著者:Matt Hand
出版社: No Starch Press
発売日: 2023年10月31日
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systemsーand how to evade it.
Nearly every enterpri……続きを見る
Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command
"Linux Essentials for Hackers & Pentesters" is a hands-on tutorial-style book that teaches you……続きを見る
Gain a firm, practical understanding of securing your network and utilize Python’s packages to detect vulnerabilities in your applicationKey FeaturesDiscover security techniques to protect your netw……続きを見る
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.
This gr……続きを見る
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamli……続きを見る
The must-have test prep for the new CompTIA PenTest+ certification
CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerab……続きを見る
著者:Jon Erickson
出版社: No Starch Press
発売日: 2008年02月01日
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves ha……続きを見る
The overwhelming majority of a software systemâ??s lifespan is spent in use, not in design or implementation. So, why does conventional wisdom insist that software engineers focus primarily on the d……続きを見る
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world……続きを見る
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? Th……続きを見る
The highly successful security book returns with a new edition, completely updated
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal info……続きを見る
Explore the beacon chain, Ethereum's PoS consensus, and the upcoming merge of Eth1 and Eth2, along with the challenges of scaling Ethereum, and an overview of L1 and L2 scaling solutions Purchase of……続きを見る
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniques Key Features • Explore memory forensics, one of the vital branches of digital investigation •……続きを見る
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Rem……続きを見る
著者:Bruce Nikkel
出版社: No Starch Press
発売日: 2021年12月21日
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.
Practical Linux Forensics d……続きを見る
著者:Monnappa K A
出版社: Packt Publishing
発売日: 2018年06月19日
Understand malware analysis and its practical implementation About This Book • Explore the key concepts of malware analysis and memory forensics using real-world examples • Learn the art of detectin……続きを見る
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of ad……続きを見る
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their wor……続きを見る
The Science of Secrecy from Ancient Egypt to Quantum Cryptography
From the best-selling author of Fermat’s Last Theorem, The Code Book is a history of man’s urge to uncover the secrets of codes, fro……続きを見る
著者:Matt Walker
出版社: McGraw Hill LLC
発売日: 2019年07月03日
Thoroughly revised to cover all CEH v10 exam objectives, this bundle includes two books, online resources, and a bonus quick review guide
This fully updated, money-saving self-study set prepares you……続きを見る
The IT/Digital Legal Companion is a comprehensive business and legal guidance covering intellectual property for digital business; digital contract fundamentals; open source rules and strategies; de……続きを見る
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security t……続きを見る
著者:Chris Sanders
出版社: No Starch Press
発売日: 2017年03月30日
It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your n……続きを見る
著者:Bruce Schneier
出版社: W. W. Norton & Company
発売日: 2023年02月07日
**“A Hacker's Mind…sheds vital light on the beginnings of our journey into an increasingly complex world.” ーFinancial Times
It’s not just computersーhacking is everywhere.
Legendary cybersecurity e……続きを見る
Cyberattackーan ominous word that strikes fear in the hearts of nearly everyone, especially business owners, CEOs, and executives. With cyberattacks resulting in often devastating results, it's no w……続きを見る
著者:Jason Garman
出版社: O'Reilly Media
発売日: 2010年03月25日
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce ……続きを見る
We live an information-soaked existence - information pours into our lives through television, radio, books, and of course, the Internet. Some say we suffer from 'infoglut'. But what is information?……続きを見る
Master malware analysis to protect your systems from getting infected
Key Features
Set up and model solutions, investigate malware, and prevent it from occurring in future
Learn core concepts of dy……続きを見る
This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-d……続きを見る
A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilities
Key Features
Perform pentesting i……続きを見る