL RESEARCH
LETTERS TO FAMILY AND FRIENDS RIZAL’S LIFE IN BRUSSELS, BELGIUM (1890)
FIRST PUBLICATIONS IN SPANISH PRESS POLITICAL TENSIONS IN THE FILIPINO COMMUNITY
PART 4: EUROPEAN SOJOURN AND FIRST NOVEL MISFORTUNES IN MADRID (1890–1891)
PARIS TO BERLIN JOURNEY (1885–1887) PERSONAL CONFLICTS AND FINANCIAL STRUGGLES
RIZAL'S STUDIES IN OPHTHALMOLOGY BIARRITZ VACATION AND ROMANCE WITH NELLY BOUSTEAD (1891)
WRITING OF NOLI ME TANGERE COMPLETION OF EL FILIBUSTERISMO
PART 8: THE SECOND NOVEL AND RETURN TO ASIA MASTERING TOUCH TYPING TECHNIQUES
EL FILIBUSTERISMO PUBLISHED IN GHENT (1891) LEARNING THE NUMERIC KEYPAD
ANALYSIS AND THEMES OF EL FILIBUSTERISMO IMPROVING SPEED AND ACCURACY
RIZAL AS A REVOLUTIONARY THINKER KEYBOARD SHORTCUTS FOR EFFICIENCY
RETURN TO HONG KONG AND MEDICAL PRACTICE (1891–1892) UNDERSTANDING INPUT DEVICES
RIZAL AS AN OPHTHALMIC SURGEON NAVIGATING OPERATING SYSTEMS
ESTABLISHING A MEDICAL CLINIC ACCESSING “HELP” FOR ANSWERS
EFFORTS TO ESTABLISH A FILIPINO COLONY IN NORTH BORNEO CUSTOMIZING USER INTERFACES
RIZAL’S CONTINUED WRITINGS AND REFORM PLANS ACCESSIBILITY FEATURES IN COMPUTERS
RETURN TO MANILA AND ARREST PART 2: DIGITAL COMMUNICATION AND SCHEDULING
FOUNDING OF LA LIGA FILIPINA COMMUNICATING AND SCHEDULING AT SCHOOL AND WORK
PART 9: DAPITAN EXILE AND FINAL TRAVELS USING EMAIL EFFECTIVELY
EXILE IN DAPITAN (1892–1896) MANAGING CALENDARS AND APPOINTMENTS
RIZAL’S LIFE AND WORK IN DAPITAN INTEGRATING COMMUNICATION TOOLS
CONTRIBUTIONS TO EDUCATION AND PUBLIC HEALTH SETTING UP VIDEO CONFERENCING
RIZAL’S AGRICULTURAL AND SCIENTIFIC WORK ONLINE COLLABORATION TOOLS
ENGAGEMENT WITH JOSEPHINE BRACKEN CLOUD-BASED SCHEDULING APPLICATIONS
RIZAL’S ROLE IN THE KATIPUNAN DEBATE REAL-TIME MESSAGING TOOLS
LAST TRIP ABROAD (1896) MANAGING DIGITAL NOTIFICATIONS
ARREST IN BARCELONA AND RETURN TO THE PHILIPPINES TASK MANAGEMENT AND REMINDERS
INTERROGATION AND IMPRISONMENT IN FORT SANTIAGO PART 3: WRITTEN COMMUNICATION IN THE DIGITAL AGE
WRITINGS DURING IMPRISONMENT COMMUNICATING CLEARLY WITH LETTERS
PART 10: THE FINAL DAYS AND LASTING LEGACY FORMATTING BUSINESS LETTERS
LAST HOMECOMING AND TRIAL WRITING PROFESSIONAL EMAILS
RIZAL’S TRIAL BY THE SPANISH MILITARY COURT USING TEMPLATES AND STYLES
DEFENSE AND FINAL STATEMENTS EDITING AND PROOFREADING TOOLS
FAREWELL TO FAMILY AND FRIENDS WRITING MEMOS AND ANNOUNCEMENTS
MI ULTIMO ADIOS: A HERO’S FAREWELL UNDERSTANDING TONE IN DIGITAL COMMUNICATION
MARTYRDOM AT BAGUMBAYAN (DECEMBER 30, 1896) WRITING FOR INTERNAL COMMUNICATION
REACTION TO RIZAL’S DEATH WRITING FOR EXTERNAL COMMUNICATION
RIZAL’S LEGACY IN PHILIPPINE HISTORY ETHICAL WRITING PRACTICES
RIZAL IN LITERATURE, MONUMENTS, AND MEMORY PART 4: DOCUMENT DESIGN AND REPORTING
RELEVANCE OF RIZAL’S IDEAS IN THE MODERN WORLD CREATING EFFECTIVE REPORTS
STRUCTURING REPORT LAYOUTS
COMPUTER APPLICATIONS USING HEADINGS AND SUBHEADINGS
CITING SOURCES AND REFERENCING
TITLE OF THE BOOK: COMPUTER APPLICATIONS: MASTERY IN DIGITAL INSERTING GRAPHICS AND CHARTS
COMMUNICATION, PRODUCTIVITY, AND DATA MANAGEMENT APPLYING REPORT TEMPLATES
PART 1: KEYBOARDING AND NAVIGATION SKILLS WRITING EXECUTIVE SUMMARIES
MASTERING THE ALPHABETIC KEYS COLLABORATIVE REPORT WRITING
REVIEWING AND REVISING REPORTS ADDING AND EDITING RECORDS
EXPORTING REPORTS TO VARIOUS FORMATS DESIGNING FORMS FOR DATA ENTRY
PART 5: ORGANIZING AND DISPLAYING INFORMATION CREATING AND RUNNING QUERIES
ORGANIZING INFORMATION IN TABLES CREATING REPORTS FROM DATABASES
DESIGNING FUNCTIONAL TABLES USING DATABASES TO ANALYZE DATA EFFICIENTLY AND EFFECTIVELY
SORTING AND FILTERING TABLE DATA DATABASE MANAGEMENT AND MAINTENANCE
ENHANCING INFORMATION IN TABLES INTEGRATING DATABASES WITH OTHER APPLICATIONS
INSERTING AND FORMATTING CHARTS PART 9: PRODUCTIVITY AND COMMUNICATION INTEGRATION
USING VISUAL AIDS IN TABLES MANAGING COMMUNICATIONS AND SCHEDULES
TABLE DATA VALIDATION INTEGRATING EMAIL WITH CALENDARS
COMBINING TABLES WITH TEXT SYNCHRONIZING DEVICES AND APPLICATIONS
LINKING TABLES ACROSS DOCUMENTS TASK AND WORKFLOW AUTOMATION
PRINTING AND SHARING TABULAR DATA MANAGING WRITTEN COMMUNICATION
PART 6: VISUAL PRESENTATION AND STORYTELLING ORGANIZING DIGITAL DOCUMENTS
PRESENTING WITH ELECTRONIC PRESENTATIONS MANAGING CONTACTS AND MAILING LISTS
SLIDE DESIGN PRINCIPLES DIGITAL FILE SHARING AND PERMISSIONS
CHOOSING EFFECTIVE TEMPLATES ARCHIVING AND BACKUP SYSTEMS
ADDING MULTIMEDIA ELEMENTS ENSURING COMMUNICATION SECURITY
COMMUNICATING EFFECTIVELY THROUGH ENHANCED ELECTRONIC PART 10: ADVANCED TOOLS AND PROFESSIONAL DEVELOPMENT
PRESENTATIONS REPORTING WITH STYLE
INTERACTIVE PRESENTATION FEATURES CREATING PROFESSIONAL DOCUMENTS
DELIVERING PRESENTATIONS WITH CONFIDENCE BUILDING DIGITAL PORTFOLIOS
AUDIENCE ENGAGEMENT TOOLS UNDERSTANDING PRODUCTIVITY SUITES
COLLABORATING ON PRESENTATIONS CUSTOMIZING TEMPLATES FOR EFFICIENCY
EXPORTING AND SHARING PRESENTATIONS ENHANCING PRESENTATIONS WITH ANALYTICS
PART 7: SPREADSHEET MANAGEMENT AND ANALYSIS USING ADD-ONS AND PLUGINS
PREPARING WORKSHEETS STAYING CURRENT WITH SOFTWARE UPDATES
FORMATTING CELLS AND RANGES CERTIFICATION AND SKILL DEVELOPMENT
USING FORMULAS AND FUNCTIONS PREPARING FOR THE FUTURE OF COMPUTER APPLICATIONS
CONDITIONAL FORMATTING TECHNIQUES
ANALYZING DATA WITH CHARTS ETHICAL AND LEGAL ISSUES IN CYBERSECURITY
PREPARING AND ANALYZING FINANCIAL WORKSHEETS
BUDGETING AND FORECASTING TOOLS TITLE OF THE BOOK: ETHICAL AND LEGAL ISSUES IN CYBERSECURITY:
AUTOMATING TASKS IN SPREADSHEETS PRINCIPLES, PRACTICES, AND POLICY PERSPECTIVES
PROTECTING WORKSHEET DATA PART 1: FOUNDATIONS OF CYBERETHICS
COLLABORATIVE SPREADSHEET EDITING INTRODUCTION TO CYBERETHICS
PART 8: INTRODUCTION TO DATABASES PRINCIPLES OF ETHICS IN THE DIGITAL AGE
LEARNING DATABASE BASICS HISTORICAL DEVELOPMENT OF TECHNOLOGY ETHICS
UNDERSTANDING DATA STRUCTURES CORE ETHICAL THEORIES APPLIED TO CYBERSECURITY
CREATING SIMPLE DATABASES DIGITAL CITIZENSHIP AND RESPONSIBILITY
PRIVACY VS. SECURITY DEBATE REPUBLIC ACT NO. 10175 (CYBERCRIME PREVENTION ACT OF 2012)
CASE STUDIES IN CYBERETHICS REPUBLIC ACT NO. 10173 (DATA PRIVACY ACT OF 2012)
INTELLECTUAL PROPERTY IN THE CYBER CONTEXT NATIONAL PRIVACY COMMISSION ROLES AND FUNCTIONS
DIGITAL IDENTITY AND ETHICAL MANAGEMENT LEGAL PENALTIES FOR CYBERCRIMES IN THE PHILIPPINES
ETHICAL DILEMMAS IN THE INFORMATION AGE NOTABLE CYBERCRIME CASES IN THE PHILIPPINES
PART 2: UNDERSTANDING ETHICAL ISSUES IN CYBERSECURITY PHILIPPINE JURISPRUDENCE ON CYBER ISSUES
ETHICAL ISSUES IN CYBERSECURITY LOCAL GOVERNMENT AND CYBERSECURITY REGULATIONS
CYBERBULLYING AND ONLINE HARASSMENT GOVERNMENT AGENCIES AND CYBERLAW ENFORCEMENT
ETHICS OF HACKING AND PENETRATION TESTING PUBLIC AWARENESS AND LEGAL EDUCATION
DATA BREACHES AND ETHICAL DISCLOSURE PART 6: RISK MANAGEMENT IN CYBERSECURITY
SOCIAL ENGINEERING AND MORAL IMPLICATIONS RISKS IN CYBERSECURITY
ETHICAL CHALLENGES IN AI AND AUTOMATION IDENTIFYING THREAT VECTORS
SURVEILLANCE TECHNOLOGIES AND CIVIL LIBERTIES VULNERABILITY ASSESSMENT TECHNIQUES
ETHICS IN CYBERSECURITY DECISION MAKING CYBER RISK CLASSIFICATION
ORGANIZATIONAL ETHICS AND CYBERSECURITY CULTURE INSIDER THREATS AND ORGANIZATIONAL RISK
GLOBAL ETHICAL STANDARDS IN CYBERSECURITY THREAT INTELLIGENCE GATHERING
PART 3: CYBERSECURITY ETHICS AND APPLICATIONS THIRD-PARTY RISK CONSIDERATIONS
CYBERSECURITY ETHICS: CYBERSPACE AND OTHER APPLICATIONS RISK-BASED SECURITY MODELS
ETHICS IN CLOUD COMPUTING RISK MITIGATION STRATEGIES
INTERNET OF THINGS AND ETHICAL CONCERNS IMPACT ASSESSMENT AND RISK FORECASTING
AUTONOMOUS SYSTEMS AND ETHICAL RISK PART 7: CYBER RISKS AND INSURANCE
ETHICS IN BLOCKCHAIN TECHNOLOGIES CYBER RISKS AND CYBER INSURANCE
FACIAL RECOGNITION AND SURVEILLANCE ETHICS PRINCIPLES OF CYBER INSURANCE
ETHICS IN E-GOVERNANCE AND SMART CITIES RISK TRANSFER AND COVERAGE BASICS
ETHICAL CONSIDERATIONS IN DIGITAL FORENSICS CYBER INSURANCE MARKET TRENDS
ETHICAL IMPLICATIONS OF DIGITAL HEALTH TECHNOLOGIES CLAIMS MANAGEMENT AND INCIDENT DOCUMENTATION
ETHICS AND MISINFORMATION CAMPAIGNS LEGAL AND ETHICAL ISSUES IN CYBER INSURANCE
PART 4: LEGAL GROUNDWORK OF CYBERSECURITY INSURANCE REQUIREMENTS FOR SMES
INTRODUCTION TO CYBER LAWS CYBER INSURANCE FOR CLOUD PROVIDERS
FOUNDATIONS OF INFORMATION TECHNOLOGY LAW GLOBAL REGULATIONS ON CYBER INSURANCE
LEGAL DEFINITIONS OF CYBERCRIME CASE STUDIES ON INSURANCE AND CYBER LOSSES
JURISDICTION AND CROSS-BORDER CHALLENGES PART 8: CRAFTING CYBERSECURITY POLICIES
ELECTRONIC EVIDENCE AND LEGAL ADMISSIBILITY INTRODUCTION TO CYBERSECURITY POLICIES
CYBER HARASSMENT AND LEGAL REMEDIES POLICY DEVELOPMENT PROCESS
LAW ENFORCEMENT AND CYBER INVESTIGATIONS FRAMEWORKS AND STANDARDS FOR POLICIES
INTERNATIONAL CYBER LAW FRAMEWORKS ACCEPTABLE USE POLICIES (AUP)
COMPARATIVE LEGAL SYSTEMS IN CYBERSECURITY SECURITY POLICY TYPES AND EXAMPLES
EVOLUTION OF CYBER LEGISLATION POLICY LIFECYCLE MANAGEMENT
PART 5: PHILIPPINE CYBER LAWS LEGAL CONSIDERATIONS IN POLICY DRAFTING
CYBER LAWS IN THE PHILIPPINES ROLE OF ETHICS IN POLICY MAKING
MONITORING AND ENFORCING POLICIES PART 2: PERSONAL CYBERSECURITY PRACTICES
POLICY REVIEW AND CONTINUOUS IMPROVEMENT PERSONAL CYBERSECURITY
PART 9: ETHICS, LAW, AND POLICY IN PRACTICE CREATING STRONG PASSWORDS
BRIDGING CYBER ETHICS AND LAW PASSWORD MANAGEMENT TOOLS
BALANCING LEGAL OBLIGATIONS AND ETHICAL DUTIES RECOGNIZING PHISHING ATTACKS
INCIDENT RESPONSE AND ETHICAL REPORTING SAFE BROWSING HABITS
STAKEHOLDER ENGAGEMENT IN CYBER GOVERNANCE PROTECTING PERSONAL DATA
COMPLIANCE WITH ETHICAL STANDARDS RECOGNIZING SCAM EMAILS AND MESSAGES
ORGANIZATIONAL RESPONSIBILITY AND ACCOUNTABILITY SAFE ONLINE SHOPPING PRACTICES
LEGAL RAMIFICATIONS OF ETHICAL MISCONDUCT UNDERSTANDING ONLINE REPUTATION
POLICY VIOLATIONS AND ENFORCEMENT ETHICS MANAGING DIGITAL FOOTPRINT
WHISTLEBLOWER PROTECTION AND ETHICS PART 3: FUNDAMENTALS OF COMPUTER SECURITY
INTEGRATING ETHICS INTO CYBERSECURITY STRATEGY COMPUTER SECURITY
PART 10: FUTURE TRENDS AND GLOBAL PERSPECTIVES OPERATING SYSTEM SECURITY BASICS
EMERGING ETHICAL CHALLENGES IN CYBERSECURITY INSTALLING ANTIVIRUS SOFTWARE
LEGAL RESPONSES TO FUTURE TECHNOLOGIES KEEPING SOFTWARE UP TO DATE
DIGITAL HUMAN RIGHTS UNDERSTANDING FIREWALLS
GLOBAL CYBERSECURITY GOVERNANCE SECURE FILE STORAGE
CROSS-BORDER DATA TRANSFER AND ETHICS BACKING UP YOUR COMPUTER
AI AND LEGAL ACCOUNTABILITY SECURING EXTERNAL STORAGE DEVICES
STRENGTHENING ETHICAL LITERACY IN IT PROFESSIONALS AVOIDING MALWARE AND SPYWARE
POLICY INNOVATIONS FOR FUTURE RESILIENCE COMMON COMPUTER THREATS AND PREVENTION
THE ROLE OF EDUCATION IN ETHICAL AND LEGAL AWARENESS PART 4: INTERNET SECURITY AWARENESS
THE FUTURE OF CYBERETHICS AND CYBER LAW INTERNET SECURITY
SAFE USE OF PUBLIC WI-FI
CYBERSECURITY AWARENESS TRAINING SECURING HOME NETWORKS
DNS AND ITS SECURITY ROLE
TITLE OF THE BOOK: CYBERSECURITY AWARENESS TRAINING: A PREVENTING IDENTITY THEFT ONLINE
COMPREHENSIVE GUIDE FOR DIGITAL SAFETY AND PRIVACY HTTPS AND SECURE SITES
PART 1: FOUNDATIONS OF CYBERSECURITY AWARENESS AVOIDING MALICIOUS DOWNLOADS
INTRODUCTION TO CYBERSECURITY RECOGNIZING UNSAFE WEBSITES
THE EVOLUTION OF CYBER THREATS INTERNET SECURITY BEST PRACTICES
WHY CYBERSECURITY AWARENESS MATTERS INTERNET OF THINGS (IOT) AND ONLINE RISKS
KEY CYBERSECURITY TERMINOLOGIES PART 5: MOBILE DEVICE PROTECTION
UNDERSTANDING CYBERSECURITY GOALS MOBILE SECURITY
THE CIA TRIAD: CONFIDENTIALITY, INTEGRITY, AVAILABILITY SECURING SMARTPHONES AND TABLETS
SOCIAL ENGINEERING AND HUMAN FACTORS UNDERSTANDING MOBILE APP PERMISSIONS
ROLE OF INDIVIDUALS IN CYBERSECURITY MOBILE OPERATING SYSTEM UPDATES
CYBERSECURITY IN DAILY LIFE MOBILE ANTIVIRUS APPLICATIONS
CYBERSECURITY AS A LIFELONG SKILL PREVENTING SIM SWAPPING
MOBILE DEVICE MANAGEMENT IN WORKPLACES CYBERCRIME AND LAW ENFORCEMENT
PROTECTING MOBILE WALLETS USER RIGHTS AND RESPONSIBILITIES
LOCATION PRIVACY AND GPS ETHICAL USE OF TECHNOLOGY
MANAGING BLUETOOTH AND NFC SECURITY CONSEQUENCES OF CYBER MISCONDUCT
PART 6: PROTECTING YOUR PRIVACY ONLINE ROLE OF GOVERNANCE IN CYBERSECURITY
PRIVACY DIGITAL CONTRACTS AND SECURITY
UNDERSTANDING ONLINE PRIVACY ETHICAL HACKING AND PENETRATION TESTING
PRIVACY SETTINGS IN BROWSERS COMPLIANCE WITH ORGANIZATIONAL POLICIES
SOCIAL MEDIA PRIVACY SETTINGS PART 10: BUILDING A CYBER AWARE CULTURE
USING VIRTUAL PRIVATE NETWORKS (VPNS) CULTIVATING CYBERSECURITY AWARENESS CULTURE
AVOIDING DATA COLLECTION TRAPS TRAINING AND AWARENESS PROGRAMS
COOKIES AND TRACKING TECHNOLOGIES GAMIFIED CYBERSECURITY TRAINING
PRIVACY IN MESSAGING APPS ROLE OF LEADERSHIP IN CYBERSECURITY
REVIEWING APP PRIVACY POLICIES INCIDENT REPORTING AND COMMUNICATION
DIGITAL RIGHTS AND DATA OWNERSHIP PERIODIC AWARENESS ASSESSMENTS
PART 7: CYBERSECURITY AT WORK AND SCHOOL COMMUNITY CYBERSECURITY EDUCATION
CYBERSECURITY IN THE WORKPLACE REINFORCING GOOD HABITS
SECURE USE OF WORK DEVICES EVALUATING CYBERSECURITY BEHAVIOR
CYBERSECURITY POLICIES AND COMPLIANCE SUSTAINING LONG-TERM AWARENESS
AVOIDING INSIDER THREATS
PROTECTING CLIENT AND COMPANY DATA OPERATIONAL CYBERSECURITY
SAFE FILE SHARING
EMAIL SECURITY PROTOCOLS TITLE OF THE BOOK: OPERATIONAL CYBERSECURITY: DEFENDING
SECURE PRINTING AND DOCUMENT DISPOSAL NETWORKS, SYSTEMS, AND STRATEGIES IN THE DIGITAL AGE
ONLINE MEETING SECURITY PART 1: INTRODUCTION TO OPERATIONAL SECURITY
CYBERSECURITY FOR EDUCATORS AND STUDENTS WHY WORRY ABOUT SECURITY?
