Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber……続きを見る
The overwhelming majority of a software systemâ??s lifespan is spent in use, not in design or implementation. So, why does conventional wisdom insist that software engineers focus primarily on the d……続きを見る
Follow me on a step-by-step hacking journey where we pwn a high-profile fashion company. From zero initial access to remotely recording board meetings, we will detail every custom script and techniq……続きを見る
著者:Mike Meyers
出版社: McGraw Hill LLC
発売日: 2016年01月07日
This bestselling on-the-job reference and test preparation guide has been fully revised for the new 2015 CompTIA exam objectives for exams 901 & 902
Written by the leading authority on CompTIA A+ ce……続きを見る
Uncover the secrets of Linux binary analysis with this handy guideKey FeaturesGrasp the intricacies of the ELF binary format of UNIX and LinuxDesign tools for reverse engineering and binary forensic……続きを見る
Both enterprise and consumer cloud adoption will lead the market into new realms. From the “cloud to the ground,” each chapter of our ebook looks back at the short history of cloud computing from th……続きを見る
Harness the power of Linux to create versatile and robust embedded solutions Key FeaturesCreate efficient and secure embedded devices using LinuxMinimize project costs by using open source tools and……続きを見る
The seminal text on SSH, newly revised and updated!
Secure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, complicated, and confusing.
Lose the confusion.
SSH Mastery: Open……続きを見る
The infrastructure-as-code revolution in IT is also affecting database administration. With this practical book, developers, system administrators, and junior to mid-level DBAs will learn how the mo……続きを見る
XDA University is a book that adds a narrative to the content that you can find on the XDA Developers website. Its a community of a multitude of people who are primary developers, Android modders an……続きを見る
Pass the First Time!
CompTIA Security+ Get Certified Get Ahead: SY0-401 Study Guide is an update to the top-selling SY0-301 guide, which helped thousands of readers pass the exam the first time they……続きを見る
Develop Linux device drivers from scratch, with hands-on guidance focused on embedded systems, covering key subsystems like I2C, SPI, GPIO, IRQ, and DMA for real-world hardware integration using ker……続きを見る
著者:Andy Greenberg
出版社: Knopf Doubleday Publishing Group
発売日: 2019年11月05日
**"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russi……続きを見る
This book is aimed at anybody who are looking to deepen their understanding of the command-line in Linux, the essential skills to use and manage the operating system. This book also an ideal referen……続きを見る
Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbol……続きを見る
As someone that has used the Bash shell almost daily for over 15 years, I've accumulated several command line "tricks" that have saved me time and frustration. Bash Command Line Pro Tips is a collec……続きを見る
Open Sources 2.0 is a collection of insightful and thought-provoking essays from today's technology leaders that continues painting the evolutionary picture that developed in the 1999 book Open Sour……続きを見る
The Korn shell is an interactive command and scripting language for accessing Unix® and other computer systems. As a complete and high-level programming language in itself, it's been a favorite sinc……続きを見る
Raspberry Pi Insider Guide: Everything you need for the Model B/B+ and more
Taking You from beginner to Expert!
The most up-to-date Raspberry Pi guide available.
Everything you need to make you an e……続きを見る
著者:Michael Born
出版社: Packt Publishing
発売日: 2019年09月20日
Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risksKey FeaturesAdopt a methodologica……続きを見る
A step-by-step tutorial that will teach you, through real-world examples, how to configure and use zsh and its various features. If you are a system administrator, developer, or computer professiona……続きを見る
著者:Reginald Wong
出版社: Packt Publishing
発売日: 2018年12月11日
Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. Key FeaturesAnalyze and improvise software and h……続きを見る
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurrin……続きを見る
Open source provides the competitive advantage in the Internet Age. According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some t……続きを見る
CONFINE YOUR SOFTWARE
Jails are FreeBSD’s most legendary feature: known to be powerful, tricky to master, and cloaked in decades of dubious lore. Deploying jails calls upon every sysadmin skill you ……続きを見る
著者:OccupyTheWeb
出版社: No Starch Press
発売日: 2018年12月04日
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networki……続きを見る
You've experienced the shiny, point-and-click surface of your Linux computer--now dive below and explore its depths with the power of the command line.
The Linux Command Line takes you from your ver……続きを見る
The Linux Mint Beginner's Guide (Second Edition) will show you how to get the most out of Linux Mint, from using the Cinnamon desktop environment to advanced command-line tasks. In the Guide, you wi……続きを見る
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edi……続きを見る
The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in ……続きを見る