In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapi……続きを見る
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills
Key Features
Practical recipes to conduct effective penetration testing using the latest version of Kali Lin……続きを見る
Are you fascinated by the idea of hacking?
Do you want to learn the secrets of ethical hackers?
This practical, step by step guide book will teach you all you need to know!
Hacking is a term that ev……続きを見る
The seminal text on SSH, newly revised and updated!
Secure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, complicated, and confusing.
Lose the confusion.
SSH Mastery: Open……続きを見る
As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the p……続きを見る
Automating and Programming Cisco Collaboration Solutions (CLAUTO 300-835) is associated with the CCNP Collaboration Certification and DevNet Professional Certification. It is especially useful for t……続きを見る
著者:Matt Walker
出版社: McGraw Hill LLC
発売日: 2019年03月22日
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Up-to-dat……続きを見る
著者:Matt Burrough
出版社: No Starch Press
発売日: 2018年07月31日
A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple.
Pentesting A……続きを見る
Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbol……続きを見る
Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali Linux
Key Features
Efficiently perform penetration testing techniques on your public cloud……続きを見る
The Sunday Times top ten bestseller.
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, includ……続きを見る
著者:Andy Greenberg
出版社: Knopf Doubleday Publishing Group
発売日: 2019年11月05日
**"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russi……続きを見る
A curated collection of HBR's latest thinking on the business implications of the collection, storage, and use of customer data and privacy.
Features for readers: Curates the latest and most importa……続きを見る
Malware involves the worms, Trojan horses and viruses that do malicious activities on mobile and computers by controlling and destroying software processes. Data from Tencent Mobile Security Laborat……続きを見る
This Guide is considered Entry-To-Medium level in Websites and Web Applications penetration testing, it is a good starting point for those who want to start their career as a Web Applications Penetr……続きを見る
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensi……続きを見る
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware.
With the aid of numerous case studies and……続きを見る
This book offers an introduction to web-API security with OAuth 2.0 and OpenID Connect. In less than 50 pages you will gain an overview of the capabilities of OAuth and learn the core concepts of OA……続きを見る
Сracking Invisible Walls Between You and Cybersecurity
“The Art of Email Security” presents hard evidence of email committing high treason against your privacy, explains what makes you a possible ta……続きを見る
Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall logg……続きを見る
The first edition of Advanced Topics in UNIX was originally published by John Wiley in 1993 when it was named an Alternate Main Selection of the Newbridge Book Club. That book stayed in print for th……続きを見る
Few Information Technology skills are in more demand these days than those related to security and few qualifications in this field are more respected than CompTIA.s Security+ certification. Securit……続きを見る
The purpose of this document is to describe the method by which the security controls will be assessed. In addition, the test methodology, test procedures, and test tools are described to ensure con……続きを見る
The internet is a haven for many forms of risks and hazards. There is the never-ending danger of identity fraud. There is the threat of viruses and other deliberately harmful malwares that can caus……続きを見る
In this book, authors Rich Shupe and Zevan Rosser share the knowledge they've gained from their years as multimedia developers/designers and teachers. Learning ActionScript 3.0 gives you a solid fou……続きを見る
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a……続きを見る
Personal health and fitness has joined the digital revolution. Using Microsoft HealthVault, people interested in monitoring their health have an unprecedented opportunity to research their own data.……続きを見る
著者:Ricardo Graça
出版社: RME Comunicação e Idiomas
発売日: 2013年05月26日
"Produzindo Animações com Softwares Livres” é o primeiro livro que trata de produção de animações com softwares livres. Escrito por Ricardo Graça; tem por objetivo apresentar as soluções em so……続きを見る
Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizin……続きを見る