Do you want to learn how to protect your own computer and set it up in such a way that a hacker won't be able to access it?
Do you want to make a significant career change and learn more about compu……続きを見る
In avvio la storia che parte da Unix, attraverso Richard Stallman, il movimento per il software libero e il progetto GNU. Che non decolla finché Linus Torvalds, con il suo kernel, non fornisce il pe……続きを見る
Continue reading if you want to learn the secrets of a professional hacker as quickly as possible...
You are about to embark on a journey into the deepest recesses of the internet, which will lead y……続きを見る
Do you want complete control over your device? Do you feel as if your operating system is restricting your abilities? Do you want to learn how to become a Linux system administrator but aren't sure ……続きを見る
Fortunately for you, this book addresses that problem and concludes with a simple solution: Kali Linux.
Kali Linux was created by hackers for hackers, so it's unquestionably a must-have piece of kit……続きを見る
著者:Glen D. Singh
出版社: Packt Publishing
発売日: 2022年02月24日
The most comprehensive guide to ethical hacking and penetration testing with Kali Linux, from beginner to professionalKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehe……続きを見る
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time.
“What Michael Lewis did for baseball in Moneyball, Renee Dudley and Dani……続きを見る
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hack……続きを見る
Do you want to learn how to hack into computers? If you answered yes, you've come to the right place.
That's where this book will take you.
This book will teach you how to think like a hacker.
You'l……続きを見る
This new work explores the growth of information and communication technologies with an emphasis on cyber-physical systems and security management of these systems. This volume discusses and analyze……続きを見る
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniquesKey FeaturesUnderstand what happens in an attack and build the proper de……続きを見る
Gain an understanding of system administration that will remain applicable throughout your career and understand why tasks are done rather than how to do them Key Features • Deploy, secure, and main……続きを見る
This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace alo……続きを見る
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 DefenderKey……続きを見る
著者:Roopak T J
出版社: EFY Enterprises Pvt Ltd
発売日: 2014年11月09日
Linux divides its physical memory (RAM) into chunks called pages. Swapping is the process whereby pages get transferred to a preconfigured hard disk area. The quantum of swap space is determined dur……続きを見る
Avertissement™ : à ceux qui veulent apprendre l’art du hacking et qui veulent devenir les pionniers de ce nouveau monde, ce livre est écrit pour vous.
Dans ce livre, nous mettons en exergue la démar……続きを見る
Attention : à ceux qui veulent apprendre le WiFi hacking et faire partie d’une communauté de hackers professionnels.
Est-ce que vous avez toujours voulu cracker le WiFi des voisins juste pour le pla……続きを見る
Attention : à ceux qui veulent apprendre le hacking et rejoindre une communauté de hackers, lisez ce qui suit ...
Imaginez que vous soyez capable de pénétrer n’importe quel ordinateur que vous voule……続きを見る
One of the greatest fears of anyone using a computer, smartphone, or tablet is the loss of their data. But there is hope, even in the worst situations. This book, written by a long-time computer sci……続きを見る
著者:J. Lee
出版社: Samurai Media Limited
発売日: 2015年05月09日
Unlike many v-server or root-server from other providers, Linux AMIs do not have any default installation of web server or database server running. This guide will show you how to get a LAMP (Linux,……続きを見る
The Fourth Edition of the industry-acclaimed OpenStack Cloud Computing Cookbook, from four recognized experts, updated to the latest OpenStack build including Cinder, Nova, and Neutron.Key FeaturesO……続きを見る
This volume contains the full text of three books, Advanced Topics in UNIX, 2E, The 101 Most Important UNIX and Linux Commands, and Using C in Software Design, 2E.
Advanced Topics in UNIX, 2E
The fi……続きを見る
This book contains the full text of the second editions of two of the author’s books: Advanced Topics In UNIX and Software Reuse: Methods, Models, Costs.
Although the first edition of Advanced Topic……続きを見る
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environmentsKey Features\[\*\]Learn how to build your own pentesting lab environment to practice advanced……続きを見る
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impe……続きを見る
Key FeaturesBook DescriptionOpenStack Open Source software is one of the most used cloud infrastructures to support software development and big data analysis. It is developed by a thriving communit……続きを見る
The Security Hippie is Barak Engel’s second book. As the originator of the “Virtual CISO” (fractional security chief) concept, he has served as security leader in dozens of notable organizations, su……続きを見る
著者:Gloria D'Anna
出版社: SAE International
発売日: 2018年08月28日
This book provides a thorough view of cybersecurity to encourage those in the commercial vehicle industry to be fully aware and concerned that their fleet and cargo could be at risk to a cyber-attac……続きを見る