PART 8: AWARENESS OF EMERGING THREATS UNDERSTANDING THE OPERATIONAL THREAT LANDSCAPE
CURRENT CYBER THREAT TRENDS KEY STAKEHOLDERS IN CYBERSECURITY OPERATIONS
RANSOMWARE AWARENESS DEFINING OPERATIONAL CYBERSECURITY
DEEPFAKES AND MISINFORMATION THE ROLE OF SECURITY OPERATIONS CENTERS (SOCS)
CYBERBULLYING AND HARASSMENT TYPES OF CYBER ATTACKS AND THEIR OPERATIONAL IMPACT
INSIDER ATTACKS AND SABOTAGE ROLES AND RESPONSIBILITIES IN SECURITY TEAMS
SUPPLY CHAIN ATTACKS SECURITY OPERATIONS IN BUSINESS ENVIRONMENTS
NATION-STATE THREATS CYBERSECURITY GOVERNANCE MODELS
CRYPTOCURRENCY SCAMS OPERATIONAL RISK AND CYBER RESILIENCE
CYBER THREATS IN REMOTE WORK PART 2: NETWORK SECURITY MANAGEMENT
FUTURE-PROOFING AGAINST THREATS NETWORK SECURITY MANAGEMENT BASICS
PART 9: LEGAL AND ETHICAL CONSIDERATIONS IDENTIFYING NETWORK ASSETS AND BOUNDARIES
LEGAL FRAMEWORK OF CYBERSECURITY ESTABLISHING NETWORK SECURITY POLICIES
DATA PROTECTION LAWS (E.G., GDPR, CCPA) SECURING NETWORK INFRASTRUCTURE
MANAGING USER ACCESS ON NETWORKS SECURING COMMUNICATIONS
NETWORK SEGMENTATION STRATEGIES THREATS TO DATA IN TRANSIT
MONITORING NETWORK TRAFFIC EMAIL AND MESSAGING SECURITY
DETECTING AND RESPONDING TO NETWORK INCIDENTS TRANSPORT LAYER SECURITY (TLS)
SECURING WIRELESS NETWORKS END-TO-END ENCRYPTION TECHNIQUES
EVALUATING NETWORK SECURITY EFFECTIVENESS VPN ENCRYPTION PROTOCOLS
PART 3: CORE SECURITY FOUNDATIONS VOICE AND VIDEO COMMUNICATIONS SECURITY
SECURITY FOUNDATIONS SECURING COLLABORATION PLATFORMS
THE CIA TRIAD IN OPERATIONS KEYS, SIGNATURES, CERTIFICATES, AND PKI
AUTHENTICATION AND AUTHORIZATION MANAGING DIGITAL CERTIFICATES AND EXPIRY
SECURITY CONTROLS AND THEIR CATEGORIES PART 7: EXPLOITS, RESPONSE, AND RESILIENCE
APPLYING THE PRINCIPLE OF LEAST PRIVILEGE HACKER EXPLOITS
SECURITY THROUGH OBSCURITY VS. DEFENSE IN DEPTH COMMON VULNERABILITIES AND EXPOSURES (CVES)
UNDERSTANDING TRUST MODELS PENETRATION TESTING PRACTICES
SECURITY DOCUMENTATION ESSENTIALS EXPLOIT KITS AND MALWARE PAYLOADS
ALIGNING SECURITY WITH BUSINESS OBJECTIVES BUILDING AN EXPLOIT DETECTION STRATEGY
MEASURING SECURITY MATURITY INCIDENT HANDLING BASICS
PART 4: PERIMETERS, FIREWALLS, AND ACCESS CREATING AN INCIDENT RESPONSE PLAN
FIREWALLS AND PERIMETERS ROLES IN AN INCIDENT RESPONSE TEAM
TYPES OF FIREWALLS INCIDENT ESCALATION AND DOCUMENTATION
FIREWALL CONFIGURATION AND RULESETS REVIEWING AND LEARNING FROM INCIDENTS
ACCESS CONTROL LISTS (ACLS) PART 8: INVESTIGATIONS AND OPERATIONAL DILIGENCE
NEXT-GENERATION FIREWALL CAPABILITIES FORENSICS, INVESTIGATION, AND RESPONSE
PERIMETER SECURITY IN CLOUD ENVIRONMENTS DIGITAL FORENSIC TOOLS AND TECHNIQUES
DEALING WITH DMZS AND PROXY SERVERS CHAIN OF CUSTODY IN FORENSICS
ZERO TRUST AND PERIMETERLESS MODELS ANALYZING LOGS AND ARTIFACTS
ENHANCING PERIMETER DEFENSES WITH AI WRITING FORENSIC REPORTS
FIREWALL AUDITING AND MAINTENANCE SECURITY DILIGENCE
PART 5: REMOTE ACCESS AND DETECTION TECHNOLOGIES DAILY SECURITY MAINTENANCE TASKS
VPNS AND REMOTE ACCESS PERFORMING REGULAR SECURITY ASSESSMENTS
DESIGNING SECURE VPN ARCHITECTURES SECURITY METRICS AND KPIS
VPN PROTOCOLS AND CONFIGURATIONS INTEGRATING CONTINUOUS IMPROVEMENT
SECURE REMOTE DESKTOP ACCESS PART 9: PLANNING AND STRATEGIC OVERSIGHT
MULTI-FACTOR AUTHENTICATION FOR REMOTE USERS BUSINESS-CONTINUITY PLANNING
INTRUSION DETECTION IN DEPTH RISK ASSESSMENT AND BUSINESS IMPACT ANALYSIS
NETWORK-BASED VS. HOST-BASED IDS DISASTER RECOVERY PLANNING
SETTING UP AND TUNING IDS SYSTEMS TESTING CONTINUITY PLANS
INTEGRATING IDS WITH SIEM AUDITING FUNDAMENTALS
BEHAVIORAL VS. SIGNATURE-BASED DETECTION CONDUCTING SECURITY AUDITS
PART 6: SECURING DIGITAL COMMUNICATION COMPLIANCE AND REGULATORY CONSIDERATIONS
INTERNAL VS. EXTERNAL AUDIT PROCESSES AVOIDING EARLY PITFALLS IN DR PLANNING
REPORTING AND REMEDIATION PART 3: BUSINESS IMPACT AND RISK ANALYSIS
CONTINUOUS AUDIT PRACTICES DEVELOPING AND USING A BUSINESS IMPACT ANALYSIS
PART 10: OUTSOURCING, AGREEMENTS, AND FUTURE TRENDS IDENTIFYING CRITICAL BUSINESS FUNCTIONS
SECURITY-MANAGEMENT ISSUES ESTIMATING RECOVERY TIME OBJECTIVES (RTO)
BUILDING A SECURITY OPERATIONS STRATEGY ESTIMATING RECOVERY POINT OBJECTIVES (RPO)
LEADERSHIP IN CYBERSECURITY OPERATIONS ASSESSING OPERATIONAL AND FINANCIAL IMPACTS
OUTSOURCING AND SECURITY EVALUATING THIRD-PARTY DEPENDENCIES
CHOOSING TRUSTED SECURITY VENDORS ANALYZING RISK SCENARIOS
SECURITY SERVICE LEVEL AGREEMENTS PRIORITIZING BUSINESS SERVICES FOR RECOVERY
WRITING AND REVIEWING SLAS USING BIA TOOLS AND TEMPLATES
FUTURE TRENDS IN SECURITY COMMUNICATING BIA RESULTS TO STAKEHOLDERS
ADAPTING TO EMERGING THREATS PART 4: INFRASTRUCTURE AND APPLICATION MAPPING
SAMPLE POLICY DOCUMENTS AND TEMPLATES MAPPING BUSINESS FUNCTIONS TO INFRASTRUCTURE
CATALOGING HARDWARE AND SOFTWARE ASSETS
CYBERSECURITY DISASTER RECOVERY PLANNING IDENTIFYING INTERDEPENDENCIES IN SYSTEMS
MAPPING APPLICATIONS TO CRITICAL PROCESSES
TITLE OF THE BOOK: CYBERSECURITY DISASTER RECOVERY PLANNING: UNDERSTANDING HYBRID AND CLOUD ARCHITECTURES
STRATEGIES, SOLUTIONS, AND SUSTAINED RESILIENCE PLANNING FOR LEGACY SYSTEM INTEGRATION
PART 1: FOUNDATIONS OF DISASTER RECOVERY IN CYBERSECURITY INVENTORYING NETWORK TOPOLOGY AND DEVICES
UNDERSTANDING DISASTER RECOVERY IDENTIFYING INFRASTRUCTURE WEAK POINTS
THE RELATIONSHIP BETWEEN CYBERSECURITY AND DR MANAGING CONFIGURATION DOCUMENTATION
TYPES OF CYBER DISASTERS USING DIAGRAMS AND DR MODELING TOOLS
REGULATORY AND COMPLIANCE DRIVERS PART 5: RECOVERY PLANNING FOR USERS AND FACILITIES
DISASTER RECOVERY IN THE CONTEXT OF BUSINESS CONTINUITY PLANNING USER RECOVERY
THE IMPACT OF DOWNTIME AND DATA LOSS DETERMINING USER ACCESS NEEDS
CYBERSECURITY RISK ASSESSMENT FUNDAMENTALS CREATING USER RECOVERY KITS
ALIGNING DR WITH ENTERPRISE SECURITY POLICIES PLANNING FACILITIES PROTECTION AND RECOVERY
CREATING A DR VISION AND ROADMAP DESIGNING REDUNDANT WORK ENVIRONMENTS
BUILDING EXECUTIVE AND STAKEHOLDER SUPPORT UTILIZING REMOTE WORK CAPABILITIES IN DR
PART 2: INITIATING AND STRUCTURING THE DR EFFORT ENSURING PHYSICAL SECURITY POST-INCIDENT
BOOTSTRAPPING THE DR PLAN EFFORT EVALUATING BACKUP POWER AND COOLING SYSTEMS
IDENTIFYING KEY PERSONNEL AND ROLES COORDINATING OFFICE RELOCATION PLANS
ESTABLISHING DR GOVERNANCE FACILITY CONTRACTS AND VENDOR MANAGEMENT
PROJECT PLANNING AND MANAGEMENT TECHNIQUES PART 6: TECHNICAL RECOVERY PLANNING
BUDGETING AND RESOURCE ALLOCATION PLANNING SYSTEM AND NETWORK RECOVERY
SETTING REALISTIC DR OBJECTIVES BUILDING SYSTEM-LEVEL RECOVERY PROTOCOLS
CONDUCTING PRELIMINARY RISK ASSESSMENTS RESTORING NETWORK INFRASTRUCTURE
UNDERSTANDING ORGANIZATIONAL DEPENDENCIES PLANNING DATA RECOVERY
DEVELOPING DR AWARENESS ACROSS TEAMS DATA BACKUP STRATEGIES AND SCHEDULES
CLOUD VS ON-PREMISE BACKUP SOLUTIONS BUILDING A CULTURE OF RESILIENCE
SECURING BACKUPS FROM TAMPERING TRAINING AND SIMULATED RECOVERY DRILLS
RECOVERING ENCRYPTED DATA ESTABLISHING CLEAR KPIS FOR DR
AUTOMATING TECHNICAL DR PROCESSES AUDITING AND UPDATING THE DR PLAN
TESTING TECHNICAL RECOVERY PROCEDURES POST-MORTEM ANALYSIS AFTER EVENTS
PART 7: WRITING AND DOCUMENTING THE PLAN CONTINUOUS IMPROVEMENT PRACTICES
WRITING THE DISASTER RECOVERY PLAN REPORTING DR READINESS TO LEADERSHIP
DR PLAN COMPONENTS AND STRUCTURE TEN BENEFITS OF DR PLANNING
CREATING STEP-BY-STEP PROCEDURES FUTURE TRENDS IN CYBERSECURITY DISASTER RECOVERY
INTEGRATING CYBERSECURITY PROTOCOLS
CONTACT LISTS AND COMMUNICATION TREES CYBERSECURITY BUSINESS CONTINUITY PLANNING
DEFINING ROLES AND ESCALATION PATHS
USING TEMPLATES AND CHECKLISTS TITLE OF THE BOOK: CYBERSECURITY BUSINESS CONTINUITY PLANNING:
STORING AND SECURING THE PLAN ENSURING OPERATIONAL RESILIENCE IN THE DIGITAL AGE
PLANNING FOR PLAN DISTRIBUTION PART 1: UNDERSTANDING THE ESSENTIALS OF CONTINUITY PLANNING
KEEPING DR PLANS AND STAFF CURRENT INTRODUCTION
PART 8: PREVENTION AND PROACTIVE PLANNING THE ROLE OF CYBERSECURITY IN BUSINESS CONTINUITY
UNDERSTANDING THE ROLE OF PREVENTION CORE PRINCIPLES OF RESILIENCE AND RECOVERY
INTEGRATING PREVENTIVE SECURITY CONTROLS BUSINESS CONTINUITY VS DISASTER RECOVERY
MONITORING FOR EARLY WARNING INDICATORS IDENTIFYING CRITICAL CYBER ASSETS
LEVERAGING THREAT INTELLIGENCE MAPPING CONTINUITY TO CYBERSECURITY OBJECTIVES
PLANNING FOR VARIOUS DISASTER SCENARIOS LEGAL AND REGULATORY CONSIDERATIONS
NATURAL DISASTERS VS CYBER INCIDENTS THE COST OF DOWNTIME AND CYBER DISRUPTION
INSIDER THREATS AND HUMAN ERRORS RISK SCENARIOS IN MODERN ENTERPRISES
NATION-STATE AND RANSOMWARE SCENARIOS THE EVOLUTION OF CYBER CONTINUITY PLANNING
PLANNING FOR PANDEMIC AND GLOBAL CRISES PART 2: ESTABLISHING THE PROJECT FOUNDATION
CROSS-SCENARIO FLEXIBILITY IN DR PROJECT FOUNDATION INITIAL ASSESSMENT
PART 9: TOOLS, RESOURCES, AND EXTERNAL HELP DEFINING THE SCOPE OF CONTINUITY PLANNING
TEN DISASTER RECOVERY PLANNING TOOLS ASSEMBLING THE BCP TEAM
COMPARING COMMERCIAL DR SOFTWARE EXECUTIVE SPONSORSHIP AND SUPPORT
OPEN SOURCE DR TOOLS AND PLATFORMS INITIAL RISK IDENTIFICATION
EVALUATING MANAGED DR SERVICES TIMELINE AND MILESTONE PLANNING
UTILIZING AUTOMATION IN DR DEFINING GOALS AND OBJECTIVES
ELEVEN DISASTER RECOVERY PLANNING WEBSITES CREATING A COMMUNICATION FRAMEWORK
GOVERNMENT AND INDUSTRY DR RESOURCES RESOURCE ALLOCATION FOR PLANNING
ONLINE DR COMMUNITIES AND FORUMS SELECTING FRAMEWORKS AND METHODOLOGIES
USING WEB-BASED COLLABORATION FOR DR PART 3: CONDUCTING THE BUSINESS ASSESSMENT
CREATING A DR TOOLS INVENTORY BUSINESS ASSESSMENT
PART 10: KEYS TO SUCCESS AND MEASURING VALUE IDENTIFYING ESSENTIAL BUSINESS FUNCTIONS
TEN ESSENTIALS FOR DISASTER PLANNING SUCCESS PRIORITIZING BUSINESS OPERATIONS
ESTABLISHING RTO AND RPO PART 7: ENSURING OPERATIONAL READINESS
MAPPING DEPENDENCIES TESTING AND MAINTENANCE
UNDERSTANDING STAKEHOLDER NEEDS TYPES OF CONTINUITY TESTS
ANALYZING VENDOR AND PARTNER IMPACT SIMULATIONS AND LIVE EXERCISES
TECHNOLOGY ASSET REVIEW POST-TEST EVALUATION AND IMPROVEMENTS
REVIEWING OPERATIONAL WORKFLOWS UPDATING THE PLAN REGULARLY
COMPILING THE BUSINESS ASSESSMENT REPORT REVIEWING PLAN AGAINST NEW THREATS
PART 4: RISK AND IMPACT ANALYSIS EMPLOYEE AWARENESS AND TRAINING
CYBER RISK LANDSCAPE OVERVIEW COORDINATION WITH EXTERNAL PARTNERS
THREAT MODELING FOR CONTINUITY MONITORING EMERGING RISKS
BUSINESS IMPACT ANALYSIS TECHNIQUES GOVERNANCE AND POLICY ENFORCEMENT
EVALUATING THIRD-PARTY RISKS PART 8: EMBEDDING CONTINUITY INTO CORPORATE CULTURE
IDENTIFYING SINGLE POINTS OF FAILURE PROMOTING RESILIENCE AWARENESS
ANALYZING SUPPLY CHAIN VULNERABILITIES INCORPORATING BCP IN ONBOARDING
FINANCIAL IMPACT OF BUSINESS INTERRUPTIONS LINKING KPIS TO RESILIENCE GOALS
CYBER INSURANCE AND RISK TRANSFER CONTINUOUS EDUCATION AND TRAINING
QUANTITATIVE VS QUALITATIVE RISK ASSESSMENT EMPOWERING MIDDLE MANAGEMENT
ALIGNING RISKS WITH STRATEGIC OBJECTIVES CHANGE MANAGEMENT IN CONTINUITY PLANNING
PART 5: SELECTING EFFECTIVE CONTINUITY STRATEGIES INCENTIVIZING RISK REDUCTION BEHAVIORS
STRATEGY SELECTION INTERNAL COMMUNICATION STRATEGIES
HIGH AVAILABILITY SOLUTIONS ENCOURAGING CROSS-DEPARTMENT ENGAGEMENT
DATA BACKUP AND RECOVERY OPTIONS ORGANIZATIONAL MATURITY IN CONTINUITY PLANNING
REMOTE WORKFORCE CONTINUITY PART 9: TOOLS, TECHNOLOGIES, AND SUPPORT SYSTEMS
OFFSITE AND CLOUD-BASED SOLUTIONS BCP MANAGEMENT SOFTWARE
TIERED RESPONSE MODELS INTEGRATION WITH SIEM AND SOC
RECOVERY FROM CYBER INCIDENTS CLOUD CONTINUITY PLATFORMS
COMMUNICATION CONTINUITY PLANS AUTOMATED BACKUP AND RECOVERY TOOLS
TABLETOP EXERCISES AND SIMULATIONS ROLE OF AI IN BCP
INTEGRATION WITH CYBERSECURITY INCIDENT RESPONSE CRISIS MANAGEMENT APPS
PART 6: DEVELOPING THE CONTINUITY PLAN BUSINESS CONTINUITY DASHBOARDS
PLAN DEVELOPMENT DOCUMENTATION AND ARCHIVING SOLUTIONS
PLAN OBJECTIVES AND SCOPE REDUNDANCY PLANNING TOOLS
DEFINING ROLES AND RESPONSIBILITIES SELECTING THE RIGHT TECHNOLOGY PARTNERS
WRITING BUSINESS FUNCTION PROCEDURES PART 10: FUTURE-PROOFING AND STRATEGIC ALIGNMENT
