In 2016, hackers nearly pulled off the perfect crimeーand a typo saved the global banking system.
On a quiet Thursday evening in Dhaka, cybercriminals infiltrated Bangladesh Bank and initiated 35 fr……続きを見る
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape
In today’s data-driven world, protecting personal informat……続きを見る
INSTANT USA TODAY BESTSELLER!
National security strategist and former FBI counterintelligence operative Eric O’Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and……続きを見る
The overwhelming majority of a software systemâ??s lifespan is spent in use, not in design or implementation. So, why does conventional wisdom insist that software engineers focus primarily on the d……続きを見る
Uncover the secrets of Linux binary analysis with this handy guide
About This Book
Grasp the intricacies of the ELF binary format of UNIX and Linux
Design tools for reverse engineering and binary f……続きを見る
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CI……続きを見る
Open Sources 2.0 is a collection of insightful and thought-provoking essays from today's technology leaders that continues painting the evolutionary picture that developed in the 1999 book Open Sour……続きを見る
IAM & Cybersecurity: Strategies for Protecting Digital Assets offers a comprehensive exploration into the vital role of Identity and Access Management (IAM) in securing today's digital world. Whethe……続きを見る
This is the ultimate hacker manual. Since its introduction in 2012, Kali Linux has increased in popularity and potentialand has become the best hacker software for security professionals. However, w……続きを見る
Unlock the full potential of your Samsung Galaxy S24 Ultra with this comprehensive user guide. Designed for both new users and seasoned Android enthusiasts, this book delves deep into the device's a……続きを見る
Unlock the full potential of your Samsung Galaxy S24+ with this comprehensive user guide. Whether you're a tech enthusiast or a newcomer to the Galaxy ecosystem, this book is your gateway to masteri……続きを見る
This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications.
This comprehensive work focu……続きを見る
How can you grow and maintain a reliable, flexible, and cost-efficient network in the face of ever-increasing demands? With this practical guide, network engineers will learn how to program Juniper ……続きを見る
Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling compl……続きを見る
Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over a……続きを見る
iPhone 12 is packed full with many novel features that promises to give every user the ‘WOW experience’: with a powerful A14 Bionic processor, it boasts to be one of the fastest devices on the plane……続きを見る
Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at……続きを見る
Beginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform. Through the use of detailed and realistic……続きを見る