著者:Don Murdoch
出版社: O'Reilly Media
発売日: 2026年02月12日
As cyberthreats grow and infrastructure evolves, organizations must prioritize effective, dynamic, and adaptable incident response. Following the success of the original edition, Blue Team Handbook:……続きを見る
著者:Cory Doctorow
出版社: Aufbau Digital
発売日: 2026年05月13日
Das Internet wird immer schlimmer.
Und das ist kein Zufall. Cory Doctorow hat dafür einen Namen: »Enshittification«. Das ist der Prozess, durch den Plattformen im Netz dominant wurden, weil sie prak……続きを見る
Every American family deserves to feel safe in their own home, yet millions of households are living with unlocked digital doors that criminals walk through every single day. Your bank accounts, you……続きを見る
Your inbox hides more danger than you think.
Every day, millions of people fall for cleverly designed emails that exploit fear, urgency, curiosity, or reward. But what if you could learn to spot the……続きを見る
Déverrouillez le plein potentiel de votre Apple Watch SE 3 !
Êtes-vous prêt à amener votre Apple Watch SE 3 à un niveau supérieur ? Que vous soyez novice dans le monde des montres connectées ou que ……続きを見る
Go from security novice to ethical hacking expert and discover vulnerabilities before attackers can exploit them with the help of real-world attack simulations and hands-on labsKey FeaturesDiscover ……続きを見る
Do you feel exposed online, like your personal information is constantly up for grabs? Are you tired of the background anxiety that comes with endless data breaches, invasive tracking, and the unset……続きを見る
Ready to audit like a boss and build bulletproof cyber resilience (without losing your mind or your Wi-Fi)?
Welcome to the only cybersecurity book that combines consulting truths, audit adventures, ……続きを見る
著者:Dorales Mclarty
出版社: Explain "IT" Like I Am 5
発売日: 2025年09月17日
CCISO Explained Like I Am 5 is an accessible yet comprehensive guide designed to demystify the EC-Council's Certified Chief Information Security Officer (CCISO) certification for aspiring cybersecur……続きを見る
Rapid digital advances have made image security crucial, especially in fields like banking, biometrics, and social media. This study proposes a novel image cryptosystem combining DNA and chaos-based……続きを見る
In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country’s economy, politics, and security. However, despite this series of cyberatt……続きを見る
Master the practical aspects of information systems auditing to pass the CISA exam and accelerate your career. Purchase of the book unlocks access to web-based exam prep resources like practice ques……続きを見る
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.
This gr……続きを見る
As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat.
The world’s foremost cyber security experts, fro……続きを見る
The Essential Self-Help Guide to Your Children Thriving in a Digital Age from Clinical Psychologist and Bestselling Author Dr Martha Deiros Collado
‘The book us parents urgently need’ Dr Julie Smith……続きを見る
Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to understand the cyber security landscape. It is a key textbook for postgraduate……続きを見る
A Day in the Life of an IT Systems Engineer is your backstage pass to the high-tech hustle of keeping systems alive, secure, and ahead of the curve. From wrangling rogue servers to automating like a……続きを見る
Take your ethical hacking skills to the next level by mastering bash script and building your own hacking tools.Key FeaturesAutomate reconnaissance, exploitation, and post-exploitation workflows usi……続きを見る
Master identity solutions and strategies and prepare to achieve Microsoft Identity and Access Administrator SC-300 certification Purchase of this book unlocks access to web-based exam prep resources……続きを見る
This book provides a comprehensive and synthetic analysis of the legal acts of the Council of Europe and the European Union affecting regulation of cybercrime in EU countries. Technical aspects rela……続きを見る
Build a Secure Recommendation System from Scratch Using Django Rest Framework.
Key Features
● Master Django REST Framework and Test-Driven Development.
● Build scalable APIs through real-world proje……続きを見る
A hands-on, beginner-friendly intro to web application pentesting
In A Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly in……続きを見る
Build a Secure Recommendation System from Scratch Using Django Rest Framework.
Key Features
● Master Django REST Framework and Test-Driven Development.
● Build scalable APIs through real-world proje……続きを見る
Build a Secure Recommendation System from Scratch Using Django Rest Framework.
Book Description
Mastering API development is crucial for building modern, scalable software solutions. Ultimate Web AP……続きを見る
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in ……続きを見る
Gain practical information systems auditing expertise to pass the latest CISA exam on your first attempt and advance your career Purchase of the book unlocks access to web-based exam prep resources,……続きを見る
Chi si nasconde dietro quel numero di telefono sconosciuto che ti ha chiamato? Puoi risalire all’identità di una persona a partire da una targa o da un’email? Quella foto che ha attirato la tua atte……続きを見る
El propósito del presente libro es mostrar las principales características y funcionalidades incluidas en la distribución Kali Linux. Todo lo expuesto es realizado_x000D_ desde la perspectiva del Ha……続きを見る
Smart technologies have quickly evolved to become integral parts of our homes and how we manage our lives, and they’re foreseen to be integral to (or already a part of) the next big steps in urban i……続きを見る
Gain holistic insights and practical expertise in embedding security within the DevOps pipeline, specifically tailored for Azure cloud environments Key FeaturesLearn how to integrate security into A……続きを見る