著者:Peter Kim
出版社: Secure Planet LLC
発売日: 2015年07月30日
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides t……続きを見る
著者:Stefan H. Thomke
出版社: Harvard Business Review Press
発売日: 2019年04月09日
Every company's ability to innovate depends on a process of experimentation whereby new products and services are created and existing ones improved. But the cost of experimentation is limiting. New……続きを見る
Providing in-depth treatment of error correction
Error Correction Coding: Mathematical Methods and Algorithms, 2nd Edition provides a comprehensive introduction to classical and modern methods of er……続きを見る
著者:Adidas Wilson
出版社: Adidas Wilson
発売日: 2018年09月30日
Despite his roughness on his employees and peers, he touted Apple results especially the fantastic innovations. Otherwise, he thought, if any of his employees felt brutalized under his leadership, t……続きを見る
A practical guide to capturing and analyzing network traffic using Wireshark.
This book shows real world network traffic analysis and shows the techniques that DevOp teams need to use to detect mali……続きを見る
Reports of the death of reading are greatly exaggerated
Do you worry that you've lost patience for anything longer than a tweet? If so, you're not alone. Digital-age pundits warn that as our appetit……続きを見る
Powering hundreds of thousands of learning environments globally, Modular Object-Oriented Dynamic Learning Environment, aka Moodle, is used by institutions and organisations large and small across b……続きを見る
The LPIC-3 certification is the culmination of the multi-level professional certification program of the Linux Professional Institute (LPI). LPIC-3 is designed for the enterprise-level Linux profess……続きを見る
Become proficient and efficient with Visual Studio Code and learn how to integrate all your external tools!
Visual Studio Code for Python Programmers helps Python developers become not just familiar……続きを見る
Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will hel……続きを見る
Assess cyber readiness with advanced security controls and create a secure enterprise system
KEY FEATURES
● In-depth explanation of security architecture, security operations, security engineering a……続きを見る
著者:Michael Powell
出版社: Taylor & Francis
発売日: 2013年01月11日
Considering computer contracting?
If you are, then read this book. It explores the many aspects of the computer contracting world and gives sound practical advice to both the newcomer and the experi……続きを見る
Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The ……続きを見る
Learn how to automate tasks and create rules in Jira with the help of different use cases
Key Features
Automate daily repetitive and tedious tasks without coding experience
Discover how to automate……続きを見る
The latest edition of this classic is updated with new problem sets and material
The Second Edition of this fundamental textbook maintains the book's tradition of clear, thought-provoking instructio……続きを見る
Design and build high-performance, secure, and scalable Salesforce solutions to meet business demands and gain practical experience using real-world scenarios by creating engaging end-to-end solutio……続きを見る
Learning Bitcoin SV: The Original Bitcoin & Global Public Blockchain for Enterprise
In 2008, Satoshi Nakamoto released a codebase and whitepaper for a network that came to be known as the Blockchain……続きを見る
著者:IP Specialist
出版社: IP Specialist
発売日: 2020年08月19日
This workbook covers all the information you need to pass the CompTIA Cybersecurity Analyst (CySA+) CSO-001 exam. The workbook is designed to take a practical approach to learning with real-life exa……続きを見る
This book is a complete guide to diagnosing and removing computer viruses, spyware, and other dangerous Mal-ware from your home computer. I'll show you the steps computer technicians take when they ……続きを見る
Power BI: Essential Beginner's Guide to Power BI to bring data to life provides an overview of the key features and requirements required for the user to be able to develop dashboards that provide a……続きを見る
This book highlights the practical aspects of using Oracle Essbase and Oracle Business Intelligence Enterprise Edition (OBIEE) as a comprehensive BI solution. It explains the key steps involved in O……続きを見る
This book introduces policy, government, and security professionals to the concept of “information warfare,” covering its evolution over the last decade and its developments among such economic and ……続きを見る
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021 and 2022!
2020 Cybersecurity CANON Hall of Fame Winner!
Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CIS……続きを見る
Tackling one of the major challenges with implementing an information-governance program, this book provides insight into the best ways to convince businesses of the value of the practice. Most info……続きを見る
The definitive guide to incident response--updated for the first time in a decade!
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forens……続きを見る
著者:Howard Small
出版社: Howard Small
発売日: 2015年08月28日
Master the Cloud was written for Small Business Owners (SBOs) who want to take advantage of the transformative power of cloud computing to streamline business operations, attract customers and incre……続きを見る
Open source provides the competitive advantage in the Internet Age. According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some t……続きを見る