CREATING IT SYSTEM RECOVERY PLANS FUTURE TRENDS IN BUSINESS CONTINUITY
DOCUMENTATION OF DEPENDENCIES ALIGNING CONTINUITY WITH BUSINESS GOALS
CRISIS COMMUNICATION PROTOCOLS PLANNING FOR EMERGING THREATS
DEVELOPING RECOVERY CHECKLISTS GLOBAL RISK FACTORS AND BCP
ENSURING LEGAL AND COMPLIANCE ALIGNMENT CYBER RESILIENCE AS COMPETITIVE ADVANTAGE
APPROVAL AND SIGN-OFF PROCESS CONTINUOUS IMPROVEMENT METHODOLOGIES
CROSS-BORDER CONTINUITY PLANNING SOCIAL NORMS AND COMPLIANCE
STRATEGIC REPORTING AND AUDIT TRAILS OVERCOMING RATIONAL THOUGHT
EXECUTIVE BOARD ENGAGEMENT AND ADVOCACY PART 4: PLANNING YOUR SOCIAL ENGINEERING TEST
SUSTAINING LONG-TERM OPERATIONAL RESILIENCE PLANNING YOUR SOCIAL ENGINEERING TEST
DEFINING THE SCOPE AND OBJECTIVE
SOCIAL ENGINEERING SETTING THE ETHICAL PARAMETERS
RISK ASSESSMENT AND STAKEHOLDER APPROVAL
TITLE OF THE BOOK: SOCIAL ENGINEERING: THE HUMAN ELEMENT OF ASSEMBLING THE RIGHT TEAM
CYBERSECURITY TIMELINE AND MILESTONES
PART 1: FOUNDATIONS OF SOCIAL ENGINEERING GAINING EXECUTIVE BUY-IN
INTRODUCTION TO SOCIAL ENGINEERING MAPPING OUT POTENTIAL TARGETS
UNDERSTANDING HUMAN VULNERABILITIES COORDINATING WITH IT AND SECURITY TEAMS
THE PSYCHOLOGY BEHIND MANIPULATION TEST PRE-APPROVALS AND SAFETY NETS
KEY CONCEPTS IN HUMAN-BASED ATTACKS PART 5: RESEARCH AND RECONNAISSANCE
SOCIAL ENGINEERING IN THE CONTEXT OF CYBERSECURITY RESEARCH AND RECONNAISSANCE
EVOLUTION OF SOCIAL ENGINEERING TECHNIQUES OPEN SOURCE INTELLIGENCE GATHERING
FAMOUS SOCIAL ENGINEERING CASES SOCIAL MEDIA FOOTPRINTING
THE RISE OF SOCIAL HACKING IN THE DIGITAL ERA DUMPSTER DIVING AND OFFLINE RECON
SOCIAL ENGINEERING ACROSS DIFFERENT CULTURES EMAIL AND PHONE RECONNAISSANCE
ETHICS OF HUMAN MANIPULATION BUILDING TARGET PROFILES
PART 2: LEGAL AND ETHICAL BOUNDARIES IDENTIFYING WEAK LINKS IN ORGANIZATIONS
THE LEGAL AND ETHICAL ASPECTS OF SOCIAL ENGINEERING TESTS SURVEILLANCE TACTICS
INTERNATIONAL LAWS AND SOCIAL ENGINEERING ENVIRONMENTAL RECON
CONSENT IN PENETRATION TESTING MAINTAINING ANONYMITY DURING RESEARCH
CORPORATE RESPONSIBILITY AND BOUNDARIES PART 6: CRAFTING THE PERFECT SCENARIO
DISCLOSURE, REPORTING, AND WHISTLEBLOWING CREATING THE SCENARIO
ETHICAL HACKING VS MALICIOUS ENGINEERING TYPES OF SCENARIOS: PHISHING, VISHING, AND IMPERSONATION
CREATING A LEGAL FRAMEWORK FOR TESTS WRITING THE SCRIPT
PRIVACY RIGHTS AND IMPLICATIONS ROLEPLAYING AND TRAINING FOR ENGAGEMENT
NAVIGATING GRAY AREAS IN SIMULATIONS CHOOSING THE MEDIUM OF ATTACK
CASE STUDIES OF LEGAL CHALLENGES SETTING UP INFRASTRUCTURE (FAKE SITES, PHONE NUMBERS)
PART 3: WHY IT WORKS SO WELL PRETEXT DEVELOPMENT
WHY SOCIAL ENGINEERING WORKS BLENDING IN: DRESS AND BEHAVIOR
TRUST EXPLOITATION IN HUMAN BEHAVIOR TIMING THE SCENARIO LAUNCH
INFLUENCE AND PERSUASION TACTICS ENSURING SCENARIO RELEVANCE TO TARGET
THE ROLE OF EMOTION IN DECISION-MAKING PART 7: EXECUTION IN THE REAL WORLD
COGNITIVE BIASES AND EXPLOITATION EXECUTING THE SOCIAL ENGINEERING TEST
THE ILLUSION OF AUTHORITY LAUNCHING EMAIL CAMPAIGNS
INFORMATION OVERLOAD AND MISTAKES MAKING SOCIAL ENGINEERING CALLS
THE POWER OF URGENCY ONSITE SOCIAL ENGINEERING ATTACKS
PHISHING THROUGH MOBILE CHANNELS ZERO TRUST SECURITY
DEEPFAKE AND VOICE CLONING USE
AVOIDING DETECTION AND MAINTAINING THE STORY TITLE OF THE BOOK: ZERO TRUST SECURITY: REDEFINING ACCESS IN THE
CAPTURING TEST METRICS MODERN CYBER LANDSCAPE
EXFILTRATION OF SIMULATED DATA PART 1: INTRODUCTION TO ZERO TRUST
SAFELY EXITING THE ATTACK UNDERSTANDING ZERO TRUST SECURITY
PART 8: REPORTING AND ANALYSIS WHY TRADITIONAL SECURITY MODELS FAIL
WRITING THE SOCIAL ENGINEERING REPORT CORE PRINCIPLES OF ZERO TRUST
STRUCTURING THE REPORT CLEARLY HISTORICAL EVOLUTION OF ZERO TRUST CONCEPTS
HIGHLIGHTING KEY FINDINGS IMPORTANCE OF ZERO TRUST IN TODAY’S THREAT LANDSCAPE
VISUALIZING SUCCESS METRICS PERIMETER-LESS SECURITY EXPLAINED
DETAILING ATTACK PATHS ZERO TRUST ARCHITECTURE OVERVIEW
RECOMMENDATIONS FOR DEFENSE ADOPTION TRENDS ACROSS INDUSTRIES
LESSONS LEARNED CHALLENGES IN TRANSITIONING TO ZERO TRUST
STAKEHOLDER PRESENTATION AND COMMUNICATION THE BUSINESS CASE FOR ZERO TRUST
REMEDIATION GUIDANCE PART 2: ZERO TRUST SECURITY CONCEPTS
MAINTAINING CONFIDENTIALITY IN REPORTING NEVER TRUST, ALWAYS VERIFY
PART 9: TOOLS AND TECHNIQUES MICRO-SEGMENTATION PRINCIPLES
TOOLS OF THE TRADE LEAST PRIVILEGE ACCESS ENFORCEMENT
EMAIL SPOOFING TOOLS USER AND DEVICE AUTHENTICATION LAYERS
VOICE PHISHING (VISHING) TOOLS POLICY-BASED ACCESS CONTROLS
CREDENTIAL HARVESTING PAGES TRUST ZONES AND ISOLATION TECHNIQUES
REMOTE ACCESS AND PAYLOAD DELIVERY REAL-TIME THREAT DETECTION AND RESPONSE
OSINT AND AUTOMATION TOOLS DYNAMIC RISK ASSESSMENT INTEGRATION
SIMULATING SOCIAL MEDIA ACCOUNTS ZERO TRUST AND CONTINUOUS MONITORING
BROWSER EXPLOITS AND PLUGINS ZERO TRUST VS TRADITIONAL VPNS
CUSTOM SCRIPTS AND SOFTWARE PART 3: CORE TECHNOLOGIES BEHIND ZERO TRUST
TRAINING SIMULATORS AND LABS IDENTITY AND ACCESS MANAGEMENT (IAM)
PART 10: BUILDING STRONG DEFENSES MULTIFACTOR AUTHENTICATION (MFA)
DEFENSE AGAINST THE DARK ARTS ENDPOINT DETECTION AND RESPONSE (EDR)
EMPLOYEE AWARENESS AND TRAINING SECURE ACCESS SERVICE EDGE (SASE)
RED TEAMING AND SIMULATION PROGRAMS SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
CREATING A CULTURE OF VIGILANCE CLOUD ACCESS SECURITY BROKERS (CASBS)
REPORTING AND ESCALATION POLICIES ROLE OF FIREWALLS IN ZERO TRUST
MULTIFACTOR AUTHENTICATION AND CONTROLS SOFTWARE-DEFINED PERIMETER (SDP)
SECURITY AWARENESS CAMPAIGNS ENCRYPTION AND SECURE COMMUNICATIONS
UPDATING DEFENSE TACTICS REGULARLY AI AND ML IN ZERO TRUST ENFORCEMENT
SOCIAL ENGINEERING: PAST, PRESENT, AND FUTURE PART 4: ZERO TRUST METHODS
CONTINUOUS IMPROVEMENT IN HUMAN SECURITY USER BEHAVIOR ANALYTICS
ADAPTIVE AUTHENTICATION TECHNIQUES
DEVICE TRUST EVALUATION CLOUD-TO-CLOUD TRUST MANAGEMENT
NETWORK MICRO-SEGMENTATION TECHNIQUES PART 8: COMPLIANCE AND ZERO TRUST
IDENTITY FEDERATION AND MANAGEMENT MAPPING ZERO TRUST TO REGULATORY STANDARDS
CREATING DYNAMIC TRUST SCORES ZERO TRUST AND GDPR COMPLIANCE
ZERO TRUST IN REMOTE WORK ENVIRONMENTS NIST FRAMEWORK AND ZERO TRUST
JUST-IN-TIME ACCESS PRINCIPLES ISO STANDARDS AND ZERO TRUST ALIGNMENT
PRIVILEGED ACCESS MANAGEMENT (PAM) CMMC AND FEDERAL COMPLIANCE
REAL-TIME ACCESS REVOCATION AUTOMATING COMPLIANCE CHECKS
PART 5: ORGANIZATIONAL PRACTICES CONTINUOUS COMPLIANCE MONITORING
CREATING A ZERO TRUST SECURITY POLICY ZERO TRUST AND THIRD-PARTY RISK
MAPPING ORGANIZATIONAL INFRASTRUCTURE EVIDENCE AND AUDIT TRAIL MANAGEMENT
CONDUCTING TRUST ASSESSMENTS LEGAL IMPLICATIONS OF ACCESS POLICIES
REDEFINING PERIMETER SECURITY PART 9: ADVANCED THREATS AND ZERO TRUST DEFENSE
ORGANIZATIONAL CULTURE FOR ZERO TRUST ZERO TRUST AGAINST RANSOMWARE
BUILDING A ZERO TRUST SECURITY TEAM PREVENTING LATERAL MOVEMENT
EXECUTIVE BUY-IN AND BOARD ENGAGEMENT INSIDER THREAT DETECTION WITH ZERO TRUST
WORKFORCE AWARENESS AND TRAINING REDUCING ATTACK SURFACES
INSIDER THREAT MANAGEMENT BEHAVIOR-BASED INTRUSION PREVENTION
VENDOR AND PARTNER ACCESS CONTROL REAL-TIME RISK SCORING
PART 6: IMPLEMENTING ZERO TRUST IN THE ENTERPRISE INTEGRATING THREAT INTELLIGENCE
ROADMAP TO ZERO TRUST IMPLEMENTATION RESPONSE AUTOMATION AND ZERO TRUST
CONDUCTING A ZERO TRUST READINESS ASSESSMENT LESSONS FROM MAJOR CYBER INCIDENTS
DEVELOPING A MATURITY MODEL RESILIENCE AND RECOVERY IN ZERO TRUST
PILOT PROGRAMS AND TEST ENVIRONMENTS PART 10: THE FUTURE OF ZERO TRUST
INTEGRATING WITH EXISTING SYSTEMS EMERGING TRENDS IN ZERO TRUST
BUDGETING AND RESOURCE PLANNING THE ROLE OF ZERO TRUST IN IOT
DATA CLASSIFICATION AND SEGMENTATION ZERO TRUST IN 5G NETWORKS
PHASED DEPLOYMENT STRATEGIES QUANTUM COMPUTING AND ZERO TRUST
KPI TRACKING AND REPORTING ZERO TRUST AND EDGE COMPUTING
AVOIDING COMMON PITFALLS IN IMPLEMENTATION EVOLVING STANDARDS AND FRAMEWORKS
PART 7: ZERO TRUST FOR CLOUD AND HYBRID ENVIRONMENTS ZERO TRUST IN CRITICAL INFRASTRUCTURE
APPLYING ZERO TRUST TO PUBLIC CLOUD CASE STUDIES OF FULL ADOPTION
ZERO TRUST IN HYBRID INFRASTRUCTURE CONTINUOUS IMPROVEMENT MODELS
SECURING SAAS PLATFORMS THE NEXT GENERATION OF CYBERSECURITY
ZERO TRUST AND VIRTUAL PRIVATE CLOUDS
IAM INTEGRATION WITH CLOUD PROVIDERS ADVANCED PERSISTENT THREATS
CLOUD-NATIVE ZERO TRUST TOOLS
CLOUD WORKLOAD PROTECTION STRATEGIES TITLE OF THE BOOK: ADVANCED PERSISTENT THREATS: DEFENDING
MANAGING CLOUD-BASED IDENTITIES AGAINST THE SILENT DIGITAL INVASION
GOVERNANCE AND COMPLIANCE IN THE CLOUD PART 1: THE EVOLUTION OF ADVANCED PERSISTENT THREATS
UNDERSTANDING THE CHANGING THREAT APPLYING RISK QUANTIFICATION TECHNIQUES
ORIGINS AND EVOLUTION OF APTS INTEGRATING BUSINESS IMPACT INTO SECURITY DECISIONS
STATE-SPONSORED ATTACKS AND CYBER WARFARE COMMUNICATION OF RISK TO LEADERSHIP
THE RISE OF CYBER ESPIONAGE PART 5: PROTECTING YOUR DATA
MOTIVATIONS BEHIND PERSISTENT ATTACKS DATA CLASSIFICATION AND LABELING
KEY FEATURES THAT DEFINE APTS ENCRYPTION AT REST AND IN TRANSIT
HIGH-PROFILE APT CASE STUDIES SECURE ACCESS CONTROLS
THE LIFECYCLE OF AN APT ATTACK DATA LOSS PREVENTION (DLP) STRATEGIES
DIFFERENCES BETWEEN APTS AND COMMON THREATS DATA MINIMIZATION BEST PRACTICES
TRENDS IN GLOBAL APT CAMPAIGNS SECURING STRUCTURED AND UNSTRUCTURED DATA
PART 2: WHY ORGANIZATIONS ARE BEING COMPROMISED PROTECTING INTELLECTUAL PROPERTY AND TRADE SECRETS
UNDERSTANDING VULNERABILITY SURFACES CLOUD STORAGE PROTECTION TECHNIQUES
WEAKNESSES IN CORPORATE SECURITY POSTURES INSIDER DATA THEFT MITIGATION
INSIDER THREATS AND HUMAN ERRORS REAL-TIME DATA ACTIVITY MONITORING
EXPLOITING SUPPLY CHAINS PART 6: PREVENTION IS IDEAL BUT DETECTION IS A MUST
THE ROLE OF PHISHING IN INITIAL ACCESS THE LIMITS OF PREVENTION STRATEGIES
LACK OF THREAT INTELLIGENCE USAGE ROLE OF THREAT HUNTING
BUDGET CONSTRAINTS AND SECURITY GAPS IMPORTANCE OF EARLY DETECTION
UNPATCHED SYSTEMS AND LEGACY INFRASTRUCTURE SECURITY OPERATIONS CENTER (SOC) FUNCTIONS
MISCONFIGURATIONS IN IT ENVIRONMENTS BEHAVIORAL ANALYTICS AND BASELINES
SHADOW IT AND UNAUTHORIZED DEVICES SIEM FOR CONTINUOUS MONITORING
PART 3: HOW ORGANIZATIONS ARE BEING COMPROMISED INTEGRATING THREAT INTELLIGENCE FEEDS
SOCIAL ENGINEERING TACTICS INDICATORS OF COMPROMISE AND ATTACK
SPEAR PHISHING AND TARGETED EMAILS MITRE ATT&CK FRAMEWORK UTILIZATION
EXPLOIT KITS AND MALWARE DELIVERY COORDINATED DEFENSE AND THREAT SHARING
REMOTE DESKTOP PROTOCOL ATTACKS PART 7: INCIDENT RESPONSE: RESPOND AND RECOVER
USE OF STOLEN CREDENTIALS DEVELOPING AN INCIDENT RESPONSE PLAN
LIVING OFF THE LAND TECHNIQUES ROLES AND RESPONSIBILITIES IN IR TEAMS
COMMAND AND CONTROL (C2) CHANNELS ESTABLISHING AN IR COMMUNICATION PLAN
DATA EXFILTRATION TECHNIQUES FORENSICS AND EVIDENCE HANDLING
PERSISTENCE MECHANISMS USED BY APTS CONTAINMENT AND ERADICATION TECHNIQUES
EVASION TACTICS AGAINST DETECTION TOOLS RECOVERY PROCESSES AND BUSINESS CONTINUITY
PART 4: RISK-BASED APPROACH TO SECURITY LEGAL AND REGULATORY CONSIDERATIONS
RISK MANAGEMENT IN CYBERSECURITY POST-INCIDENT REPORTING
IDENTIFYING AND CLASSIFYING RISKS LESSONS LEARNED AND PROCESS IMPROVEMENT
PRIORITIZING RISK RESPONSES SIMULATING APT INCIDENTS THROUGH TABLETOP EXERCISES
ASSET INVENTORY AND CRITICALITY RATINGS PART 8: TECHNOLOGIES FOR SUCCESS
THREAT MODELING FOR APT DEFENSE ENDPOINT DETECTION AND RESPONSE (EDR)
SECURITY POSTURE ASSESSMENTS NETWORK TRAFFIC ANALYSIS (NTA) TOOLS
GOVERNANCE, RISK, AND COMPLIANCE (GRC) NEXT-GENERATION FIREWALLS (NGFW)
USER AND ENTITY BEHAVIOR ANALYTICS (UEBA) SECTORAL RESPONSIBILITIES IN CYBER DEFENSE
IDENTITY AND ACCESS MANAGEMENT (IAM) THE ROLE OF GOVERNMENT IN CYBERSECURITY
ZERO TRUST ARCHITECTURE PRIVATE SECTOR AND CYBER RESILIENCE
CLOUD SECURITY PLATFORMS EXPANDING ROLES OF CYBERSECURITY PROFESSIONALS
SECURITY ORCHESTRATION, AUTOMATION, AND RESPONSE (SOAR) TECHNOLOGICAL ADVANCEMENT AND SECURITY IMPLICATIONS
ARTIFICIAL INTELLIGENCE IN THREAT DETECTION PART 2: WHAT IS CYBERSPACE?
