The paper concerns about basic Microsoft ISA server and Linux Squid Server configuration As a lot of technicians switch between ISA server and Squid server, I decided to write this paper to present ……続きを見る
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection between two transformative technologies: big data and blockchain, and their in……続きを見る
Smart Home and Industrial IoT Devices: Critical Perspectives on Cyber Threats, Frameworks and Protocols provides an in-depth examination of the Internet of Things (IoT) and its profound impact on sm……続きを見る
Written by Frank Vasquez, an embedded Linux expert, this new edition enables you to harness the full potential of Linux to create versatile and robust embedded solutions All formats include a free P……続きを見る
The role of the advanced security architect has become essential in the contemporary digital landscape, where cyber threats are constantly evolving, to ensure that organizations can operate securely……続きを見る
This exhaustive guide is designed for individuals who are new to the field of cybersecurity. Pathway to Cybersecurity offers readers a comprehensive guide to launching their careers in digital defen……続きを見る
In "Emergency Break-Glass Process for Microsoft Azure: A Guide to Secure Emergency Access", readers will discover a comprehensive guide to setting up and managing break-glass accountsーcritical, las……続きを見る
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with informat……続きを見る
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical……続きを見る
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Arguably one of the most import……続きを見る
Ransomware is a type of malicious software that prevents victims from accessing their computers and the information they have stored. Typically, victims are required to pay a ransom, usually using c……続きを見る
This is the key to success to understand cybersecurity with "Cybersecurity Fundamentals: Best Security Practices" by Bruce Brown, CISSP.
This definitive guide is a must-read for anyone looking to di……続きを見る
Unlock the power of Nmap, the ultimate tool for network mapping, vulnerability detection, and cybersecurity. Whether you're a beginner looking to learn the basics or a seasoned professional seeking ……続きを見る
Dive into the ultimate guide to mastering Metasploit, the leading framework for ethical hacking and penetration testing. Designed for both cybersecurity professionals and aspiring hackers, this comp……続きを見る
DEFENSIVE ETHICAL HACKING
TECHNIQUES STRATEGIES AND DEFENSE TACTICS
In the rapidly evolving world of technology, the line between defense and offense is often blurred. "Defensive Ethical Hacking: Te……続きを見る
The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The pap……続きを見る
In today’s ever‑evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyberdefender. The handbooks take yo……続きを見る
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux sys……続きを見る
SECURETHIX TECHNOLOGIES is a company dedicated to information security, whose purpose is to help people take care of and protect their intangible assets through the use of technology dedicated to tr……続きを見る
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machin……続きを見る
"Mastering Shell for DevOps" is all about giving DevOps, cloud, and Linux folks the know-how to automate and make their workflows more efficient with shell scripting. The book uses real-world exampl……続きを見る
"Mastering Shell for DevOps" is all about giving DevOps, cloud, and Linux folks the know-how to automate and make their workflows more efficient with shell scripting. The book uses real-world exampl……続きを見る
Cybersecurity: Safeguarding Our Digital World is a comprehensive guide to modern cybersecurity. It covers fundamentals through advanced concepts. The book explores technical innovations, threat land……続きを見る
Unlock the full potential of Nikto, the powerful open-source web vulnerability scanner, with "Mastering Nikto". This comprehensive guide takes you step-by-step through installation, configuration, a……続きを見る
Mastering Wireshark: A Comprehensive Guide to Network Analysis
Are you ready to unlock the secrets of network traffic and become a pro at network analysis? Mastering Wireshark: A Comprehensive Guide……続きを見る
著者:Stewart Weiss
出版社: No Starch Press
発売日: 2025年10月14日
Learn to write real Linux softwareーnot just run it.
Most programmers never learn how Linux really works. Why? Because system programming is rarely taught, and the tools can be intimidating without ……続きを見る
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). T……続きを見る
Become an MDI expert and transform your IT security with advanced identity protection strategies to safeguard against evolving cyber threatsKey FeaturesOptimize configurations for peak security perf……続きを見る
Do you want to learn one security framework that helps you MASTER ALL frameworks?
The NIST Cybersecurity Framework (CSF) is designed in such a way that it aligns with best security practices in ever……続きを見る
Level up your pentesting skills by learning how to perform advanced system reconnaissance, and streamline offensive operations with command-line scriptingKey FeaturesLearn how to apply key attribute……続きを見る