Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.
This gr……続きを見る
Many people think of Linux as a computer operating system, running on users' desktops and powering servers. But Linux can also be found inside many consumer electronics devices. Whether they're the ……続きを見る
Prinzipiell kann jedes Computerprogramm Schwachstellen enthalten. Auch JavaScript- und HTML5-Code stellen hier keine Ausnahme dar. Im ersten Kapitel dieses shortcuts werden XSS und browserbasierte B……続きを見る
# NOTA IMPORTANTE Este eBook cubre la versión de 1Password para WINDOWS. Si buscas una publicación para dominar 1Password en MAC, busca este mismo título en la iBooks Store.
&i……続きを見る
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.
About This Book
Employ advanced pentesting techniques with Kali Linux ……続きを見る
In the past few years, going cloud native has been a big advantage for many companies. But it’s a tough technique to get right, especially for enterprises with critical legacy systems. This practica……続きを見る
Pass the DCA exam and enhance your DevOps skills by achieving faster deployments, reduced downtime, and continuous integration and continuous delivery Key Features • Strengthen your knowledge of con……続きを見る
Start your Cybersecurity career with expert advice on how to get certified, find your first job, and progress
Purchase of the print or Kindle book includes a free eBook in PDF format
Key Features
L……続きを見る
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hack……続きを見る
Advocates a cybersecurity “social contract” between government and business in seven key economic sectors
Cybersecurity vulnerabilities in the United States are extensive, affecting everything from ……続きを見る
Leverage Defender for IoT for understanding common attacks and achieving zero trust for IoT and OT devices
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
Identify and r……続きを見る
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them. My goal i……続きを見る
Go on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organizationKey FeaturesGain a comprehensive understanding of threat validationL……続きを見る