INTEGRATING A UNIFIED THREAT PLATFORM ORIGINS AND DEFINITIONS OF CYBERSPACE
PART 9: THE CHANGING LANDSCAPE: CLOUD AND MOBILIZATION PHYSICAL AND VIRTUAL COMPONENTS OF CYBERSPACE
APTS IN CLOUD-FIRST ENVIRONMENTS CRITICAL INFRASTRUCTURE AND CYBERSPACE
CLOUD MISCONFIGURATION EXPLOITS INTERNET GOVERNANCE MODELS
SHARED RESPONSIBILITY MODELS IN THE CLOUD THE INTERCONNECTEDNESS OF DIGITAL ECOSYSTEMS
APT TACTICS IN SAAS AND PAAS ENVIRONMENTS CYBERSPACE AND SOVEREIGNTY
SECURITY OF MOBILE DEVICES AND BYOD GLOBAL DIGITAL DIVIDES
MOBILE THREAT DEFENSE SOLUTIONS THE CONCEPT OF DIGITAL BORDERS
SECURING APIS AND WEB APPS OWNERSHIP AND ACCESS IN CYBERSPACE
THREATS IN MULTI-CLOUD AND HYBRID ENVIRONMENTS CYBERSPACE AS A DOMAIN OF POWER
VISIBILITY AND CONTROL IN CLOUD ECOSYSTEMS PART 3: GOVERNING CYBERSPACE
ADAPTING DETECTION CAPABILITIES TO CLOUD WORKLOADS PRINCIPLES OF CYBER GOVERNANCE
PART 10: PROACTIVE SECURITY AND ADAPTIVE DEFENSE MULTI-STAKEHOLDER MODELS IN GOVERNANCE
IMPLEMENTING PROACTIVE SECURITY POSTURES NATIONAL CYBERSECURITY STRATEGIES
BUILDING A THREAT-INFORMED DEFENSE INTERNATIONAL NORMS AND CYBER AGREEMENTS
SECURITY RATINGS AND REPUTATIONAL RANKINGS REGULATORY FRAMEWORKS ACROSS JURISDICTIONS
BUILDING CYBER RESILIENCE CYBERSECURITY ROLES OF INTERNATIONAL ORGANIZATIONS
REAL-TIME THREAT MODELING AND SIMULATION BALANCING SECURITY AND INNOVATION
DYNAMIC DEFENSE MECHANISMS CHALLENGES IN ENFORCING CYBER POLICIES
CYBERSECURITY MATURITY MODEL INTERGOVERNMENTAL COLLABORATION IN CYBERSPACE
WORKFORCE TRAINING AND AWARENESS GOVERNANCE GAPS AND EMERGING ISSUES
EXECUTIVE ENGAGEMENT AND CULTURE OF SECURITY PART 4: CYBER CAPABILITIES AND INSECURITY
FUTURE OUTLOOK FOR APT DEFENSE THE NATURE OF CYBER POWER
STATE-SPONSORED CYBER OPERATIONS
CYBERSECURITY GOVERNANCE ASYMMETRIC THREATS IN CYBERSPACE
WEAPONIZATION OF DIGITAL TOOLS
TITLE OF THE BOOK: CYBERSECURITY GOVERNANCE: STRATEGIC SURVEILLANCE AND COUNTER-SURVEILLANCE
FRAMEWORKS FOR THE DIGITAL AGE ESPIONAGE IN THE CYBER ERA
PART 1: THE EXPANDING SCOPE OF CYBERSECURITY BUILDING AND MAINTAINING CYBER CAPABILITIES
UNDERSTANDING THE DIGITAL THREAT LANDSCAPE CYBERSECURITY WORKFORCE DEVELOPMENT
EVOLUTION OF CYBERSECURITY IN THE MODERN WORLD EMERGING CYBERSECURITY TECHNOLOGIES
NATIONAL VS GLOBAL CYBERSECURITY NEEDS ETHICAL CONSIDERATIONS OF CYBER CAPABILITIES
CHALLENGES IN DEFINING CYBER BOUNDARIES PART 5: CYBERSECURITY AND STRATEGY
CYBERSECURITY AS A SOCIETAL IMPERATIVE STRATEGIC PLANNING FOR CYBERSECURITY
NATIONAL SECURITY IN THE DIGITAL DOMAIN COMBATING GLOBAL CYBERCRIMINAL NETWORKS
INTEGRATING CYBERSECURITY INTO DEFENSE POLICY LEGAL AND POLICY RESPONSES TO NON-STATE THREATS
ORGANIZATIONAL CYBER RESILIENCE STRATEGIES PART 9: CYBERSECURITY AND DEMOCRACY
ALIGNING CYBERSECURITY WITH BUSINESS OBJECTIVES SAFEGUARDING ELECTIONS IN THE DIGITAL AGE
INTELLIGENCE GATHERING AND THREAT ANALYSIS DISINFORMATION AND MISINFORMATION CAMPAIGNS
CYBERSECURITY RISK MANAGEMENT SECURING CIVIC DIGITAL INFRASTRUCTURE
STRATEGIC RESPONSE TO CYBER INCIDENTS PRIVACY VS SECURITY IN DEMOCRATIC SOCIETIES
COORDINATED DEFENSE ACROSS BORDERS FREEDOM OF EXPRESSION AND ONLINE CENSORSHIP
LONG-TERM STRATEGIC TRENDS IN CYBERSECURITY PUBLIC TRUST IN DIGITAL GOVERNANCE
PART 6: FROM CYBER WAR TO CYBER CONFLICT TRANSPARENCY IN CYBER POLICY
DEFINING CYBER WAR AND CYBER CONFLICT CITIZEN ENGAGEMENT AND DIGITAL LITERACY
HISTORICAL CYBER CONFLICTS AND CASE STUDIES PROTECTING JOURNALISTS AND ACTIVISTS ONLINE
ATTRIBUTION AND RESPONSIBILITY CYBERSECURITY AS A HUMAN RIGHTS ISSUE
INTERNATIONAL LAW AND CYBER WARFARE PART 10: THE FUTURES OF CYBERSECURITY
DETERRENCE IN THE CYBER DOMAIN EMERGING TECHNOLOGIES AND FUTURE THREATS
CONFLICT ESCALATION AND CRISIS MANAGEMENT QUANTUM COMPUTING AND CYBERSECURITY
USE OF CYBER OPERATIONS IN MILITARY STRATEGY ARTIFICIAL INTELLIGENCE IN CYBER DEFENSE
ETHICAL DILEMMAS IN CYBER CONFLICT CYBERSECURITY IN SPACE INFRASTRUCTURE
HYBRID WARFARE AND CYBER ELEMENTS FUTURE OF GLOBAL CYBER COOPERATION
PREVENTING AND MANAGING CYBER CONFLICTS EVOLVING PRIVACY AND DATA PROTECTION CHALLENGES
PART 7: ORGANIZING DETERRENCE AND DEFENSE IN CYBERSPACE THE ROLE OF EDUCATION AND AWARENESS
THEORIES OF CYBER DETERRENCE PREDICTING AND MODELING FUTURE CYBER RISKS
CYBERSECURITY ARCHITECTURE AND DEFENSE LAYERS BUILDING RESILIENT CYBER ECOSYSTEMS
ROLE OF MILITARY AND CIVIL AGENCIES VISION FOR A SECURE AND OPEN DIGITAL FUTURE
PUBLIC-PRIVATE PARTNERSHIPS IN CYBER DEFENSE
BUILDING TRUSTED INFORMATION SHARING NETWORKS DATA PROTECTION AND PRIVACY
COORDINATING NATIONAL AND REGIONAL DEFENSES
CYBERSECURITY INCIDENT RESPONSE MECHANISMS TITLE OF THE BOOK: DATA PROTECTION AND PRIVACY: PRINCIPLES,
THE ROLE OF CERTS AND SOCS POLICIES, AND PRACTICES IN THE DIGITAL AGE
INTEGRATING THREAT INTELLIGENCE INTO DEFENSE PART 1: FOUNDATIONS OF DATA PRIVACY
TESTING AND EXERCISING DETERRENCE READINESS ORIGINS AND CONCEPTS OF DATA PRIVACY
PART 8: NON-STATE THREATS: FROM CYBERCRIME TO TERRORISM A BRIEF HISTORY OF DATA PRIVACY
UNDERSTANDING THE SCOPE OF CYBERCRIME PHILOSOPHICAL AND LEGAL UNDERPINNINGS OF PRIVACY
DARK WEB AND ILLICIT ONLINE ACTIVITIES PRIVACY IN THE DIGITAL ERA
ORGANIZED CYBERCRIME NETWORKS GLOBAL TRENDS IN DATA PROTECTION
FINANCIAL CYBERCRIMES AND CRYPTOCURRENCY CULTURAL VARIATIONS IN PRIVACY EXPECTATIONS
CYBERTERRORISM TACTICS AND TARGETS INFORMATION AS A COMMODITY
PSYCHOLOGICAL IMPACT OF CYBERTERRORISM ETHICS OF PERSONAL DATA USE
SOCIAL ENGINEERING AND INSIDER THREATS THE ROLE OF TRUST IN DATA SHARING
RANSOMWARE AND EXTORTION TACTICS DEFINING PERSONAL AND SENSITIVE DATA
PART 2: GDPR AND ITS GLOBAL INFLUENCE RIGHT TO OBJECT
INTRODUCTION TO GDPR RIGHTS RELATED TO AUTOMATED DECISIONS
GDPR'S SCOPE OF APPLICATION EXERCISING AND ENFORCING RIGHTS
KEY PRINCIPLES OF DATA PROTECTION UNDER GDPR EDUCATION AND AWARENESS OF DATA SUBJECTS
ROLES OF CONTROLLERS AND PROCESSORS PART 6: ENFORCEMENT MECHANISMS AND REMEDIES
CROSS-BORDER DATA TRANSFERS UNDER GDPR GDPR ENFORCEMENT
GDPR IN NON-EU JURISDICTIONS POWERS OF SUPERVISORY AUTHORITIES
THE INFLUENCE OF GDPR ON GLOBAL POLICIES EUROPEAN DATA PROTECTION BOARD (EDPB)
COMPARATIVE ANALYSIS: GDPR VS. OTHER REGULATIONS PENALTIES AND ADMINISTRATIVE FINES
PRIVACY BY DESIGN AND DEFAULT CASE STUDIES OF GDPR ENFORCEMENT
THE FUTURE OF INTERNATIONAL DATA TRANSFERS REMEDIES AVAILABLE TO DATA SUBJECTS
PART 3: TECHNICAL AND ORGANIZATIONAL SAFEGUARDS COLLECTIVE REDRESS MECHANISMS
TECHNICAL AND ORGANIZATIONAL REQUIREMENTS UNDER GDPR JUDICIAL AND NON-JUDICIAL REMEDIES
RISK-BASED APPROACHES TO COMPLIANCE ROLE OF NATIONAL COURTS
DATA PROTECTION IMPACT ASSESSMENTS (DPIAS) EMERGING CHALLENGES IN ENFORCEMENT
ROLE OF DATA PROTECTION OFFICERS (DPOS) PART 7: GOVERNMENT ACCESS AND DATA SOVEREIGNTY
RECORDS OF PROCESSING ACTIVITIES GOVERNMENTAL USE OF DATA
DATA BREACH NOTIFICATION REQUIREMENTS SURVEILLANCE AND NATIONAL SECURITY EXCEPTIONS
SECURITY MEASURES FOR DATA AT REST AND IN TRANSIT BALANCING PRIVACY AND PUBLIC INTEREST
THIRD-PARTY VENDOR MANAGEMENT LAW ENFORCEMENT ACCESS TO PERSONAL DATA
ENCRYPTION AND ANONYMIZATION TECHNIQUES DATA LOCALIZATION AND SOVEREIGNTY
AUTOMATED DECISION-MAKING AND PROFILING TRANSPARENCY OBLIGATIONS OF GOVERNMENTS
PART 4: LEGAL GROUNDS AND CONSENT FOR DATA PROCESSING LEGISLATIVE OVERSIGHT OF DATA ACCESS
MATERIAL REQUISITES FOR PROCESSING UNDER GDPR INTELLIGENCE SHARING AND CROSS-BORDER CONCERNS
THE LEGAL BASES FOR PROCESSING PERSONAL DATA FACIAL RECOGNITION AND BIOMETRICS IN PUBLIC SURVEILLANCE
CONSENT AND ITS CONDITIONS THE ROLE OF CIVIL SOCIETY IN DATA OVERSIGHT
CONTRACTUAL NECESSITY AND LEGAL OBLIGATIONS PART 8: BUILDING ORGANIZATIONAL COMPLIANCE
LEGITIMATE INTERESTS AND THE BALANCING TEST CREATING A GDPR COMPLIANCE DEPARTMENT
SPECIAL CATEGORIES OF DATA ORGANIZATIONAL STRUCTURE FOR DATA GOVERNANCE
PROCESSING DATA OF CHILDREN STAFF TRAINING AND AWARENESS
PROCESSING IN THE CONTEXT OF EMPLOYMENT DEVELOPING DATA HANDLING POLICIES
IMPACT OF NATIONAL DEROGATIONS INCIDENT RESPONSE AND BREACH PREPAREDNESS
ACCOUNTABILITY FOR LAWFUL PROCESSING VENDOR AND SUPPLY CHAIN COMPLIANCE
PART 5: EMPOWERING THE DATA SUBJECT INTERNAL AUDITING AND MONITORING
DATA SUBJECTS’ RIGHTS DOCUMENTATION AND EVIDENCE OF COMPLIANCE
RIGHT TO ACCESS ENGAGING WITH REGULATORS
RIGHT TO RECTIFICATION CHALLENGES IN IMPLEMENTING GDPR COMPLIANCE
RIGHT TO ERASURE ("RIGHT TO BE FORGOTTEN") PART 9: CASE STUDY – FACEBOOK AND DATA PRIVACY
RIGHT TO RESTRICT PROCESSING FACEBOOK: A PERENNIAL ABUSER OF DATA PRIVACY
RIGHT TO DATA PORTABILITY FACEBOOK AND GDPR VIOLATIONS
CAMBRIDGE ANALYTICA SCANDAL REVISITED INCIDENT CONTAINMENT EFFICIENCY
PROFILING AND BEHAVIORAL ADVERTISING PRACTICES RECOVERY TIME OBJECTIVE (RTO)
DARK PATTERNS IN CONSENT MECHANISMS RECOVERY POINT OBJECTIVE (RPO)
THIRD-PARTY APPLICATIONS AND DATA LEAKAGE ESCALATION RATES AND TIMELINESS
IMPACT ON PUBLIC TRUST AND USER ENGAGEMENT ROOT CAUSE ANALYSIS COUNT
REGULATORY ACTIONS AGAINST FACEBOOK COST PER INCIDENT
LESSONS FROM THE FACEBOOK CASE PART 3: SYSTEM AND INFRASTRUCTURE METRICS
FACEBOOK’S COMPLIANCE STRATEGY POST-GDPR PATCH MANAGEMENT EFFICIENCY
PART 10: LOOKING AHEAD IN DATA PROTECTION PATCH CYCLE TIME
THE FUTURE OF DATA PRIVACY PERCENTAGE OF SYSTEMS FULLY PATCHED
ROLE OF EMERGING TECHNOLOGIES (AI, IOT, BLOCKCHAIN) TIME TO PATCH CRITICAL VULNERABILITIES
ADAPTING PRIVACY FRAMEWORKS TO NEW REALITIES COMPLIANCE RATES ACROSS DEVICES
THE RISE OF DATA ETHICS AS A DISCIPLINE SYSTEM UPTIME METRICS
REGIONAL INITIATIVES AND LOCAL LAWS CONFIGURATION MANAGEMENT EFFECTIVENESS
PRIVACY ENHANCING TECHNOLOGIES (PETS) ENDPOINT DETECTION AND RESPONSE COVERAGE
CONSUMER EMPOWERMENT AND DATA SOVEREIGNTY NETWORK SEGMENTATION COVERAGE
THE INTERPLAY OF PRIVACY AND INNOVATION REDUNDANCY AND FAILOVER RATES
GLOBAL PRIVACY STANDARDS: A POSSIBILITY? PART 4: HUMAN AND BEHAVIORAL METRICS
BUILDING A CULTURE OF PRIVACY FOR THE FUTURE USER AWARENESS TRAINING EFFECTIVENESS
PHISHING SIMULATION RESULTS
CYBERSECURITY METRICS AND MEASUREMENT SOCIAL ENGINEERING SUCCESS RATE
SECURITY TRAINING COMPLETION RATE
TITLE OF THE BOOK: CYBERSECURITY METRICS AND MEASUREMENT: A POLICY VIOLATION FREQUENCY
DATA-DRIVEN APPROACH TO DIGITAL DEFENSE USER CREDENTIAL HYGIENE
PART 1: FOUNDATIONS OF CYBERSECURITY METRICS MULTI-FACTOR AUTHENTICATION USAGE
INTRODUCTION TO CYBERSECURITY METRICS PASSWORD ROTATION COMPLIANCE
THE ROLE OF METRICS IN CYBERSECURITY STRATEGY INSIDER THREAT DETECTION FREQUENCY
DEFINING GOOD METRICS SECURITY CULTURE SURVEY SCORES
CHARACTERISTICS OF EFFECTIVE METRICS PART 5: THREAT AND VULNERABILITY METRICS
ALIGNING METRICS WITH SECURITY GOALS VULNERABILITY SCANNING RESULTS
AVOIDING VANITY METRICS NUMBER OF CRITICAL VULNERABILITIES DETECTED
METRIC PITFALLS AND MISUSE TIME TO REMEDIATE VULNERABILITIES
RISK-BASED METRICS OVERVIEW PERCENTAGE OF SYSTEMS WITH KNOWN VULNERABILITIES
METRIC MATURITY MODELS REOCCURRING VULNERABILITY COUNT
BUILDING A METRICS-FIRST SECURITY CULTURE VULNERABILITY EXPLOITABILITY SCORE
PART 2: CORE OPERATIONAL METRICS THIRD-PARTY RISK METRICS
MEAN TIME TO DETECT (MTTD) SHADOW IT IDENTIFICATION RATE
MEAN TIME TO RESPOND (MTTR) OPEN PORT SCANNING METRICS
NUMBER OF INCIDENTS DETECTED ENDPOINT THREAT DETECTION RATE
FREQUENCY OF INCIDENT TYPES PART 6: DETECTION AND PREVENTION METRICS
INTRUSION ATTEMPTS DATA VISUALIZATION BEST PRACTICES
BLOCKED MALWARE ATTACKS DASHBOARDS AND EXECUTIVE SUMMARIES
