You've experienced the shiny, point-and-click surface of your Linux computer--now dive below and explore its depths with the power of the command line.
The Linux Command Line takes you from your ver……続きを見る
A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifacts
Key Features
Get up and running with modern mobile forensic strategies and techniques
Analyze ……続きを見る
Leverage the power of Kubernetes to build an efficient software delivery pipeline.
Key Features
Learn about DevOps, containers, and Kubernetes all within one handy book
A practical guide to contain……続きを見る
A comprehensive guide to programming with network sockets, implementing internet protocols, designing IoT devices, and much more with C
Key Features
Apply your C and C++ programming skills to build……続きを見る
Design, develop, and solve real-world automation and orchestration problems by unlocking the automation capabilities of Ansible.
Key Features
Tackle complex automation challenges with the newly add……続きを見る
Complete coverage of every topic on the CompTIA Advanced Security Practitioner certification exam
Get complete coverage of all objectives included on the CompTIA CASP+ exam CAS-003 from this compreh……続きを見る
Sudo: You’re Doing It Wrong
Unix-like operating systems use a rudimentary access control system: the root account can do anything, while other users are peasants with only minimal access. This worke……続きを見る
Introduction to Data Science: Data Analysis and Prediction Algorithms with R introduces concepts and skills that can help you tackle real-world data analysis challenges. It covers concepts from prob……続きを見る
Increasingly, headlines today report out-of-control student violence occurring in our schools and colleges. Yet so little concrete action is being taken to protect the bystanding victims of this tra……続きを見る
Learn how to install, use, and administer CentOS 8 with the help of expert guidance and engaging examples
Key Features
Become familiar with a popular and stable Red Hat Enterprise Linux distributio……続きを見る
A comprehensive introduction to automated application deployment on Kubernetes for beginners
Key Features
Effectively manage applications deployed in Kubernetes using Helm
Learn to install, upgrade……続きを見る
Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events
Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives a……続きを見る
著者:TBD
出版社: Cyber Jannah Sakura Studio
発売日: 2021年02月12日
Mengenal Berbagai Free Opensource Aplikasi Office Yang Tersedia Untuk Sistem Operasi Windows 10 Dan Linux. Yang Dapat Di Gunakan Untuk Kepentingan Edukasi Dan Bisnis Sebagai Alternatif Pengganti Mic……続きを見る
Transport Layer Security, or TLS, makes ecommerce and online banking possible. It protects your passwords and your privacy. Let’s Encrypt transformed TLS from an expensive tool to a free one. TLS un……続きを見る
Leverage Azure's cloud capabilities to find the most optimized path to meet your firm's cloud infrastructure needs
Key Features
Get to grips with the core Azure infrastructure technologies and solu……続きを見る
Accelerate hybrid cloud innovation using Azure Arc with the help of real-world scenarios and examples Key Features • Get to grips with setting up and working with Azure Arc • Harness the power of Az……続きを見る
Fully updated computer security essentialsーmapped to the CompTIA Security+ SY0-601 exam
Save 10% on any CompTIA exam voucher! Coupon code inside.
Learn IT security fundamentals while getting comple……続きを見る
Expert solutions to automate routine IT tasks using Ansible.
KEY FEATURES
● Single handy guide for all IT teams to bring automation throughout the enterprise.
● In-depth practical demonstration of v……続きを見る
Identify vulnerabilities across applications, network and systems using simplified cybersecurity scripting
KEY FEATURES
● Exciting coverage on red teaming methodologies and penetration testing techn……続きを見る
著者:Cyber Jannah Sakura
出版社: Jannah Firdaus Mediapro Studio
発売日: 2021年12月01日
Best Free AntiVirus Software For Ancient Old Windows Xp Sp3 Operating System Bilingual Version In English & Germany Languange.
Since Microsoft Corporation officially retired Windows XP Sp3 on Octobe……続きを見る
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hack……続きを見る
Attention : à ceux qui veulent apprendre le WiFi hacking et faire partie d’une communauté de hackers professionnels.
Est-ce que vous avez toujours voulu cracker le WiFi des voisins juste pour le pla……続きを見る
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impe……続きを見る
You asked.
He didn’t answer.
The We Get Letters column of the FreeBSD Journal has been called “a tsunami of bile disguised as experience and erudition,” “a torment to the eye and a stain upon the so……続きを見る
Build, deploy, and manage containers with the next-generation engine and tools Key Features • Discover key differences between Docker and Podman • Build brand new container images with Buildah, the ……続きを見る
The most authoritative and complete study guide for people beginning to work with data in the Azure cloud
In MC Azure Data Fundamentals Study Guide: Exam DP-900, expert Cloud Solution Architect Jake……続きを見る
A complete journey to automating infrastructure provisioning and cloud-native application deployment Key Features • Leverage Crossplane and Kubernetes for a unified automation experience of infrastr……続きを見る
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features • Learn foundational concepts for effective……続きを見る
Do you want to find out how hackers move around the net?
Do you want to become an ethical or unethical hacker? What is your purpose?
Modern-day hacking has become more sophisticated than ever. Hackt……続きを見る
Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniques Key Features •……続きを見る