CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge
ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition has been completely updated……続きを見る
A guide to using the Ghidra software reverse engineering tool suite.
DANCE WITH THE DRAGON
The result of more than a decade of research and development within the NSA, the Ghidra platform was develo……続きを見る
Full-length practice tests covering all CISSP domains for the ultimate CISSP prep
The ISC2 CISSP Official Practice Tests is a major resource for ISC2 Certified Information Systems Security Professio……続きを見る
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes tradit……続きを見る
Prepare for success on the 2024 CISA exam and further your career in security and audit with this effective study guide
The CISA Certified Information Systems Auditor Study Guide: Covers 2024-2029 E……続きを見る
The goal of this comprehensive study guide is simple: we want to help you pass the CCSP exam with confidence and provide you with a solid foundation of security knowledge that will make you a better……続きを見る
著者:OccupyTheWeb
出版社: No Starch Press
発売日: 2025年07月01日
A revised introduction to the Linux operating system for beginning hackers and penetration testers.
If you’re just getting started along the exciting path of hacking, cybersecurity, and pentesting, ……続きを見る
The only official CCSP practice test product endorsed by (ISC)2
With over 850 practice questions all new for the 2022-2025 exam objectives, (ISC)2CCSP Certified Cloud Security Professional Official ……続きを見る
The ebook edition of this title is Open Access and freely available to read online.
The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a signifi……続きを見る
The ebook edition of this title is Open Access and freely available to read online.
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabi……続きを見る
The ebook edition of this title is Open Access and freely available to read online.
Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when des……続きを見る
The ebook edition of this title is Open Access and freely available to read online.
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large s……続きを見る
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, a data query and manipulation language for APIs adopted by ma……続きを見る
The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological……続きを見る
Learn application security from the very start, with this comprehensive and approachable guide!
Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to ……続きを見る
Drawing on expertise from professionals, government officials, and academics, this book uncovers the proactive measures taken by Latvia to build resilient cybersecurity capabilities.
The work offers……続きを見る
Find and fix security vulnerabilities in your web applications with Burp SuiteKey FeaturesSet up and optimize Burp Suite to maximize its effectiveness in web application security testingExplore how ……続きを見る
Expert guidance on the art and science of driving secure behaviors
Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver ……続きを見る
著者:Benedek Láng
出版社: Taylor & Francis
発売日: 2025年10月02日
A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the pop……続きを見る
Showcase your security expertise with the highly regarded CISSP certification
The CISSP certification, held by more than 150,000 security professionals worldwide, is the gold standard of cybersecuri……続きを見る
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the ……続きを見る
Introduction to Modern Cryptography, the most relied-upon textbook in the field, provides a mathematically rigorous yet accessible treatment of this fascinating subject. The authors have kept the bo……続きを見る
We created technology that should free people from intermediaries. But we made it so complex that we became new intermediaries - between users and their own freedom.
This book is not just a guide to……続きを見る
著者:Corey J. Ball
出版社: No Starch Press
発売日: 2022年07月05日
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.
Hacking APIs ……続きを見る
A broad introduction to cryptographyーwhat it is, how it really works, what its future holds, and why every informed citizen should understand its basics.
We all keep secretsーfrom our gym locker co……続きを見る
The edited volume Critical ICT4D highlights the need for a paradigm change in theorising, designing, and researching Information and Communication Technologies for Development (ICT4D). Engaging auth……続きを見る
This open access book equips designers with a deeper understanding of informational privacy, emphasizing why and how designers should design services that respect and enhance people’s privacy. The s……続きを見る
Master embedded systems programming with Rust's memory-safe features. Learn how to build reliable IoT devices, work with popular microcontroller boards, and implement real-time applications with zer……続きを見る
Get the know-how you need to safeguard your data against cyber attacks
Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data securityーshouldn't……続きを見る
Running the gamut from the infamous 'pig butchering' romance con to sophisticated online extortion and investment fraud, Southeast Asia has emerged as the global hub for cybercrime. Based on years o……続きを見る