Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will hel……続きを見る
Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contra……続きを見る
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting
Key Feature……続きを見る
Architect, engineer, integrate, and implement security across increasingly complex, hybrid enterprise networks
Key Features
Learn how to apply industry best practices and earn the CASP+ certificati……続きを見る
Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The ……続きを見る
著者:Glen D. Singh
出版社: Packt Publishing
発売日: 2021年06月04日
Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certification Key Features • Receive expert guidance on how to kickstart your career in ……続きを見る
Implement real-world decentralized applications using Python, Vyper, Populus, and Ethereum
Key Features
Stay up-to-date with everything you need to know about the blockchain ecosystem
Implement sma……続きを見る
Become an Ethereum Blockchain developer using a blend of concepts and hands-on implementations About This Book • Understand the Ethereum Ecosystem and its differences from its rich cousin Bitcoin • ……続きを見る
During the Global Financial Crisis in 2008, our financial infrastructure failed.
Governments bailed out the very institutions that let the economy down. This episode spurred a serious rethink of our……続きを見る
A high-level overview of networking, data science and computer security. Designed for readers who don't care for academic formalities, it's a fast and easy guide. It teaches the foundations programm……続きを見る
If you are attracted to Hacking world, this book must be your first step. This book teaches you how to think like hackers and protect your computer system from malware, viruses, etc. It will give yo……続きを見る
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate……続きを見る
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers
In The Art of Attack: Attacker Mindset for Security Professionals, expe……続きを見る
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill……続きを見る
This book sheds light on the challenges facing social media in combating malicious accounts, and aims to introduce current practices to address the challenges. It further provides an in-depth invest……続きを見る
出版社: Springer International Publishing
発売日: 2018年07月08日
The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and prac……続きを見る
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques
Key Features
Create a solid incident response framework and manage cy……続きを見る
著者:IP Specialist
出版社: IP Specialist
発売日: 2020年08月19日
This workbook covers all the information you need to pass the CompTIA Cybersecurity Analyst (CySA+) CSO-001 exam. The workbook is designed to take a practical approach to learning with real-life exa……続きを見る
NOW AN HBO® DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO • “An importantーand deeply soberingーnew book about cyberwarfare” (Nicholas Kristof, New York Times), now updated with a new chapter.……続きを見る
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques
Key Features
Set up an environment to centralize all data in an Elasticsearch, ……続きを見る
著者:Hans Riesel
出版社: Birkhäuser Boston
発売日: 2015年12月29日
From the original hard cover edition:
In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-d……続きを見る
Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applicationsKey FeaturesGet up to speed……続きを見る
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021 and 2022!
2020 Cybersecurity CANON Hall of Fame Winner!
Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CIS……続きを見る
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in ……続きを見る
Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements yo……続きを見る
As protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now yo……続きを見る
Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses ……続きを見る
Identity and Access Management is the 5th domain of the CISSP common body of knowledge. Some of the main topics we will cover in this course include: theory and concepts of identity in access manage……続きを見る
The definitive guide to incident response--updated for the first time in a decade!
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forens……続きを見る
Learn the most powerful and primary programming language for writing smart contracts and find out how to write, deploy, and test smart contracts in Ethereum. About This Book • Get you up and running……続きを見る