Sudo: You’re Doing It Wrong
Unix-like operating systems use a rudimentary access control system: the root account can do anything, while other users are peasants with only minimal access. This worke……続きを見る
Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and auto……続きを見る
著者:Adidas Wilson
出版社: Adidas Wilson
発売日: 2019年09月15日
Originalmente, el término "hacker" se refería a un programador experto en sistemas operativos de computadoras y código de máquina. Hoy, se refiere a cualquiera que realice actividades de piratería o……続きを見る
Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers……続きを見る
The investigator’s practical guide for cybercrime evidence identification and collection
Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring……続きを見る
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical……続きを見る
Become an AWS SysOps administrator and explore best practices to maintain a well-architected, resilient, and secure AWS environmentKey FeaturesExplore AWS Cloud functionalities through a recipe-base……続きを見る
The bestselling study guide for the popular Linux Professional Institute Certification Level 1 (LPIC-1).
The updated fifth edition of LPIC-1: Linux Professional Institute Certification Study Guide i……続きを見る
Cyber Security explained in non-cyber language.
Get ready to have everything you thought you knew about Cyber Security Awareness challenged.
Fight back against the scourge of scams, data breaches, a……続きを見る
BUILD YOUR CYBERSECURITY PROGRAM WITH THIS COMPLETELY UPDATED GUIDE
Security practitioners now have a comprehensive blueprint to build their cybersecurity programs. Building an Effective Cybersecuri……続きを見る
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from begi……続きを見る
A problem that seems to be spreading across globally at an
alarming rate – cybercrime seems to have annihilated millions.
There is none that spared. There is always a mind working on
how to breach t……続きを見る
Un livre idéal et tout en couleurs pour maîtriser l'intégralité de macOS 10.15 !
Un guide complet pour maîtriser MacOS sans peine !
Au programme :
Découverte du bureau de macOS 10.15
Le Dock
Lancer ……続きを見る
Since early 1970, Unix operating system has gone through many metamorphosis. As of now many variants of Unix systems are available and some of them are commercial whereas the others are freely avail……続きを見る
In the recent years, many eye-catching books became available with titles tagged with FAQ (Frequently Asked Questions) such as C FAQ, C++ FAQ, Java FAQ etc. In the same pattern, this book is also de……続きを見る
In the recent years, Linux, a public domain, freely available Unix variant has attracted the people very much. Today’s complex production environments demands superior application performance. Linux……続きを見る
NOW A MAJOR TV SERIES!
'THE STAND meets THE ROAD' Entertainment Weekly
'Enthralling ... richly imagined. Above all, Amy is a superb creation, believably human yet beguilingly enigmatic' Sunday Times……続きを見る
In the past few years, going cloud native has been a big advantage for many companies. But it’s a tough technique to get right, especially for enterprises with critical legacy systems. This practica……続きを見る
著者:Neil Smyth
出版社: Payload Media, Inc.
発売日: 2019年12月11日
Arguably one of the most highly regarded and widely used enterprise level operating systems available today is the CentOS 8 distribution. Not only is it considered to be among the most stable and re……続きを見る
Free Opensource Antivirus And Anti Malware Software For Ubuntu Linux English Edition Lite Version.
All computer systems can suffer from malware, ransomware, trojan, rootkit and viruses, including Li……続きを見る
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
This comp……続きを見る
著者:Heather Linn
出版社: McGraw Hill LLC
発売日: 2020年02月28日
This effective self-study guide serves as an accelerated review of all exam objectives for the CompTIA PenTest+ certification exam
This concise, quick-review test preparation guide offers 100% cover……続きを見る
Achieve enterprise automation in your Linux environment with this comprehensive guideKey FeaturesAutomate your Linux infrastructure with the help of practical use cases and real-world scenariosLearn……続きを見る
Voulez-vous devenir hacker même si vous n’avez jamais touché à un clavier ! Faire partie d’une communauté de hackers talentueux et motivés et obtenir en plus de tout ça une formation vidéo gratuite ……続きを見る
Vous avez toujours voulu apprendre à hacker un Wi-Fi protégé par un mot de passe ?
Vous êtes-vous déjà demandé s'il était facile de vous faufiler dans l'ordinateur de quelqu'un ?
Vous voulez un guid……続きを見る
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligen……続きを見る
Develop a solid understanding of cloud computing, Linux virtual machine, container virtualization, and other fundamental concepts to create and manage your Linux workload in AzureKey FeaturesDeploy ……続きを見る
Master the basics of the most widely used enterprise level operating systems
Key Features
Review the Red Hat Enterprise 8 Linux environment
Install and administer Red Hat Enterprise Linux 8
Share R……続きを見る
If you're anything like me, you've collected a zillion media files over the years. Music, Photos, Movies, even entire series of TV shows. Yes, you can store them on your computer and watch them when……続きを見る