ALERT-TO-INCIDENT CONVERSION RATIO ENSURING DATA ACCURACY AND CONSISTENCY
FALSE POSITIVE AND FALSE NEGATIVE RATES PART 10: COMMUNICATION, REPORTING, AND FUTURE TRENDS
SECURITY EVENT VOLUME REPORTING AND COMMUNICATION
AVERAGE ALERT RESPONSE TIME COMMUNICATING METRICS TO STAKEHOLDERS
AUTOMATED RESPONSE COVERAGE BOARD-LEVEL METRICS AND REPORTING
THREAT INTELLIGENCE INTEGRATION METRICS AUDIT AND COMPLIANCE REPORTING
FIREWALL RULE CHANGE FREQUENCY REAL-TIME VS. HISTORICAL METRICS
DETECTION COVERAGE ACROSS ASSETS KEY PERFORMANCE INDICATORS VS. KEY RISK INDICATORS
PART 7: SYSTEM RELIABILITY AND PERFORMANCE USING METRICS FOR BUDGET JUSTIFICATION
MEAN TIME BETWEEN FAILURES (MTBF) EVOLVING METRICS IN CLOUD AND HYBRID ENVIRONMENTS
SYSTEM AVAILABILITY METRICS PREDICTIVE SECURITY METRICS
INCIDENT DOWNTIME DURATION FUTURE OF METRICS-DRIVEN CYBERSECURITY
BACKUP SYSTEM RELIABILITY
LOAD AND LATENCY UNDER ATTACK NETWORK DESIGN
PERFORMANCE DEGRADATION DETECTION TIME
DISASTER RECOVERY TIMEFRAMES TITLE OF THE BOOK: STRATEGIC NETWORK DESIGN: FOUNDATIONS,
CAPACITY THRESHOLD MONITORING ARCHITECTURES, AND IMPLEMENTATION FOR MODERN CONNECTIVITY
FAILOVER TESTING FREQUENCY PART 1: FOUNDATIONS OF NETWORK DESIGN
RESILIENCE GAP ANALYSIS MAKING THE BUSINESS CASE FOR THE NETWORK
PART 8: IDENTITY AND ACCESS MANAGEMENT METRICS ALIGNING NETWORK DESIGN WITH ORGANIZATIONAL GOALS
IAM PERFORMANCE COST-BENEFIT ANALYSIS IN NETWORK PLANNING
ACCOUNT PROVISIONING AND DEPROVISIONING TIME ROI AND TCO IN NETWORK INVESTMENT
PRIVILEGED ACCOUNT MONITORING IDENTIFYING STAKEHOLDERS AND REQUIREMENTS
NUMBER OF ACCESS VIOLATIONS DOCUMENTING BUSINESS DRIVERS FOR NETWORK PROJECTS
DORMANT ACCOUNT RATE BUILDING A NETWORK STRATEGY FRAMEWORK
ROLE-BASED ACCESS EFFECTIVENESS COMMUNICATING NETWORK PLANS TO EXECUTIVES
ACCESS REVIEW AND AUDIT COMPLETION RATES COMPLIANCE AND LEGAL CONSIDERATIONS
SSO AND FEDERATION COVERAGE CASE STUDIES IN NETWORK-DRIVEN BUSINESS TRANSFORMATION
POLICY ENFORCEMENT ACCURACY PART 2: TECHNICAL DESIGN AND PLANNING PRINCIPLES
ACCESS CONTROL ADJUSTMENT FREQUENCY TECHNICAL CONSIDERATIONS IN NETWORKING DESIGN AND PLANNING
PART 9: FRAMEWORKS, ANALYSIS, AND VISUALIZATION SCALABILITY AND PERFORMANCE DESIGN FACTORS
METRICS AND FRAMEWORKS (E.G., NIST, ISO 27001) REDUNDANCY AND FAULT TOLERANCE PLANNING
MAPPING METRICS TO RISK FRAMEWORKS SECURITY CONSIDERATIONS IN NETWORK ARCHITECTURE
BENCHMARKING AGAINST INDUSTRY STANDARDS AVAILABILITY AND RELIABILITY GOALS
METRIC CORRELATION AND TREND ANALYSIS TOPOLOGY DESIGN MODELS
DATA COLLECTION AND ANALYSIS CABLING AND PHYSICAL LAYER CONCERNS
AUTOMATING METRIC COLLECTION PROTOCOLS AND STANDARDS FOR NETWORK INTEROPERABILITY
SECURITY DATA INTEGRATION ASSESSING BANDWIDTH AND THROUGHPUT NEEDS
CAPACITY PLANNING BEST PRACTICES INTEGRATION WITH ENTERPRISE SYSTEMS
PART 3: WIDE AREA NETWORK (WAN) DESIGN COLLABORATION TOOLS IN INTRANET ENVIRONMENTS
WAN NETWORK DESIGN SECURITY AND DATA PROTECTION IN INTRANETS
TYPES OF WAN TECHNOLOGIES PERFORMANCE TESTING OF INTRANET SYSTEMS
DESIGNING FOR LATENCY AND CONGESTION FUTURE OF INTRANET DESIGN
MPLS, SD-WAN, AND VPN OPTIONS PART 7: NETWORK DESIGN OUTSOURCING
ROUTING PROTOCOLS FOR WAN ARCHITECTURE OUTSOURCING NETWORK DESIGN, PLANNING, AND IMPLEMENTATION
HIGH AVAILABILITY IN WAN DESIGN BENEFITS AND RISKS OF OUTSOURCING
WAN OPTIMIZATION STRATEGIES SELECTING A NETWORK SERVICE PROVIDER
SECURE WAN CONNECTIVITY SLAS AND CONTRACT NEGOTIATION
MULTISITE AND GLOBAL WAN CONSIDERATIONS THIRD-PARTY INTEGRATION AND COMPLIANCE
WAN REDESIGN CASE STUDIES VENDOR LOCK-IN AND MIGRATION CONCERNS
PART 4: VALUE ADDED NETWORKS AND EXTENDED CONNECTIVITY MANAGING OUTSOURCED PROJECTS
VALUE ADDED NETWORKS METRICS FOR EVALUATING OUTSOURCED SERVICES
VAN SERVICES OVERVIEW COST CONTROL IN OUTSOURCED DESIGNS
VAN INTEGRATION WITH LEGACY SYSTEMS CASE STUDIES ON NETWORK OUTSOURCING
B2B COMMUNICATIONS USING VANS PART 8: SECURITY AND GOVERNANCE IN NETWORK DESIGN
VANS VS. MODERN ALTERNATIVES INTEGRATING SECURITY INTO NETWORK DESIGN
CLOUD-BASED VAN SERVICES DESIGNING PERIMETER AND INTERNAL SECURITY
SECURE FILE TRANSFER AND VAN SECURITY NETWORK ACCESS CONTROL (NAC) SYSTEMS
VAN USE CASES BY INDUSTRY FIREWALLS, IDS, AND IPS CONSIDERATIONS
PERFORMANCE MONITORING FOR VANS ENCRYPTION IN TRANSIT AND AT REST
FUTURE TRENDS IN VALUE ADDED NETWORKING GOVERNANCE AND POLICY ENFORCEMENT
PART 5: LOCAL AREA NETWORK (LAN) DESIGN RISK MANAGEMENT AND THREAT MODELING
LOCAL AREA NETWORK DESIGN AND PLANNING REGULATORY COMPLIANCE IN NETWORK ARCHITECTURE
HIERARCHICAL LAN DESIGN INCIDENT RESPONSE PLANNING
SWITCHING TECHNOLOGIES AND VLANS AUDIT TRAILS AND NETWORK FORENSICS
LAN CABLING TYPES AND STANDARDS PART 9: NETWORK IMPLEMENTATION AND TESTING
IP ADDRESSING AND SUBNETTING IN LANS NETWORK DESIGN TO IMPLEMENTATION TRANSITION
LAN SECURITY POLICIES DEPLOYMENT STRATEGIES AND PHASED ROLLOUTS
WIRELESS LAN DESIGN CONSIDERATIONS LAB TESTING AND EMULATION TOOLS
POWER OVER ETHERNET (POE) DEPLOYMENT PILOT PROGRAMS AND PROOF OF CONCEPT
MONITORING AND MANAGING LAN PERFORMANCE PERFORMANCE BENCHMARKS AND BASELINES
LAN TROUBLESHOOTING AND OPTIMIZATION CONFIGURATION MANAGEMENT
PART 6: INTRANETS AND INTERNAL COMMUNICATIONS CHANGE MANAGEMENT PROCESSES
INTRANETS USER ACCEPTANCE TESTING (UAT)
ARCHITECTURE OF MODERN INTRANETS TROUBLESHOOTING INITIAL DEPLOYMENTS
INTRANET SERVICES AND APPLICATIONS POST-IMPLEMENTATION REVIEWS
USER ACCESS AND AUTHENTICATION PART 10: TRENDS AND INNOVATIONS IN NETWORK DESIGN
CONTENT MANAGEMENT IN INTRANETS SOFTWARE-DEFINED NETWORKING (SDN)
NETWORK FUNCTION VIRTUALIZATION (NFV) WEAK AUTHENTICATION MECHANISMS
INTENT-BASED NETWORKING LACK OF REAL-TIME MONITORING
EDGE AND FOG COMPUTING NETWORKS UNMONITORED REMOTE DEVICES
DESIGNING FOR IOT CONNECTIVITY SILOED SECURITY TOOLS
NETWORK AUTOMATION TOOLS OUTDATED ANTIVIRUS DEPENDENCY
MACHINE LEARNING IN NETWORK MONITORING ABSENCE OF ZERO TRUST PRINCIPLES
CLOUD NETWORKING DESIGN PRINCIPLES HOW TO FIND AND FIX THE MISSING LINKS
GREEN NETWORKING AND SUSTAINABILITY PART 4: BRIDGING THE SECURITY GAP
THE FUTURE OF NETWORK ARCHITECTURE MISSING LINK DISCOVERED
INTEGRATING ENDPOINT SOLUTIONS
ENDPOINT SECURITY ESTABLISHING ENDPOINT BASELINES
UNIFYING SECURITY FRAMEWORKS
TITLE OF THE BOOK: MASTERING ENDPOINT SECURITY: STRATEGIES, CENTRALIZING ENDPOINT MANAGEMENT
SYSTEMS, AND SAFEGUARDS FOR DIGITAL DEFENSE USING THREAT INTELLIGENCE FOR ENDPOINTS
PART 1: UNDERSTANDING ENDPOINT SECURITY AUTOMATING ENDPOINT RESPONSE
DEFINING ENDPOINTS APPLYING MACHINE LEARNING IN ENDPOINT DETECTION
THE ROLE OF ENDPOINTS IN MODERN NETWORKS DEVELOPING A HOLISTIC SECURITY APPROACH
EVOLUTION OF ENDPOINT DEVICES ENDPOINT MONITORING AND AUDIT TRAILS
ENDPOINT SECURITY VS. TRADITIONAL SECURITY PART 5: ENDPOINT AND NETWORK INTEGRATION
THE IMPORTANCE OF ENDPOINT VISIBILITY ENDPOINTS AND NETWORK INTEGRATION
ENDPOINT ROLES IN CYBERATTACKS ENDPOINT SECURITY IN A NETWORKED WORLD
ENDPOINT SECURITY AS THE FIRST LINE OF DEFENSE ALIGNING ENDPOINT SECURITY WITH NETWORK ARCHITECTURE
DEVICES IN THE ENDPOINT ECOSYSTEM SECURE COMMUNICATIONS BETWEEN DEVICES
COMMON ENDPOINT VULNERABILITIES INTERNAL VS. EXTERNAL THREAT MITIGATION
THE LIFECYCLE OF AN ENDPOINT BUILDING A RESILIENT ENDPOINT NETWORK
PART 2: WHY SECURITY FAILS VISIBILITY FROM ENDPOINT TO CLOUD
WHY SECURITY FAILS REMOTE WORK AND ENDPOINT-NETWORK CHALLENGES
GAPS IN ENDPOINT DETECTION ENDPOINT ROLE IN INCIDENT RESPONSE
MISCONFIGURATIONS AND OVERSIGHTS CASE STUDY: ENDPOINT INTEGRATION SUCCESS
UNPATCHED VULNERABILITIES PART 6: BUILDING SECURE FOUNDATIONS
THE HUMAN FACTOR IN ENDPOINT FAILURES TRUSTWORTHY BEGINNINGS
POOR POLICY ENFORCEMENT SECURE BOOT AND OS INTEGRITY
LACK OF ENDPOINT SEGMENTATION HARDWARE-BASED SECURITY MEASURES
BYOD AND SHADOW IT RISKS TRUSTED PLATFORM MODULES (TPM)
DEVICE SPRAWL AND COMPLEXITY SECURE PROVISIONING OF DEVICES
LESSONS FROM PAST FAILURES ACCESS CONTROL FOUNDATIONS
PART 3: IDENTIFYING WHAT’S MISSING SECURE APPLICATION DEPLOYMENT
SOMETHING IS MISSING ENCRYPTION PRACTICES FOR ENDPOINTS
INCOMPLETE VISIBILITY ACROSS ENDPOINTS ENDPOINT HARDENING TECHNIQUES
INSUFFICIENT USER EDUCATION USING SECURITY BASELINES EFFECTIVELY
PART 7: THREAT VECTORS AND EXPLOITS INNOVATIONS IN ENDPOINT SECURITY
THREAT VECTORS THE ROLE OF AI IN ENDPOINT PROTECTION
MALWARE AND ENDPOINT VULNERABILITY ENDPOINT SECURITY IN A POST-PERIMETER WORLD
PHISHING AND SOCIAL ENGINEERING AT THE ENDPOINT FINAL THOUGHTS: THE ROAD AHEAD FOR ENDPOINT SECURITY
INSIDER THREATS THROUGH ENDPOINT ACCESS
ADVANCED PERSISTENT THREATS THREAT HUNTING
DRIVE-BY DOWNLOADS AND EXPLOITS
USB AND REMOVABLE MEDIA ATTACKS TITLE OF THE BOOK: MASTERING THREAT HUNTING: PROACTIVE CYBER
ENDPOINT RANSOMWARE INCIDENTS DEFENSE THROUGH ADVERSARY DETECTION
FILELESS ATTACKS ON ENDPOINTS PART 1: FOUNDATIONS OF THREAT HUNTING
EMAIL-BASED THREAT ENTRY POINTS AN INTRODUCTION TO THREAT HUNTING
PART 8: PLATFORM-SPECIFIC SECURITY EVOLUTION OF THREAT DETECTION APPROACHES
MICROSOFT WINDOWS THREAT HUNTING VS. TRADITIONAL SECURITY
WINDOWS SECURITY ARCHITECTURE UNDERSTANDING ADVERSARIAL BEHAVIOR
WINDOWS DEFENDER AND BEYOND THE ROLE OF THREAT HUNTERS IN CYBERSECURITY
SECURITY FEATURES IN MODERN WINDOWS OS THREAT HUNTING IN THE SECURITY OPERATIONS CENTER
APPLE OS X KEY TERMINOLOGIES AND CONCEPTS
MACOS SECURITY FRAMEWORKS IDENTIFYING ORGANIZATIONAL NEEDS FOR HUNTING
MALWARE AND MACOS MISCONCEPTIONS THREAT LANDSCAPE OVERVIEW
LINUX BENEFITS OF PROACTIVE DEFENSE
LINUX ENDPOINT THREAT LANDSCAPE PART 2: REQUIREMENTS AND MOTIVATIONS
HARDENING LINUX SYSTEMS REQUIREMENTS AND MOTIVATIONS
PART 9: EMERGING ENDPOINT DEVICES STRATEGIC GOALS OF THREAT HUNTING
PDAS AND SMARTPHONES BUSINESS CASES FOR THREAT HUNTING PROGRAMS
MOBILE DEVICE MANAGEMENT (MDM) THREAT HUNTING FOR REGULATORY COMPLIANCE
MOBILE THREAT DETECTION ENHANCING CYBER RESILIENCE
MOBILE APP SECURITY RISK REDUCTION THROUGH ACTIVE HUNTING
EMBEDDED DEVICES EXECUTIVE BUY-IN AND BUDGETING
IOT ENDPOINT SECURITY CHALLENGES ORGANIZATIONAL READINESS ASSESSMENT
ENDPOINT FIRMWARE SECURITY THREAT MODELING AND RISK PROFILING
INDUSTRIAL ENDPOINT SYSTEMS CASE STUDY: THREAT HUNTING MOTIVATION IN ACTION
SECURE MANAGEMENT OF NON-TRADITIONAL ENDPOINTS PART 3: BUILDING THE THREAT HUNTING TEAM
REGULATION AND STANDARDS FOR EMERGING ENDPOINTS TEAM CONSTRUCT
PART 10: REAL-WORLD LESSONS AND FUTURE TRENDS DEFINING ROLES AND RESPONSIBILITIES
CASE STUDIES OF ENDPOINT SECURITY FAILURES IDEAL SKILL SETS FOR THREAT HUNTERS
ANALYZING HIGH-PROFILE ENDPOINT BREACHES SECURITY ANALYST VS. THREAT HUNTER
LESSONS LEARNED FROM COMPROMISED DEVICES CROSS-TEAM COLLABORATION
BUILDING RESILIENT ENDPOINT DEFENSE PLANS BUILDING AN AGILE AND ADAPTIVE TEAM
METRICS AND KPIS FOR ENDPOINT SECURITY LEADERSHIP AND CAREER PATHS IN THREAT HUNTING
PREPARING FOR FUTURE ENDPOINT THREATS HIRING AND TRAINING THREAT HUNTERS
CULTURAL CHALLENGES AND OVERCOMING THEM PLANNING ACROSS MULTIPLE TEAMS
ESTABLISHING A THREAT HUNTING CULTURE SETTING SUCCESS METRICS
PART 4: COMMUNICATION AND COLLABORATION PREPARING TOOLS AND ENVIRONMENTS
COMMUNICATION BREAKDOWN PLANNING FOR FAILURES AND UNKNOWNS
COMMUNICATION FLOW IN INCIDENT RESPONSE REAL-TIME ADJUSTMENTS TO HUNTING STRATEGIES
BRIDGING THE GAP BETWEEN TEAMS SCALING THREAT HUNTING OPERATIONS
REPORTING MECHANISMS AND STAKEHOLDER ENGAGEMENT PART 8: TOOLS, TACTICS, AND TECHNOLOGIES
TECHNICAL VS. NON-TECHNICAL COMMUNICATION DEFENDING THE DEFENDERS
