Become an MDI expert and transform your IT security with advanced identity protection strategies to safeguard against evolving cyber threatsKey FeaturesOptimize configurations for peak security perf……続きを見る
En el año 2020 todo el mundo que nos rodea es digital. Puede que no seamos conscientes (o por lo menos, no plenamente conscientes) de ello, pero si nos paramos a pensar unos minutos en nuestro entor……続きを見る
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our children’s safety online has never been more crucial*. From Street‑smart to Web‑wise®: A Cyber ……続きを見る
Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The ……続きを見る
Implement a powerful end-to-end SAP administration solution
Get peak performance from your SAP ERP infrastructure using the detailed implementation, maintenance, and support information in this comp……続きを見る
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The critical job of ensuring our children’s safety expands as students become more ind……続きを見る
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers
In The Art of Attack: Attacker Mindset for Security Professionals, expe……続きを見る
著者:Andre Edmond
出版社: IME Publishing Group
発売日: 2024年07月11日
Unlock Your Potential: Transition from IT Support to Cybersecurity with Confidence!
Are you an IT professional or helpdesk technician eager to break into cybersecurity but feeling overwhelmed? Do yo……続きを見る
En el año 2020 todo el mundo que nos rodea es digital. Puede que no seamos conscientes (o por lo menos, no plenamente conscientes) de ello, pero si nos paramos a pensar unos minutos en nuestro entor……続きを見る
Das beliebte »kurz & gut« jetzt als erweiterte Jubiläumsausgabe
Distributionsübergreifende Linux-Referenz: schnell und unkompliziert auf die wichtigsten Linux-Befehle zugreifen
200 nützliche Befehl……続きを見る
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" vi……続きを見る
著者:Tommy Lorenzo
出版社: Tommy Lorenzo
発売日: 2024年04月29日
As technology increasingly permeates our lives, digital safety has become of vital importance. "Keeping Cyber Security Simple" offers an accessible introduction into cybersecurity aimed specifically……続きを見る
Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks.
Bugs: they're everywhere. Software, firmware, hardware -- they all h……続きを見る
Advance your understanding of the Linux command line with this invaluable resource
Linux Command Line and Shell Scripting Bible, 4th Edition is the newest installment in the indispensable series kno……続きを見る
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, includi……続きを見る
Unlock the Secrets of Cyber Defense: Fortify Your Enterprise Against the Ever-Evolving Digital Threats with Comprehensive Strategies.
In the digital age, where cyber threats lurk in every corner, pr……続きを見る
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edi……続きを見る
Use BPF Tools to Optimize Performance, Fix Problems, and See Inside Running Systems
BPF-based performance tools give you unprecedented visibility into systems and applications, so you can optimize p……続きを見る
Awk was developed in 1977 at Bell Labs, and it's still a remarkably useful tool for solving a wide variety of problems quickly and efficiently. In this update of the classic Awk book, the creators o……続きを見る
“As an author, editor, and publisher, I never paid much attention to the competitionーexcept in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few bo……続きを見る
En el año 2020 todo el mundo que nos rodea es digital. Puede que no seamos conscientes (o por lo menos, no plenamente conscientes) de ello, pero si nos paramos a pensar unos minutos en nuestro entor……続きを見る
Want to become a Certified Kubernetes Application Developer (CKAD)? If you're looking to take your Kubernetes skills to the next level, then you need this book. This comprehensive and easy-to-read g……続きを見る
Are you prepared to excel in the CompTIA Security+ exam and launch your journey into the dynamic realm of cybersecurity? Your search ends here! The "CompTIA Security+ Exam Prep Guide," brought to yo……続きを見る
The second in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on the insights provided in Volume 1 to provide a compendium of easy-to-use a……続きを見る
This handbook will guide developers in the steps of creating and managing complex multi component applications based on docker containers without too much effortKey FeaturesLearn software containers……続きを見る
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pan……続きを見る
The free Ubuntu operating system has won the hearts and minds of millions of users worldwide. It combines a strong technical platform, impressive quality, and an enthusiastic global community of use……続きを見る
Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-1……続きを見る
Kommandozeilen-Know-how verständlich auf den Punkt gebracht
Vom Autor des Bestsellers »Linux kurz & gut«
Komplexe Befehle erstellen, lästige Aufgaben automatisieren und echte Probleme lösen
Für Sys……続きを見る
Advocates a cybersecurity “social contract” between government and business in seven key economic sectors
Cybersecurity vulnerabilities in the United States are extensive, affecting everything from ……続きを見る