This paper is a step-by-step “how to” guide for configuring of Openldap server, Kerberos server and shows the procedure for authentication of Linux Machine to Active Directory. The paper provides an……続きを見る
configured the Postfix mail server to support Anti-Spam and Anti-Virus, using two methods. • Method 1: With Postfix, SpamAssassin, ClamAV and Amavis-new • Method 2: With Postfix, SpamAssassin, ClamA……続きを見る
The Fourth Industrial Revolution, Industry 4.0, is changing the world, and digital transformation technology tools have impacted every walk of life. The nature of work and careers is changing fast –……続きを見る
wCertify Engage And Complete Methodology For Aspiring Cyber Professionals learn Ethical Hacking In A Structured Setting Across 20 Domains Learn Commercial-Grade Hacking Tools And Techniques.
Byte Bo……続きを見る
A stable Linux distribution is a reliable and consistent operating system that is suitable for both daily life and critical environments. It provides a solid foundation for various tasks without fre……続きを見る
In today’s interconnected world, healthcare systems are increasingly turning to digital technologies to enhance patient care and optimize operations. However, this digital transformation presents si……続きを見る
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber thr……続きを見る
This book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centered around the semant……続きを見る
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr. Atif and Dr. Babe……続きを見る
著者:Aditya Patel
出版社: Sarkar Capital LLC
発売日: 2023年03月11日
"The Beginner's Guide to Linux" is a comprehensive and practical e-book designed for those who are new to the Linux operating system. The book provides a step-by-step guide for learning Linux, cover……続きを見る
Ce qu'il faut savoir pour développer et gérer un réseau Linux à l'époque du cloud computing
Linux est un système llibre et gratuit qui a évolué ces 10 dernières années en intégrant des fonctionnalit……続きを見る
Build a robust cybersecurity program that adapts to the constantly evolving threat landscapeKey FeaturesGain a deep understanding of the current state of cybersecurity, including insights into the l……続きを見る
A CISO is the ultimate guardian of an organization's digital assets. As a cybersecurity leader ,a CISO must possess a unique balance of executive leadership, technical knowledge, strategic vision, a……続きを見る
You Against the Email Empire
Message services appear and disappear, but email remains. One of the Internet’s oldest and most open protocols, email reaches everywhere. Dominated by a handful of carri……続きを見る
Master Linux Shells – Your Complete Guide to Practical Success with Bash, Zsh, PowerShellKey FeaturesDevelop portable scripts using Bash, Zsh, and PowerShell that work seamlessly across Linux, macOS……続きを見る
Streamline Microsoft 365 administration with expert recipes that boost efficiency and controlKey FeaturesMaster PowerShell automation to streamline Microsoft 365 admin tasksManage SharePoint, Teams,……続きを見る
Although recent advances in technology have made life easier for individuals, societies, and states, they have also led to the emergence of new and different problems in the context of security. In ……続きを見る
The Flipper Bible is your essential guide to mastering the Flipper Zero, the versatile, pocket-sized multi-tool for ethical hackers and tech enthusiasts alike. Whether you're new to the world of hac……続きを見る
Master the NIST 800-53 Security Control Assessment. The last SCA guide you will ever need, even with very little experience. The SCA process in laymen's terms.
Unlock the secrets of cybersecurity as……続きを見る
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital ……続きを見る
IAM & Cybersecurity: Strategies for Protecting Digital Assets offers a comprehensive exploration into the vital role of Identity and Access Management (IAM) in securing today's digital world. Whethe……続きを見る
Discover the future of cybersecurity through the eyes of the world's first augmented ethical hacker
In Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker by Len Noe, a p……続きを見る
Blockchain technology is a digital ledger system that allows for secure, transparent and tamper-proof transactions. It is essentially an often decentralized, distributed, peer-to-peer database that ……続きを見る
Giuseppe Pelagatti, born in 1949, has received the doctoral degree in Electronic Engineering in 1973. Since 1986 he is Full Professor of Computer Science. His main research interests are focused on ……続きを見る
¿Siente curiosidad sobre cómo realizan pruebas de intrusión los hackers? ¿Ha querido tomar cursos presenciales de hacking ético, pero no tiene el tiempo o el dinero para hacerlo? Este libro tiene la……続きを見る
En el año 2020 todo el mundo que nos rodea es digital. Puede que no seamos conscientes (o por lo menos, no plenamente conscientes) de ello, pero si nos paramos a pensar unos minutos en nuestro entor……続きを見る
Mengenal Berbagai Sistem Operasi Opensource Linux Distro Yang Super Ringan Dan Super Stabil Untuk Penggunaan Harian Dan Infrastruktur Penting Edisi Bahasa Inggris
The history of Linux distro develop……続きを見る
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity. In an era where digital threats l……続きを見る
Книга рецептов обучит начинающих пользователей и администраторов Linux управлять системой, используя как графические инструменты, так и командную строку. Независимо от того, используете ли вы Linux ……続きを見る