ALIGNING OBJECTIVES ACROSS DEPARTMENTS ENDPOINT DETECTION AND RESPONSE (EDR) PLATFORMS
SECURITY AWARENESS FOR NON-SECURITY TEAMS SIEM AND LOG AGGREGATION TOOLS
ESCALATION PROTOCOLS AND COLLABORATION TOOLS NETWORK TRAFFIC ANALYSIS
LESSONS FROM COMMUNICATION FAILURES MALWARE SANDBOXING AND REVERSE ENGINEERING
BUILDING TRUST IN SECURITY OPERATIONS OPEN SOURCE TOOLS FOR THREAT HUNTING
PART 5: HUNTING METHODOLOGIES AND FRAMEWORKS CUSTOM SCRIPTS AND AUTOMATION
METHODOLOGIES HARDWARE AND TOOLSETS
THE MITRE ATT&CK FRAMEWORK IN THREAT HUNTING THREAT EMULATION FOR TESTING DEFENSES
HYPOTHESIS-DRIVEN HUNTING BUILDING AND MAINTAINING A HUNTING LAB
TTP (TACTICS, TECHNIQUES, AND PROCEDURES) EXPLORATION PART 9: DATA ANALYSIS AND REPORTING
IOC VS. IOA (INDICATORS OF COMPROMISE VS. ATTACK) DATA ANALYSIS
SIGNATURE-BASED AND BEHAVIOR-BASED APPROACHES PARSING AND CORRELATING DATA
THREAT HUNTING MATURITY MODELS VISUALIZING THREAT TRENDS AND PATTERNS
CONTINUOUS VS. CAMPAIGN-BASED HUNTING IDENTIFYING FALSE POSITIVES AND NEGATIVES
FEEDBACK LOOPS AND PROCESS REFINEMENT USING MACHINE LEARNING FOR THREAT DETECTION
CASE STUDY: SUCCESSFUL HUNTING METHODOLOGY DOCUMENTATION
PART 6: INTELLIGENCE-DRIVEN HUNTING WRITING CLEAR AND ACTIONABLE REPORTS
THREAT INTELLIGENCE CREATING EXECUTIVE SUMMARIES AND DASHBOARDS
TYPES OF THREAT INTELLIGENCE DELIVERABLES
CONSUMING AND ANALYZING THREAT FEEDS PRESENTING HUNT FINDINGS TO STAKEHOLDERS
INTEGRATING INTELLIGENCE INTO HUNTING PART 10: EVOLVING AND ADVANCING THE PROGRAM
ENRICHMENT AND CORRELATION OF DATA POST-HUNT ACTIVITY AND MATURING A TEAM
THREAT ACTOR PROFILING REVIEWING HUNT EFFECTIVENESS
USING OPEN SOURCE INTELLIGENCE (OSINT) INCORPORATING FEEDBACK INTO FUTURE HUNTS
ALIGNING THREAT INTELLIGENCE WITH ORGANIZATIONAL NEEDS BUILDING A THREAT HUNTING PLAYBOOK
BUILDING AN INTERNAL THREAT INTELLIGENCE PROGRAM ESTABLISHING CONTINUOUS LEARNING PROGRAMS
PITFALLS IN INTELLIGENCE INTERPRETATION THREAT HUNTING METRICS AND KPIS
PART 7: STRATEGIC PLANNING AND EXECUTION INTEGRATING HUNTING WITH INCIDENT RESPONSE
PLANNING LEVERAGING RED TEAM EXERCISES
DEFINING HUNT OBJECTIVES PREPARING FOR ADVANCED THREATS
SCOPING THE HUNTING MISSION FUTURE OF THREAT HUNTING: TRENDS AND INNOVATIONS
RESOURCE ALLOCATION AND MANAGEMENT
CYBERSECURITY AUTOMATION NIST CYBERSECURITY FRAMEWORK
PCI DSS COMPLIANCE AUTOMATION
TITLE OF THE BOOK: CYBERSECURITY AUTOMATION: TRANSFORMING GDPR COMPLIANCE CHECKS
DEFENSE WITH INTELLIGENT SYSTEMS REAL-TIME COMPLIANCE MONITORING
PART 1: FOUNDATIONS OF CYBERSECURITY AUTOMATION AUTOMATING AUDIT TRAILS
UNDERSTANDING THREATS AND VULNERABILITIES REPORTING COMPLIANCE METRICS
CATEGORIES OF MODERN CYBER THREATS POLICY ENFORCEMENT AUTOMATION
THE ROLE OF AUTOMATION IN THREAT MITIGATION GOVERNANCE MODELS WITH AUTOMATED SECURITY
INTRODUCTION TO SECURITY ARCHITECTURE PART 5: AUTOMATION IN SECURITY OPERATIONS
COMPONENTS OF A SECURE ARCHITECTURE FUNDAMENTALS OF AUTOMATION IN SECURITY
ALIGNING ARCHITECTURE WITH BUSINESS OBJECTIVES TYPES OF SECURITY AUTOMATION
THE PRINCIPLES OF RISK MANAGEMENT USE CASES FOR AUTOMATION
IDENTIFYING AND PRIORITIZING RISKS CHALLENGES IN SECURITY AUTOMATION
RISK ASSESSMENT METHODOLOGIES SCRIPTING BASICS FOR AUTOMATION
AUTOMATING RISK DETECTION AND REPORTING PYTHON FOR SECURITY TASKS
PART 2: BUILDING AN AUTOMATED SECURITY FRAMEWORK BASH AND POWERSHELL APPLICATIONS
DEVELOPING A SECURITY ARCHITECTURE STRATEGY AUTOMATING LOG COLLECTION AND ANALYSIS
SECURITY LAYERS AND AUTOMATION CUSTOM AUTOMATION PROJECTS
RISK MANAGEMENT TOOLS AND PLATFORMS TESTING AND VALIDATING AUTOMATION SCRIPTS
AUTOMATED COMPLIANCE CHECKS PART 6: SECURITY ORCHESTRATION, AUTOMATION, AND RESPONSE (SOAR)
AUTOMATING RISK MITIGATION PLANS WHAT IS SOAR?
REAL-TIME RISK MONITORING COMPONENTS OF A SOAR PLATFORM
SECURITY-BY-DESIGN AND INFRASTRUCTURE HARDENING BENEFITS OF IMPLEMENTING SOAR
SECURITY POLICY AUTOMATION SOAR USE CASES IN ENTERPRISES
CASE STUDY: AUTOMATED SECURITY ARCHITECTURE INTEGRATING SIEM AND SOAR
CHALLENGES IN AUTOMATING RISK MANAGEMENT DEVELOPING SOAR PLAYBOOKS
PART 3: AUTOMATED INCIDENT RESPONSE STRATEGIES ORCHESTRATING TOOLS WITH APIS
THE LIFECYCLE OF AN INCIDENT RESPONSE PLAN CASE STUDY: SOAR IMPLEMENTATION
KEY PHASES OF INCIDENT RESPONSE MANAGING SOAR WORKFLOWS
INTEGRATING AUTOMATION INTO INCIDENT RESPONSE MEASURING SOAR EFFICIENCY
RESPONSE PLAYBOOKS AND AUTOMATION WORKFLOWS PART 7: AUTOMATION TOOLS AND TECHNOLOGIES
AUTOMATING CONTAINMENT PROCEDURES OVERVIEW OF CYBERSECURITY AUTOMATION TOOLS
AUTOMATING RECOVERY ACTIONS TOOL SELECTION CRITERIA
REAL-TIME ALERTS AND AUTOMATED REMEDIATION OPEN SOURCE VS. COMMERCIAL TOOLS
BEHAVIORAL ANALYSIS IN INCIDENT DETECTION AUTOMATING VULNERABILITY ASSESSMENT
CASE STUDY: AUTOMATED INCIDENT CONTAINMENT AUTOMATED PENETRATION TESTING PLATFORMS
POST-INCIDENT AUTOMATION AND REPORTING CLOUD SECURITY TOOLS AND AUTOMATION
PART 4: COMPLIANCE, STANDARDS, AND GOVERNANCE ENDPOINT SECURITY AUTOMATION TOOLS
COMPLIANCE AND STANDARDS OVERVIEW INTRUSION DETECTION AND PREVENTION SYSTEMS
ISO 27001 AND AUTOMATED CONTROLS CONTINUOUS MONITORING SOLUTIONS
EVALUATING TOOL PERFORMANCE UNDERSTANDING CYBERSECURITY INCIDENT MANAGEMENT
PART 8: CLOUD AND DEVSECOPS AUTOMATION IMPORTANCE OF PREPARATION AND PLANNING
INTRODUCTION TO CLOUD SECURITY AUTOMATION TYPES OF CYBERSECURITY INCIDENTS
AUTOMATING CLOUD CONFIGURATION CHECKS ROLES AND RESPONSIBILITIES IN INCIDENT RESPONSE
CLOUD ACCESS MONITORING TOOLS DEVELOPING AN INCIDENT RESPONSE STRATEGY
SECURING INFRASTRUCTURE AS CODE FRAMEWORKS AND BEST PRACTICES FOR PREPARATION
INTRODUCTION TO DEVSECOPS BUILDING AN INCIDENT RESPONSE TEAM
AUTOMATING CI/CD SECURITY CREATING AN INCIDENT MANAGEMENT POLICY
INTEGRATING STATIC AND DYNAMIC TESTING INTEGRATION WITH ENTERPRISE RISK MANAGEMENT
DEVSECOPS TOOLS AND WORKFLOWS LEGAL AND REGULATORY FOUNDATIONS OF INCIDENT MANAGEMENT
KUBERNETES AND CONTAINER SECURITY PART 2: THREAT RESPONSE FUNDAMENTALS
SERVERLESS SECURITY AUTOMATION DEFINING AND IDENTIFYING THREATS
PART 9: IDENTITY, DATA, AND NETWORK SECURITY AUTOMATION THREAT INTELLIGENCE AND ITS ROLE
INTRODUCTION TO IAM DETECTION MECHANISMS AND INDICATORS
AUTOMATING ACCESS PROVISIONING REAL-TIME MONITORING TOOLS
ROLE-BASED ACCESS AUTOMATION THREAT CLASSIFICATION AND PRIORITIZATION
PRIVILEGED ACCESS MANAGEMENT COORDINATING THREAT RESPONSE ACTIVITIES
DATA SECURITY BASICS AUTOMATED THREAT RESPONSE
AUTOMATING DATA LOSS PREVENTION REPORTING AND ESCALATION PROCEDURES
DATA ENCRYPTION AUTOMATION INTERNAL COMMUNICATION DURING THREATS
NETWORK SECURITY OVERVIEW EXTERNAL NOTIFICATION AND REGULATORY REPORTING
AUTOMATING NETWORK THREAT DETECTION PART 3: POST-INCIDENT ACTIVITIES
SECURING REMOTE ACCESS AND VPNS POST-INCIDENT REVIEW PROCESS
PART 10: ADVANCING WITH INCIDENT RESPONSE AUTOMATION DOCUMENTING LESSONS LEARNED
AUTOMATING THREAT INTELLIGENCE CORRELATION FORENSICS AND ROOT CAUSE ANALYSIS
INCIDENT RESPONSE AUTOMATION BEST PRACTICES STAKEHOLDER COMMUNICATION POST-INCIDENT
INTEGRATION WITH SECURITY ECOSYSTEMS REMEDIATION PLANNING
USING AI IN THREAT HUNTING AND RESPONSE SYSTEM AND DATA RECOVERY TECHNIQUES
AUTOMATION FOR PHISHING INCIDENT HANDLING UPDATING SECURITY CONTROLS POST-BREACH
AUTOMATING MALWARE ANALYSIS PSYCHOLOGICAL AND ORGANIZATIONAL RECOVERY
CASE MANAGEMENT AND TICKETING INTEGRATION COMMUNICATING WITH CUSTOMERS AND THE PUBLIC
REAL-TIME FORENSIC DATA COLLECTION STRENGTHENING POLICIES AND PROCEDURES
METRICS FOR EVALUATING AUTOMATION PART 4: PROGRAM ASSESSMENT AND MATURITY
FUTURE TRENDS IN CYBERSECURITY AUTOMATION ASSESSING THE CURRENT INCIDENT MANAGEMENT PROGRAM
MATURITY MODELS FOR INCIDENT MANAGEMENT
CYBERSECURITY INCIDENT MANAGEMENT IDENTIFYING GAPS AND WEAKNESSES
USING METRICS AND KPIS FOR EVALUATION
TITLE OF THE BOOK: CYBERSECURITY INCIDENT MANAGEMENT: BENCHMARKING AGAINST INDUSTRY STANDARDS
STRATEGIES, RESPONSE, AND RECOVERY IN THE DIGITAL AGE INTERNAL AND EXTERNAL AUDITS
PART 1: FOUNDATIONS OF CYBERSECURITY INCIDENT MANAGEMENT REVIEWING INCIDENT LOGS AND TRENDS
RISK-BASED IMPROVEMENT PLANNING REGULATORY NOTIFICATION REQUIREMENTS
IMPLEMENTING CHANGE MANAGEMENT MANAGING VENDOR AND PARTNER COMMUNICATION
CONTINUOUS PROGRAM EVALUATION COORDINATING WITH LEGAL TEAMS
PART 5: BUILDING A RESILIENT INCIDENT RESPONSE PROGRAM INCIDENT DISCLOSURE STRATEGIES
STRUCTURING AN EFFECTIVE RESPONSE PROGRAM COORDINATING WITH LAW ENFORCEMENT
ALIGNING WITH BUSINESS OBJECTIVES INTERNATIONAL COOPERATION AND COMPLIANCE
TRAINING AND AWARENESS FOR STAFF COMMUNICATION AFTER INCIDENT CONTAINMENT
ROLE-BASED INCIDENT TRAINING PART 9: INCIDENT SCENARIOS AND RESPONSE MODELS
COLLABORATING ACROSS DEPARTMENTS RANSOMWARE ATTACK MANAGEMENT
ENHANCING CROSS-TEAM COMMUNICATION PHISHING AND SOCIAL ENGINEERING RESPONSE
SIMULATION AND TABLETOP EXERCISES INSIDER THREAT INCIDENTS
REVIEWING BUSINESS CONTINUITY PLANS DDOS ATTACK RESPONSE
ESTABLISHING SECURE BACKUP PROTOCOLS SUPPLY CHAIN ATTACKS
DEVELOPING THIRD-PARTY RESPONSE PLANS ZERO-DAY EXPLOIT RESPONSES
PART 6: THE ROLE OF THE INCIDENT COMMANDER CLOUD BREACH SCENARIO PLANNING
DEFINING THE ROLE OF THE INCIDENT COMMANDER REMOTE WORKFORCE INCIDENT MODELS
COMMAND LEADERSHIP IN A CYBER CRISIS COMPROMISED CREDENTIALS AND IDENTITY THEFT
COORDINATION BETWEEN TEAMS SCENARIO-BASED TRAINING PROGRAMS
COMMUNICATION MANAGEMENT AND OVERSIGHT PART 10: FUTURE TRENDS AND STRATEGIC PREPAREDNESS
DECISION-MAKING UNDER PRESSURE EVOLUTION OF CYBER THREATS
ASSIGNING ROLES DURING AN INCIDENT PREDICTIVE INCIDENT MANAGEMENT
LEADING DURING SIMULATIONS ROLE OF AI AND MACHINE LEARNING
CRISIS COMMUNICATION TRAINING INTEGRATION OF CYBERSECURITY WITH DEVOPS
AFTER-ACTION REPORTING THREAT HUNTING AND PROACTIVE DEFENSE
SUPPORTING THE ORGANIZATION POST-CRISIS ADAPTING TO REGULATORY CHANGES
PART 7: TECHNOLOGY AND TOOLS IN INCIDENT MANAGEMENT INCIDENT RESPONSE IN CRITICAL INFRASTRUCTURE
ESSENTIAL SECURITY TOOLS FOR DETECTION CROSS-BORDER DATA BREACH CHALLENGES
THREAT INTELLIGENCE PLATFORMS PREPARING FOR THE UNKNOWN
SIEM AND LOG ANALYSIS TOOLS BUILDING A CULTURE OF SECURITY RESILIENCE
AUTOMATION AND SOAR TOOLS
ENDPOINT DETECTION AND RESPONSE WIRELESS NETWORK SECURITY
TICKETING AND CASE MANAGEMENT
COMMUNICATION AND COLLABORATION PLATFORMS TITLE OF THE BOOK: WIRELESS NETWORK SECURITY: DEFENDING THE
CLOUD-BASED INCIDENT MANAGEMENT TOOLS AIRWAVES IN A CONNECTED WORLD
VULNERABILITY SCANNING AND REMEDIATION TOOLS PART 1: THE WIRELESS SECURITY MINDSET
MOBILE AND IOT INCIDENT MANAGEMENT INTRODUCTION TO THE WIRELESS SECURITY MINDSET
PART 8: COMMUNICATION AND COORDINATION THE EVOLUTION OF WIRELESS TECHNOLOGIES
CREATING AN INCIDENT COMMUNICATION PLAN SECURITY IMPLICATIONS OF WIRELESS CONNECTIVITY
INTERNAL REPORTING STRUCTURES RISKS OF GOING WIRELESS IN THE ENTERPRISE
MEDIA AND PUBLIC RELATIONS PROTOCOLS UNDERSTANDING THE WIRELESS THREAT LANDSCAPE
THE ROLE OF SECURITY CULTURE IN WIRELESS USE EXPLOITING AUTO-CONNECT FEATURES
WIRELESS SECURITY VS WIRED SECURITY BEACON FLOODING AND PROBE REQUESTS
CHALLENGES IN SECURING MOBILE ENVIRONMENTS CAPTIVE PORTAL ATTACKS
CYBER HYGIENE IN WIRELESS OPERATIONS LURING USERS WITH ROGUE APS
WIRELESS SECURITY IN THE INTERNET OF THINGS ERA CLIENT-SIDE EXPLOITS VIA WI-FI
PART 2: WIRELESS TOOLS AND GADGETS PHISHING AND CREDENTIAL HARVESTING VIA WI-FI
OVERVIEW OF WIRELESS COMMUNICATION TOOLS CROSS-SITE SCRIPTING AND CLIENT WEAKNESSES
COMMON WIRELESS PROTOCOLS AND STANDARDS EXPLOITING BYOD ENVIRONMENTS
