This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, col……続きを見る
著者:Alexis Ahmed
出版社: Packt Publishing
発売日: 2021年11月25日
Escalate your privileges on Windows and Linux platforms with step-by-step instructions and deepen your theoretical foundations Key Features • Discover a range of techniques to escalate privileges on……続きを見る
This handy cookbook teaches new-to-intermediate Linux users the essential skills necessary to manage a Linux system, using both graphical and command-line tools. Whether you run Linux in embedded, d……続きを見る
A comprehensive guide for teaching system administrators, developers, and security professionals how to create their own systemd units and maintain system securityKey FeaturesMaintain and troublesho……続きを見る
Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do n……続きを見る
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investm……続きを見る
★★★ Discover the Future of the Phone ★★★
Phones have come a long way over the past several years. They’re now so advanced that the screen can fold in two! And perhaps no phone is showing off how thi……続きを見る
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, ……続きを見る
Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essenti……続きを見る
'A brilliant page-turner by one of Holland's finest investigative journalists' Rutger Bregman, author of Humankind
'Essential . . . What's revealed are networks of spies and criminals fighting an in……続きを見る
Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases
Key Features
Discover tips and expert advice from the leading CISO and author of many cybe……続きを見る
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in……続きを見る
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from……続きを見る
Cloud Platforms provide VM images in the Linux OS as well. Linux has always been operated via terminal or shell through a keyboard and a terminal. Even with GUIs around, Linux continues to be operat……続きを見る
A smartphone is a portable device that combines mobile telephone and computing functions into one unit. It is a cellular telephone with an integrated computer and other features not originally assoc……続きを見る
A smartphone is a portable device that combines mobile telephone and computing functions into one unit. It is a cellular telephone with an integrated computer and other features not originally assoc……続きを見る
Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and go undetected. These attacks succeed; they steal data and disrupt organizations. The f……続きを見る
Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile threat intelligence Key Features • Explore robust and predictable security operations……続きを見る
CORPORATE CYBERSECURITY
An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs
A bug bounty program is offered by organizations for people to receive ……続きを見る
Avoid becoming the next ransomware victim by taking practical steps today
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated.……続きを見る
Are you ready to protect your online life but don't know where to start?
From keeping your kids and finances safe on the internet to stopping your sex toys from spying on you, Cybersafe For Humans g……続きを見る
By the time you finish reading this, your business could be a victim of one of the hundreds of cyber attacks that are likely to have occured in businesses just like yours.
Are you ready to protect y……続きを見る
A True Textbook for an Introductory Course, System Administration Course, or a Combination Course
Linux with Operating System Concepts, Second Edition merges conceptual operating system (OS) and Uni……続きを見る
著者:Mike Sheward
出版社: BCS Learning & Development Limited
発売日: 2018年07月12日
Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between i……続きを見る
Cybersecurity Risk Management
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions fr……続きを見る
This book covers all of these hacking tools in detail, beginning at the very beginning and teaching you how hacking actually works. Then you'll learn the fundamentals of scripting, directory setup, ……続きを見る
Linus Torvalds wrote Linux with the cooperation of thousands of programmers, and it is a free and open-source operating system based on the UNIX system. UNIX is a 1991 operating system that has the ……続きを見る
This operating system is an option worth considering for users who are dedicated to working through networks, programming, or learning hacking techniques. Linux is the best operating system on the m……続きを見る
This book covers both the fundamentals and the more advanced aspects of Linux hacking. As you progress, you will receive an accurate and clear explanation of every aspect of Linux hacking.
For both ……続きを見る