Learn advanced debugging techniques for embedded ARM systems and uncover how to trace, profile, and analyze firmware issues using professional tools in real-world scenarios Free with your book: DRM-……続きを見る
著者:Don Murdoch
出版社: O'Reilly Media
発売日: 2026年02月12日
As cyberthreats grow and infrastructure evolves, organizations must prioritize effective, dynamic, and adaptable incident response. Following the success of the original edition, Blue Team Handbook:……続きを見る
For those of you who need to get ready for your CompTIA Linux+ exam in a hurry, this book is exactly what you need. This book's got a bunch of practical tasks and focused revision to help you feel r……続きを見る
For those of you who need to get ready for your CompTIA Linux+ exam in a hurry, this book is exactly what you need. This book's got a bunch of practical tasks and focused revision to help you feel r……続きを見る
Go from security novice to ethical hacking expert and discover vulnerabilities before attackers can exploit them with the help of real-world attack simulations and hands-on labsKey FeaturesDiscover ……続きを見る
Ready to audit like a boss and build bulletproof cyber resilience (without losing your mind or your Wi-Fi)?
Welcome to the only cybersecurity book that combines consulting truths, audit adventures, ……続きを見る
著者:Dorales Mclarty
出版社: Explain "IT" Like I Am 5
発売日: 2025年09月17日
CCISO Explained Like I Am 5 is an accessible yet comprehensive guide designed to demystify the EC-Council's Certified Chief Information Security Officer (CCISO) certification for aspiring cybersecur……続きを見る
Build Complete Embedded Linux Systems Quickly and Reliably
Developers are increasingly integrating Linux into their embedded systems: It supports virtually all hardware architectures and many periph……続きを見る
Advance your career and excel in modern IT with Kubernetes skills rooted in decades of real-world expertise to ensure your successKey FeaturesGet expert insights and detailed explanations of answers……続きを見る
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threats Get With Your Book: PDF Copy, AI Assistant, and Next-Gen Reader FreeKe……続きを見る
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.
This gr……続きを見る
sed & awk describes two text processing programs that are mainstays of the UNIX programmer's toolbox.
sed is a "stream editor" for editing streams of text that might be too large to edit as a single……続きを見る
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security t……続きを見る
Lauded for avoiding the typical vague, high-level survey approach found in many texts, earlier editions of this bestselling book removed the mystery by explaining the internal structure of an operat……続きを見る
Take your ethical hacking skills to the next level by mastering bash script and building your own hacking tools.Key FeaturesAutomate reconnaissance, exploitation, and post-exploitation workflows usi……続きを見る
A hands-on, beginner-friendly intro to web application pentesting
In A Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly in……続きを見る
Expect is quickly becoming a part of every UNIX user's toolbox. It allows you to automate Telnet, FTP, passwd, rlogin, and hundreds of other applications that normally require human interaction. Usi……続きを見る
Master Linux Shells – Your Complete Guide to Practical Success with Bash, Zsh, PowerShellKey FeaturesDevelop portable scripts using Bash, Zsh, and PowerShell that work seamlessly across Linux, macOS……続きを見る
El propósito del presente libro es mostrar las principales características y funcionalidades incluidas en la distribución Kali Linux. Todo lo expuesto es realizado_x000D_ desde la perspectiva del Ha……続きを見る
Gain holistic insights and practical expertise in embedding security within the DevOps pipeline, specifically tailored for Azure cloud environments Key FeaturesLearn how to integrate security into A……続きを見る
Protect your invaluable computer operating system & programs, digital memories, documents and data with "Data Backup Strategy for the Home User" – the definitive guide to creating a secure and relia……続きを見る
著者:Jonathan Rigdon
出版社: Freegulls Publishing House LLC
発売日: 2024年06月09日
This book consists of two titles, which are the following:
1 - Computer Science: Computer science is a field that deals with the study of computers and computational systems. It encompasses both the……続きを見る
This easy-to-read textbook provides an introduction to computer architecture, focusing on the essential aspects of hardware that programmers need to know. Written from a programmer’s point of view, ……続きを見る
著者:Jonathan Rigdon
出版社: Freegulls Publishing House LLC
発売日: 2024年06月05日
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to……続きを見る
Master the art of configuring and securing Microsoft 365, emphasizing robust security and compliance features, and managing privacy and risk in the Microsoft 365 environmentKey FeaturesProtect and d……続きを見る
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
In the hands of ……続きを見る
著者:Célio Azevedo
出版社: F. Cultura Não Alinhada
発売日: 2024年04月11日
Célio Azevedo é jornalista diplomado, programador e docente superior pós-graduado, com MBA em Gestão de Negócios na UCAM. Número de registro: 28.046/RJ. Há anos leciona linguagens de programação ori……続きを見る
著者:Célio Azevedo
出版社: F. Cultura Não Alinhada
発売日: 2024年04月11日
Célio Azevedo é jornalista diplomado, programador e docente superior pós-graduado, com MBA em Gestão de Negócios na UCAM. Número de registro: 28.046/RJ. Há anos leciona linguagens de programação ori……続きを見る
The main objective of the explanation in this installation is that the user can im-agine installing this operating system next to Windows either in a virtual machine or in a physical machine, fully ……続きを見る
El propósito del presente libro es mostrar las principales características y funcionalidades incluidas en la distribución Kali Linux. Todo lo expuesto es realizadodesde la perspectiva del Hacking Ét……続きを見る