Information Security
- Microsoft System Center Data Protection Manager CookbookDecember 2018$25.19RRP $35.99 Save 30%Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPM
- Practical Linux Security Cookbook - Second EditionAugust 2018$25.19RRP $35.99 Save 30%Enhance file system security and learn about network attack, security tools and different versions of Linux build.
- Build EU GDPR Data Protection Compliance from Scratch (CIPT) [Video]July 2018$160.64RRP $188.99 Save 15%Get free GDPR templates and documentation - Practical GDPR blueprint
- Build GDPR Compliance for Human Resources (HR) [Video]July 2018$147.89RRP $173.99 Save 15%Free GDPR documentation and GDPR human resource (HR) hints for a practical blueprint
- Build Security Incident Response for GDPR Data Protection [Video]July 2018$160.64RRP $188.99 Save 15%Get free GDPR and incident response templates and documentation - Practical GDPR and incident response blueprint
- Learn Ethical Hacking From Scratch [Video]April 2018$164.04RRP $192.99 Save 15%Become an ethical hacker that can hack and secure computer systems
- Mastering Linux Security and Hardening [Video]April 2018$106.24RRP $124.99 Save 15%A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.
- Information Security HandbookDecember 2017$25.19RRP $35.99 Save 30%Implement information security effectively as per your organization�s needs.
- Cryptography with Python [Video]November 2017$106.24RRP $124.99 Save 15%Encrypt, evaluate, compare, and attack your data
- The Complete Ethical Hacking Series: Honeypots, IDS and FW's [Video]November 2017$16.99RRP $19.99 Save 15%Complete Ethical Hacking Series (CEHv9): Honeypots, IDS and Firewalls
- Mastering AWS SecurityOctober 2017$22.39RRP $31.99 Save 30%In depth informative guide to implement and use AWS security services effectively.
- Learning Nessus for Penetration TestingJanuary 2014$14.69RRP $20.99 Save 30%Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment.



![Build EU GDPR Data Protection Compliance from Scratch (CIPT) [Video]](https://www.packtpub.com/media/catalog/product/cache/aefcd4d8d5c59ba860378cf3cd2e94da/v/1/v11926_low.png)
![Build GDPR Compliance for Human Resources (HR) [Video]](https://www.packtpub.com/media/catalog/product/cache/aefcd4d8d5c59ba860378cf3cd2e94da/v/1/v11927_low.png)
![Build Security Incident Response for GDPR Data Protection [Video]](https://www.packtpub.com/media/catalog/product/cache/aefcd4d8d5c59ba860378cf3cd2e94da/v/1/v11929_low.png)
![Learn Ethical Hacking From Scratch [Video]](https://www.packtpub.com/media/catalog/product/cache/aefcd4d8d5c59ba860378cf3cd2e94da/v/1/v11026_low.png)
![Mastering Linux Security and Hardening [Video]](https://www.packtpub.com/media/catalog/product/cache/aefcd4d8d5c59ba860378cf3cd2e94da/v/1/v10903_low.png)

![Cryptography with Python [Video]](https://www.packtpub.com/media/catalog/product/cache/aefcd4d8d5c59ba860378cf3cd2e94da/v/0/v08194.png)
![The Complete Ethical Hacking Series: Honeypots, IDS and FW's [Video]](https://www.packtpub.com/media/catalog/product/cache/aefcd4d8d5c59ba860378cf3cd2e94da/v/0/v09926.png)