UNDERSTANDING WIRELESS ADAPTERS AND ANTENNAS DEFENSIVE MEASURES FOR WIRELESS ENDPOINTS
TOOLS FOR WIRELESS NETWORK DISCOVERY PART 6: THEORY OF DEFENSE FOR SECURING WIRELESS NETWORKS
MOBILE DEVICES AND SECURITY CONFIGURATIONS PRINCIPLES OF WIRELESS DEFENSE
WIRELESS ANALYSIS HARDWARE AND SOFTWARE SECURE DESIGN OF WIRELESS NETWORKS
HACKING GADGETS AND THEIR CAPABILITIES RISK ASSESSMENT FOR WIRELESS DEPLOYMENTS
SDR (SOFTWARE DEFINED RADIO) IN WIRELESS SECURITY CHOOSING THE RIGHT ENCRYPTION METHODS
WIRELESS PENETRATION TESTING KITS ROLE-BASED ACCESS CONTROL FOR WI-FI
CHOOSING THE RIGHT TOOLS FOR SECURE DEPLOYMENT SECURING NETWORK ACCESS AND AUTHENTICATION
PART 3: THEORY OF ATTACKS ON WIRELESS NETWORKS FIREWALL INTEGRATION WITH WIRELESS NETWORKS
ANATOMY OF A WIRELESS ATTACK BEHAVIOR MONITORING AND ANOMALY DETECTION
COMMON VULNERABILITIES IN WIRELESS PROTOCOLS WIRELESS INTRUSION DETECTION SYSTEMS (WIDS)
EAVESDROPPING AND PACKET SNIFFING THREAT MODELING FOR WIRELESS ENVIRONMENTS
ROGUE APS AND EVIL TWIN ATTACKS PART 7: UNDERSTANDING THE WPA2-ENTERPRISE WITH CERTIFICATES
DENIAL OF SERVICE IN WIRELESS NETWORKS ARCHITECTURE
DEAUTHENTICATION ATTACKS WHAT IS WPA2-ENTERPRISE AND WHY USE IT
ENCRYPTION WEAKNESSES IN LEGACY PROTOCOLS COMPONENTS OF WPA2-ENTERPRISE
WIRELESS HIJACKING TECHNIQUES ROLE OF RADIUS IN SECURE AUTHENTICATION
SOCIAL ENGINEERING IN WIRELESS ENVIRONMENTS DIGITAL CERTIFICATES IN WPA2-ENTERPRISE
THE LIFECYCLE OF A WIRELESS BREACH SETTING UP AN INTERNAL CERTIFICATE AUTHORITY
PART 4: ATTACKING WIRELESS NETWORKS CERTIFICATE LIFECYCLE AND MANAGEMENT
WIRELESS NETWORK ENUMERATION TECHNIQUES EAP-TLS AND SECURE AUTHENTICATION PROTOCOLS
CRACKING WEP ENCRYPTION TRUST CHAINS AND ROOT CERTIFICATE AUTHORITIES
EXPLOITING WPA/WPA2 PRE-SHARED KEY SECURITY BENEFITS OF WPA2-ENTERPRISE OVER PSK
BYPASSING MAC ADDRESS FILTERING REAL-WORLD EXAMPLES OF ENTERPRISE DEPLOYMENTS
MITM (MAN-IN-THE-MIDDLE) ATTACKS PART 8: DEPLOYING A WPA-ENTERPRISE NETWORK WITH CERTIFICATES
USING AIRCRACK-NG AND SIMILAR TOOLS PLANNING A SECURE WIRELESS INFRASTRUCTURE
CAPTURING HANDSHAKES AND DICTIONARY ATTACKS NETWORK SEGMENTATION FOR WIRELESS SECURITY
USING FAKE APS FOR INTERCEPTION IMPLEMENTING EAP-TLS ON CLIENTS
EXPLOITING MISCONFIGURED WIRELESS DEVICES CONFIGURING RADIUS AND SERVER CERTIFICATES
AUTOMATED WIRELESS EXPLOITATION TOOLS BEST PRACTICES FOR CERTIFICATE DISTRIBUTION
PART 5: ATTACKING WIRELESS CLIENTS TESTING ENTERPRISE WIRELESS AUTHENTICATION
WHY WIRELESS CLIENTS ARE EASY TARGETS TROUBLESHOOTING COMMON DEPLOYMENT ISSUES
ROLE OF MOBILE DEVICE MANAGEMENT (MDM) HYBRID ENCRYPTION MODELS
SCALING THE ENTERPRISE WIRELESS DEPLOYMENT PROTOCOL FAILURES AND HISTORICAL BREACHES
INTEGRATING WPA3 AND FUTURE PROTOCOLS PART 2: ADVANCED CRYPTOGRAPHIC CONCEPTS
PART 9: DEPLOYING SECURE WIRELESS NETWORKS PHILOSOPHY OF SECURITY BY CRYPTOSTAKES SCHEMES
SECURING THE ACCESS POINT CONFIGURATION UNDERSTANDING SYMMETRIC VS ASYMMETRIC ALGORITHMS
SETTING WIRELESS SIGNAL BOUNDARIES KEY EXCHANGE PROTOCOLS: DH AND RSA
USING VLANS WITH WIRELESS NETWORKS QUANTUM-SAFE CRYPTOGRAPHIC APPROACHES
SECURING GUEST AND EMPLOYEE NETWORKS HOMOMORPHIC ENCRYPTION AND SECURE COMPUTING
DETECTING AND PREVENTING ROGUE DEVICES ELLIPTIC CURVE CRYPTOGRAPHY IN COMMUNICATION
USING WIDS/WIPS EFFECTIVELY ZERO-KNOWLEDGE PROOFS AND THEIR APPLICATIONS
SECURE REMOTE WIRELESS ACCESS BLOCKCHAIN PRINCIPLES IN SECURE MESSAGING
MONITORING AND LOGGING WIRELESS ACTIVITY RANDOM NUMBER GENERATORS AND CRYPTOGRAPHIC STRENGTH
ENDPOINT SECURITY IN WIRELESS ENVIRONMENTS POST-QUANTUM PROTOCOL DESIGN
INTEGRATING WIRELESS WITH OVERALL NETWORK SECURITY PART 3: KEY MANAGEMENT INNOVATIONS
PART 10: HANDLING ROGUE ACCESS POINTS AND THE FUTURE OF WIRELESS ZERO-SHARE KEY MANAGEMENT FOR SECURE COMMUNICATION ACROSS A
SECURITY CHANNEL
IDENTIFYING ROGUE ACCESS POINTS CHALLENGES IN KEY DISTRIBUTION AND STORAGE
STRATEGIES TO MITIGATE ROGUE ACCESS RISKS SECURE MULTI-PARTY COMPUTATION TECHNIQUES
PHYSICAL SECURITY OF WIRELESS INFRASTRUCTURE HARDWARE SECURITY MODULES IN KEY MANAGEMENT
ROLE OF AI AND ML IN WIRELESS SECURITY EPHEMERAL KEY STRATEGIES
FUTURE THREATS IN WIRELESS NETWORKS DECENTRALIZED KEY ARCHITECTURES
WI-FI 6 AND EMERGING TECHNOLOGIES THRESHOLD CRYPTOGRAPHY SYSTEMS
SECURING MESH NETWORKS AND WIRELESS BACKHAUL KEY ROTATION AND EXPIRY PROTOCOLS
WIRELESS SECURITY FOR SMART CITIES DIGITAL WALLETS AND SECURE KEY ACCESS
GOVERNMENT REGULATIONS AND WIRELESS COMPLIANCE SECRETS MANAGEMENT IN DEVSECOPS
PREPARING FOR THE FUTURE OF WIRELESS THREATS PART 4: INTELLIGENT INTRUSION DETECTION
SOFT COMPUTING-BASED INTRUSION DETECTION SYSTEM WITH REDUCED
SECURE COMMUNICATION PROTOCOLS FALSE POSITIVE RATE
IDS ARCHITECTURE AND COMPONENTS
TITLE OF THE BOOK: SECURE COMMUNICATION PROTOCOLS: SIGNATURE-BASED DETECTION LIMITATIONS
FOUNDATIONS, INNOVATIONS, AND FUTURE DIRECTIONS ANOMALY DETECTION VIA AI AND ML
PART 1: FOUNDATIONS OF SECURE COMMUNICATION RULE-BASED EXPERT SYSTEMS IN SECURITY
HISTORY AND GENERATIONS OF SECURITY PROTOCOLS HYBRID IDS FRAMEWORKS
ORIGINS OF CRYPTOGRAPHIC COMMUNICATION ADAPTIVE LEARNING IN IDS SYSTEMS
CLASSICAL CIPHER SYSTEMS AND LIMITATIONS DEEP LEARNING FOR THREAT PATTERN RECOGNITION
EVOLUTION OF INFORMATION SECURITY ALGORITHMS CORRELATION ENGINES AND THREAT INTELLIGENCE
FUNDAMENTALS OF SECURE CHANNEL DESIGN NEXT-GEN IDS AND SIEM INTEGRATION
PUBLIC-KEY INFRASTRUCTURE FUNDAMENTALS PART 5: FPGA AND BLOCK CIPHER ADVANCES
PROTOCOL LAYERING AND SECURITY INTEGRATION RECURSIVELY PAIRED ARITHMETIC TECHNIQUE (RPAT): AN FPGA-BASED
THE RISE OF DIGITAL SIGNATURE PROTOCOLS BLOCK CIPHER SIMULATION AND ITS CRYPTANALYSIS
INTRODUCTION TO BLOCK CIPHER DESIGN ROLE-BASED ACCESS IN INFRASTRUCTURE PROTOCOLS
FPGA AS A PLATFORM FOR CRYPTOGRAPHIC SIMULATION AUTONOMOUS GRID DEFENSE PROTOCOLS
BIT-LEVEL CRYPTANALYSIS TECHNIQUES PART 9: CLOUD AND MOBILE COMMUNICATION PROTOCOLS
SIDE-CHANNEL ATTACKS AND COUNTERMEASURES SECURITY PROTOCOL FOR CLOUD-BASED COMMUNICATION
ENERGY-EFFICIENT ENCRYPTION ALGORITHMS IDENTITY FEDERATION AND SSO IN CLOUD ENVIRONMENTS
LIGHTWEIGHT CIPHERS FOR IOT DEVICES MULTI-TENANT DATA ISOLATION PROTOCOLS
STREAM VS BLOCK CIPHER PERFORMANCE ANALYSIS ENCRYPTION STANDARDS FOR CLOUD STORAGE
DYNAMIC CIPHER RECONFIGURATION IN HARDWARE ZERO TRUST IN CLOUD PROTOCOL ARCHITECTURES
FUTURE OF FPGA-BASED SECURITY PROTOCOLS SECURITY PROTOCOLS FOR MOBILE COMMUNICATIONS
PART 6: MULTIMEDIA AND STREAMING SECURITY SECURING MOBILE APIS AND BACKEND SERVERS
SECURITY PROTOCOL FOR MULTIMEDIA STREAMING PRIVACY AND AUTHENTICATION ON SECURITY PROTOCOL FOR MOBILE
REAL-TIME ENCRYPTION CHALLENGES COMMUNICATIONS
SECURING AUDIO AND VIDEO CONTENT DELIVERY MOBILE APP COMMUNICATION PROTOCOLS
DRM (DIGITAL RIGHTS MANAGEMENT) PROTOCOLS MOBILE VPNS AND END-TO-END ENCRYPTION
MULTICAST AND BROADCAST SECURITY MODELS PART 10: MACHINE LEARNING AND THE FUTURE OF PROTOCOLS
PREVENTING REPLAY ATTACKS IN STREAMING USE OF MACHINE LEARNING IN DESIGN OF SECURITY PROTOCOLS
ADAPTIVE BITRATE ENCRYPTION TECHNIQUES REINFORCEMENT LEARNING FOR SECURE PROTOCOL ADAPTATION
SECURE STREAMING OVER UNTRUSTED NETWORKS AI-DRIVEN THREAT EVASION MODELS
USER AUTHENTICATION IN MEDIA SERVICES SELF-HEALING COMMUNICATION PROTOCOLS
EMERGING PROTOCOLS FOR IMMERSIVE MEDIA AI VS ADVERSARIAL ATTACKS ON PROTOCOLS
PART 7: NATURE-INSPIRED AND BEHAVIORAL SECURITY CLOUD COMMUNICATION: DIFFERENT SECURITY MEASURES AND
NATURE INSPIRED APPROACH FOR INTRUSION DETECTION SYSTEMS CRYPTOGRAPHIC PROTOCOLS FOR SECURE CLOUD COMPUTING
GENETIC ALGORITHMS IN CYBERSECURITY PROTOCOL INNOVATION IN SERVERLESS ARCHITECTURES
SWARM INTELLIGENCE MODELS IN PROTOCOL DEFENSE REAL-TIME ML ANALYSIS FOR PROTOCOL BREACH DETECTION
FUZZY LOGIC SYSTEMS FOR ANOMALY DETECTION AUDITING ML-BASED PROTOCOLS FOR COMPLIANCE
THE SOCIO-BEHAVIORAL CIPHER TECHNIQUE THE FUTURE OF SECURE COMMUNICATION PROTOCOLS IN A
BEHAVIORAL BIOMETRICS IN PROTOCOL SECURITY HYPERCONNECTED WORLD
USER PROFILING FOR ACCESS CONTROL
THREAT MODELING BASED ON HUMAN BEHAVIOR CYBERSECURITY TRENDS AND EMERGING THREATS
SIMULATION OF ATTACKS USING BEHAVIORAL MODELS
ADAPTIVE PROTOCOL TUNING BASED ON BEHAVIOR TITLE OF THE BOOK: CYBERSECURITY TRENDS AND EMERGING THREATS:
PART 8: SMART GRID AND INFRASTRUCTURE PROTOCOLS STRATEGIES, INNOVATIONS, AND THE FUTURE OF DIGITAL DEFENSE
INTRUSION DETECTION STRATEGIES IN SMART GRID PART 1: BUILDING THE FOUNDATION OF CYBERSECURITY STRATEGY
UNIQUE CHALLENGES IN SMART INFRASTRUCTURE SECURITY INGREDIENTS FOR A SUCCESSFUL CYBERSECURITY STRATEGY
PROTOCOLS FOR CRITICAL INFRASTRUCTURE DEFENSE DEFINING SECURITY OBJECTIVES AND SCOPE
ROLE OF SCADA IN GRID SECURITY RISK ASSESSMENT AND PRIORITIZATION
ENCRYPTED TELEMETRY PROTOCOLS DEVELOPING SECURITY GOVERNANCE MODELS
SECURE COMMUNICATION IN ENERGY IOT DEVICES ALIGNING CYBERSECURITY WITH BUSINESS GOALS
BLOCKCHAIN FOR GRID TRANSACTION INTEGRITY CREATING A CULTURE OF CYBERSECURITY AWARENESS
THREAT MODELING FOR SMART UTILITIES STAKEHOLDER ROLES AND RESPONSIBILITIES
POLICY AND COMPLIANCE INTEGRATION ALIGNING WITH REGULATORY REQUIREMENTS (HIPAA, GDPR, PCI-DSS)
BUDGETING AND RESOURCE ALLOCATION SECURITY BY DESIGN AND SECURE SOFTWARE DEVELOPMENT
BUILDING A RESILIENT SECURITY PROGRAM DATA PROTECTION AND ENCRYPTION PRACTICES
PART 2: LEVERAGING VULNERABILITY TRENDS TO REDUCE RISK DEFENSE IN DEPTH AND ZERO TRUST ARCHITECTURE
USING VULNERABILITY TRENDS TO REDUCE RISK AND COSTS BUILDING A SECURITY OPERATIONS CENTER (SOC)
UNDERSTANDING THE COMMON VULNERABILITIES AND EXPOSURES (CVE) IDENTITY-CENTRIC SECURITY STRATEGIES
SYSTEM USER BEHAVIOR ANALYTICS AND ADAPTIVE SECURITY
PRIORITIZING PATCH MANAGEMENT INTEGRATING CYBERSECURITY INTO ENTERPRISE ARCHITECTURE
AUTOMATION IN VULNERABILITY DETECTION PART 6: IMPLEMENTING SECURITY STRATEGY EFFECTIVELY
THIRD-PARTY RISK AND SOFTWARE SUPPLY CHAIN STRATEGY IMPLEMENTATION
INTEGRATING THREAT INTELLIGENCE WITH VULNERABILITY MANAGEMENT CREATING IMPLEMENTATION ROADMAPS AND MILESTONES
ADDRESSING INSIDER THREATS INTEGRATING SECURITY TOOLS AND PLATFORMS
CONDUCTING RED TEAM AND BLUE TEAM EXERCISES CHANGE MANAGEMENT AND CYBERSECURITY ADOPTION
IMPLEMENTING BUG BOUNTY PROGRAMS TRAINING AND UPSKILLING SECURITY TEAMS
REDUCING COSTS THROUGH PROACTIVE MITIGATION PARTNERING WITH MANAGED SECURITY SERVICE PROVIDERS (MSSPS)
PART 3: THE EVOLVING MALWARE THREAT LANDSCAPE SECURE DEVOPS (DEVSECOPS) AND AGILE SECURITY PRACTICES
THE EVOLUTION OF THE THREAT LANDSCAPE – MALWARE CLOUD-NATIVE IMPLEMENTATION STRATEGIES
TYPES OF MALWARE: RANSOMWARE, TROJANS, WORMS, AND MORE MONITORING AND TUNING SECURITY CONTROLS
FILELESS MALWARE AND MEMORY ATTACKS AVOIDING COMMON PITFALLS IN IMPLEMENTATION
ADVANCED PERSISTENT THREATS (APTS) AND MALWARE PART 7: MEASURING CYBERSECURITY PERFORMANCE
MALWARE-AS-A-SERVICE (MAAS) AND THE DARK WEB MEASURING PERFORMANCE AND EFFECTIVENESS
EVASION TECHNIQUES AND OBFUSCATION METHODS KEY PERFORMANCE INDICATORS (KPIS) FOR SECURITY
MALWARE TARGETING IOT AND MOBILE DEVICES SECURITY MATURITY MODELS AND BENCHMARKS
BEHAVIORAL DETECTION AND SANDBOXING CONTINUOUS MONITORING AND METRICS COLLECTION
INCIDENT CASE STUDIES ON MALWARE INFECTIONS SECURITY AUDITS AND GAP ANALYSIS
DEVELOPING MALWARE RESPONSE PLANS ROI OF CYBERSECURITY INVESTMENTS
PART 4: INTERNET-BASED THREATS IN THE DIGITAL AGE REPORTING TO EXECUTIVES AND THE BOARD
INTERNET-BASED THREATS COMPLIANCE REPORTING AND LEGAL CONSIDERATIONS
PHISHING, SPEAR PHISHING, AND WHALING ADAPTING STRATEGY BASED ON PERFORMANCE DATA
DOMAIN SPOOFING AND DNS HIJACKING CYBER RISK QUANTIFICATION TECHNIQUES
DDOS ATTACKS AND MITIGATION STRATEGIES PART 8: CLOUD SECURITY AND COMPLIANCE
SOCIAL ENGINEERING AND HUMAN EXPLOITATION THE CLOUD – A MODERN APPROACH TO SECURITY AND COMPLIANCE
DRIVE-BY DOWNLOADS AND MALICIOUS ADVERTISEMENTS SHARED RESPONSIBILITY MODEL IN CLOUD SECURITY
EXPLOIT KITS AND WEB-BASED VULNERABILITIES SECURING CLOUD INFRASTRUCTURE (IAAS, PAAS, SAAS)
WEB APPLICATION ATTACKS (XSS, SQLI) DATA LOSS PREVENTION IN THE CLOUD
SECURING REMOTE ACCESS AND VPN USAGE IDENTITY AND ACCESS MANAGEMENT IN CLOUD ENVIRONMENTS
DEFENDING AGAINST IOT-BASED BOTNETS CLOUD-NATIVE SECURITY TOOLS AND SERVICES
PART 5: CYBERSECURITY STRATEGIES FOR MODERN ENTERPRISES COMPLIANCE IN MULTI-CLOUD AND HYBRID ENVIRONMENTS
CYBERSECURITY STRATEGIES CLOUD MISCONFIGURATION RISKS AND PREVENTION
STRATEGY FRAMEWORKS: NIST, ISO, CIS CLOUD THREAT INTELLIGENCE AND MONITORING
BUSINESS CONTINUITY AND DISASTER RECOVERY IN THE CLOUD INTELLECTUAL PROPERTY
PART 9: FUTURE THREATS AND INNOVATION IN CYBERSECURITY COPYRIGHT, PATENTS, AND TRADEMARKS
AI-POWERED THREATS AND DEFENSE LICENSING AND PERMISSIONS
MACHINE LEARNING IN MALWARE DETECTION IP PROTECTION IN THE CREATIVE INDUSTRIES
DEEPFAKES AND SYNTHETIC IDENTITY FRAUD CHALLENGES IN CROSS-BORDER IP ENFORCEMENT
BLOCKCHAIN SECURITY USE CASES PROTECTING SOFTWARE AND CODE
QUANTUM COMPUTING AND CRYPTOGRAPHY IP IN THE AGE OF ARTIFICIAL INTELLIGENCE
NEXT-GENERATION ENDPOINT DETECTION AND RESPONSE EMERGING THREATS TO INTELLECTUAL PROPERTY
AUTONOMOUS CYBERSECURITY SYSTEMS OPEN SOURCE VS PROPRIETARY MODELS
CYBERSECURITY IN SMART CITIES AND CRITICAL INFRASTRUCTURE CASE STUDIES IN IP ENFORCEMENT
CHALLENGES OF SECURING 5G NETWORKS PART 3: CONTENT MARKETING, DISTRIBUTION, AND SALES MODELS
EMERGING THREATS IN VIRTUAL REALITY AND METAVERSE CONTENT MARKETING, DISTRIBUTION, AND SALES
PART 10: TOWARDS A SECURE DIGITAL FUTURE DIGITAL PLATFORMS AND DISTRIBUTION CHANNELS
EVOLVING CYBERSECURITY ROLES AND SKILLS MONETIZATION STRATEGIES FOR DIGITAL CONTENT
CYBERSECURITY LEADERSHIP AND STRATEGIC VISION STREAMING SERVICES AND RIGHTS IMPLICATIONS
LEGAL AND ETHICAL CONSIDERATIONS IN CYBER DEFENSE THE RISE OF SUBSCRIPTION-BASED MODELS
PUBLIC-PRIVATE COLLABORATION FOR THREAT INTELLIGENCE GLOBAL DISTRIBUTION AND LOCALIZATION CHALLENGES
CYBERSECURITY POLICY AND GLOBAL REGULATIONS PIRACY AND UNLICENSED DISTRIBUTION
BUILDING RESILIENCE THROUGH SIMULATION AND EXERCISES ETHICAL CONTENT PROMOTION
ENHANCING CYBERSECURITY THROUGH EDUCATION AND AWARENESS AFFILIATE MARKETING AND DRM INTEGRATION
THE ROLE OF DIVERSITY IN CYBERSECURITY INNOVATION ANALYTICS AND PERFORMANCE TRACKING
PREPARING FOR THE UNKNOWN: ADAPTIVE SECURITY PART 4: UNPACKING THE CONCEPT OF RIGHTS
THE FUTURE OF CYBERSECURITY: FROM PROTECTION TO PREDICTION RIGHTS
MORAL RIGHTS AND ECONOMIC RIGHTS
DIGITAL RIGHTS MANAGEMENT DIGITAL VS TRADITIONAL RIGHTS
RIGHTS CLEARANCE AND LICENSING PROCESSES
TITLE OF THE BOOK: DIGITAL RIGHTS MANAGEMENT: STRATEGIES, PERFORMANCE, MECHANICAL, AND SYNCHRONIZATION RIGHTS
STRUCTURES, AND THE FUTURE OF PROTECTED CONTENT RIGHTS MANAGEMENT ORGANIZATIONS
PART 1: UNDERSTANDING THE FOUNDATIONS OF DIGITAL RIGHTS SECONDARY AND TERTIARY RIGHTS EXPLOITATION
INTRODUCTION METADATA AND RIGHTS IDENTIFICATION
THE EVOLUTION OF CONTENT OWNERSHIP RIGHTS CONFLICTS AND RESOLUTION METHODS
THE DIGITAL CONTENT ECOSYSTEM RIGHTS IN COLLABORATIVE WORKS
LEGAL AND ETHICAL ASPECTS OF CONTENT USAGE PART 5: SOCIAL, LEGAL, AND BUSINESS INTEREST IN RIGHTS
DIGITAL TRANSFORMATION AND RIGHTS MANAGEMENT WHO CARES ABOUT RIGHTS?
HISTORY AND DEVELOPMENT OF COPYRIGHT LAWS THE ROLE OF GOVERNMENTS AND INSTITUTIONS
THE ROLE OF STAKEHOLDERS IN DIGITAL RIGHTS MEDIA COMPANIES AND RIGHTS ADVOCACY
THE ECONOMICS OF INTELLECTUAL PROPERTY RIGHTS AND USER PRIVACY
KEY LEGAL FRAMEWORKS AROUND THE WORLD PUBLIC AWARENESS AND EDUCATION
GLOBAL STANDARDS IN DIGITAL RIGHTS RIGHTS IN EDUCATIONAL AND RESEARCH MATERIALS
PART 2: INTELLECTUAL PROPERTY IN THE DIGITAL ERA MEDIA CONSUMERS AND FAIR USE
THE ROLE OF RIGHTS IN INNOVATION CONSUMER RIGHTS AND LEGAL RECOURSE
TRANSPARENCY AND ACCOUNTABILITY IN RIGHTS MANAGEMENT EDUCATION AND TRAINING ON DRM TOOLS
BUILDING A RIGHTS-CONSCIOUS CULTURE DRM AND DEVICE INTEROPERABILITY
PART 6: WHAT IS DIGITAL RIGHTS MANAGEMENT (DRM)? USER FEEDBACK AND PRODUCT IMPROVEMENT
WHAT IS DIGITAL RIGHTS MANAGEMENT (DRM)? COMMUNITY ENGAGEMENT AND TRANSPARENCY
DRM TECHNOLOGIES AND TECHNIQUES RESPONDING TO PUBLIC DRM CONTROVERSIES
DRM IN STREAMING AND DOWNLOADS FUTURE ADAPTATIONS FOR CONSUMER-CENTRIC DRM
ENCRYPTION, TOKENIZATION, AND WATERMARKING PART 10: THE FUTURE OF DRM AND FINAL REFLECTIONS
ACCESS CONTROL MECHANISMS CONCLUSION AND QUESTIONS
DEVICE AND PLATFORM RESTRICTIONS REASSESSING THE ROLE OF DRM IN A DIGITAL SOCIETY
DRM IN EBOOKS AND SOFTWARE GLOBAL TRENDS IN RIGHTS ENFORCEMENT
DRM LIMITATIONS AND CRITICISM INNOVATIONS IN RIGHTS MANAGEMENT TECHNOLOGIES
ALTERNATIVES TO DRM PRIVACY-PRESERVING DRM SYSTEMS
ETHICAL DEBATES AROUND DRM RIGHTS MANAGEMENT IN THE METAVERSE
PART 7: DESIGNING AND IMPLEMENTING DRM SYSTEMS INTEGRATING AI AND MACHINE LEARNING IN DRM
DESIGNING AND IMPLEMENTING DRM RESILIENCE AGAINST FUTURE PIRACY MODELS
REQUIREMENTS GATHERING AND RISK ASSESSMENT ETHICS AND HUMAN-CENTRIC RIGHTS ENFORCEMENT
CHOOSING THE RIGHT DRM ARCHITECTURE STRATEGIC ROADMAP FOR NEXT-GENERATION DRM
DRM INTEGRATION WITH CONTENT MANAGEMENT SYSTEMS
ENSURING USER EXPERIENCE AND ACCESSIBILITY ON-THE-JOB TRAINING
COMPLIANCE WITH GLOBAL DRM REGULATIONS
TESTING AND VALIDATION OF DRM SYSTEMS TITLE OF THE BOOK: CYBERSECURITY ON-THE-JOB TRAINING: A PRACTICAL
MAINTENANCE AND SCALABILITY FRAMEWORK FOR WORKFORCE DEVELOPMENT
DRM VENDOR AND SOLUTION SELECTION PART 1: FOUNDATIONS OF CYBERSECURITY OJT
CASE STUDIES ON DRM IMPLEMENTATION THE BENEFITS OF EFFECTIVE ON-THE-JOB TRAINING
PART 8: DRM-ENABLED BUSINESS MODELS AND STRATEGIES IMPORTANCE OF REAL-WORLD APPLICATION IN CYBERSECURITY
DRM-ENABLED BUSINESS MODELS TYPES OF ON-THE-JOB TRAINING IN SECURITY CONTEXTS
PAY-PER-VIEW AND SUBSCRIPTION STRATEGIES TRADITIONAL VS MODERN TRAINING APPROACHES
HYBRID LICENSING MODELS SKILL DEVELOPMENT IN CYBERSECURITY ROLES
FREEMIUM AND TIERED ACCESS THE ROLE OF MENTORSHIP IN OJT
TIME-LIMITED AND USAGE-BASED ACCESS TRAINING FOR COMPLIANCE AND SECURITY STANDARDS
DRM IN ONLINE LEARNING AND CERTIFICATION COST-EFFECTIVENESS OF OJT IN CYBERSECURITY
DRM IN ENTERPRISE DATA PROTECTION ADAPTING OJT FOR REMOTE AND HYBRID TEAMS
MUSIC AND FILM INDUSTRY DRM MODELS CASE STUDIES OF SUCCESSFUL CYBERSECURITY OJT PROGRAMS
GAMING INDUSTRY AND DRM PART 2: GOAL SETTING AND ACTION PLANNING
EVOLVING MONETIZATION WITH BLOCKCHAIN AND NFTS BUILDING THE RIGHT FOUNDATION: FROM IDENTIFYING GOALS TO
PART 9: LIVING WITH DRM: IMPACT AND REALITIES ESTABLISHING AN ACTION PLAN
LIVING WITH DRM ALIGNING OJT WITH ORGANIZATIONAL SECURITY OBJECTIVES
DRM AND THE END-USER EXPERIENCE DEFINING CYBERSECURITY COMPETENCY LEVELS
ACCESSIBILITY CHALLENGES IN DRM-PROTECTED CONTENT BUILDING SKILL MATRICES FOR OJT PLANNING
PLANNING FOR LONG-TERM SECURITY WORKFORCE DEVELOPMENT ANALYZING WORK, WORKER, AND WORKPLACE: HOW TO FIT THE TRAINING
CREATING ACTION PLANS BASED ON THREAT LANDSCAPE TO THE JOB
MAPPING EMPLOYEE GROWTH TO CYBERSECURITY ROLES JOB ROLE ANALYSIS FOR SECURITY OPERATIONS
CUSTOMIZING PLANS FOR DIFFERENT SECURITY SPECIALTIES ADAPTING TRAINING TO TECHNICAL SKILLSETS
COLLABORATIVE GOAL SETTING WITH TEAM LEADS ENVIRONMENT-SPECIFIC CYBERSECURITY CHALLENGES
USING INDUSTRY FRAMEWORKS FOR PLANNING (NIST/NICE) ERGONOMIC AND CULTURAL CONSIDERATIONS
PART 3: MANAGEMENT AND RESULTS ASSURANCE CUSTOMIZING FOR CLOUD, NETWORK, AND APP SECURITY ROLES
ENSURING SOUND MANAGEMENT AND CONSISTENT RESULTS ALIGNING SECURITY FRAMEWORKS WITH WORK ROLES
INTEGRATING OJT INTO CYBERSECURITY GOVERNANCE RISK-BASED ANALYSIS FOR TRAINING NEEDS
ROLE OF SUPERVISORS IN TRAINING OVERSIGHT UNDERSTANDING DAY-TO-DAY SECURITY FUNCTIONS
SETTING PERFORMANCE EXPECTATIONS HANDS-ON LAB INTEGRATION FOR JOB SIMULATION
METRICS FOR OJT SUCCESS PART 7: STRUCTURING THE TRAINING PLAN
CREATING A CULTURE OF CONTINUOUS LEARNING PREPARING THE TRAINING PLAN: HOW TO DEVELOP THE RIGHT SEQUENCE
MANAGING CHANGE IN SECURITY TRAINING PRACTICES OF ACTIVITIES
FEEDBACK LOOPS FOR IMPROVEMENT SEQUENCING SKILLS FOR PROGRESSIVE MASTERY
HANDLING TRAINING RESISTANCE IN TECHNICAL TEAMS DAILY, WEEKLY, AND MONTHLY OJT SCHEDULES
ACCOUNTABILITY STRUCTURES FOR TRAINING OUTCOMES BALANCING WORKLOAD WITH LEARNING ACTIVITIES
PART 4: PREPARING TRAINERS AND LEARNERS MILESTONE-BASED PROGRESSION
PREPARING TRAINERS AND LEARNERS CREATING TASK LISTS AND CHECKPOINTS
QUALITIES OF EFFECTIVE CYBERSECURITY TRAINERS INTEGRATING CYBER RANGE AND SIMULATION
TRAINING THE TRAINERS: TECHNICAL AND PEDAGOGICAL SKILLS SCENARIO-BASED LEARNING STRUCTURES
COACHING TECHNIQUES FOR SECURITY PROFESSIONALS ROTATIONAL TRAINING MODELS
EMPOWERING LEARNERS THROUGH ENGAGEMENT PEER REVIEW AND SHADOWING STRUCTURES
UNDERSTANDING ADULT LEARNING STYLES IN TECH PART 8: DELIVERING THE OJT SESSION
SETTING EXPECTATIONS FOR OJT PARTICIPANTS PRESENTING THE TRAINING: HOW TO CONDUCT THE OJT SESSION
BUILDING PEER LEARNING ENVIRONMENTS COMMUNICATION TECHNIQUES FOR SECURITY TRAINERS
LEVERAGING LEARNING PLATFORMS IN OJT HANDS-ON DEMONSTRATION BEST PRACTICES
CONTINUOUS SUPPORT AND MENTORSHIP BALANCING EXPLANATION WITH EXPLORATION
PART 5: DETERMINING OJT SUITABILITY INTERACTIVE TROUBLESHOOTING AS TEACHING
DISCOVERING NEEDS: HOW TO DETERMINE WHEN OJT IS APPROPRIATE ROLE PLAYING INCIDENT RESPONSE
ASSESSING CURRENT WORKFORCE SKILLS IN-THE-MOMENT COACHING AND CORRECTION
IDENTIFYING GAPS IN CYBERSECURITY CAPABILITIES LOGGING TRAINING SESSIONS FOR COMPLIANCE
EVALUATING JOB TASKS FOR OJT FIT ENCOURAGING CRITICAL THINKING DURING EXERCISES
PRIORITIZING HIGH-RISK AREAS FOR TRAINING DEBRIEFING AND KNOWLEDGE CHECKS
ADDRESSING ORGANIZATIONAL COMPLIANCE GAPS PART 9: POST-TRAINING EVALUATION AND ADJUSTMENTS
PERFORMING THREAT-INFORMED TRAINING NEEDS ANALYSIS EVALUATING RESULTS: HOW TO ASSESS POST-TRAINING JOB PERFORMANCE
BALANCING FORMAL TRAINING WITH OJT CREATING EVALUATION TOOLS AND CHECKLISTS
SELECTING CANDIDATES FOR TRAINING OPPORTUNITIES USING KPIS AND SECURITY METRICS FOR ASSESSMENT
DETERMINING ROI OF OJT INVESTMENTS MEASURING LONG-TERM SKILL RETENTION
PART 6: FITTING TRAINING TO ROLES AND ENVIRONMENTS CONDUCTING MANAGER REVIEWS OF TRAINEE PROGRESS
POST-TRAINING INCIDENT HANDLING PERFORMANCE
BENCHMARKING OJT SUCCESS WITH INDUSTRY STANDARDS
GAP ANALYSIS FOR CONTINUOUS IMPROVEMENT
RECOGNIZING AND REWARDING EXCELLENCE
ADJUSTING FUTURE OJT BASED ON OUTCOMES
PART 10: ENHANCING AND SCALING OJT PROGRAMS
REVIEWING AIDS AND ALTERNATIVES TO OJT: HOW TO ENSURE THE RIGHT
MIX OF PERFORMANCE INTERVENTIONS
INCORPORATING E-LEARNING, CERTIFICATIONS, AND LABS
BLENDED LEARNING MODELS FOR CYBERSECURITY
SUCCESS FACTORS FOR SUSTAINABLE OJT PROGRAMS
SIX IMPORTANT SUCCESS FACTORS FOR COMPREHENSIVE OJT PROGRAMS
SCALING OJT ACROSS MULTIPLE DEPARTMENTS
COLLABORATING ACROSS TEAMS FOR SECURITY AWARENESS
USING AUTOMATION AND AI IN SKILL DEVELOPMENT
BUILDING A SECURITY LEARNING CULTURE
FUTURE-PROOFING THE CYBERSECURITY WORKFORCE

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy