DO YOU THINK YOU ARE SAFE ONLINE? THINK AGAIN.
In a world where Artificial Intelligence can clone your voice in 3 seconds and hackers don't need to be geniuses to steal your identity, the old rules ……続きを見る
Questo non è il solito manuale teorico pieno di definizioni accademiche. È un'indagine sul campo. È "cyber-noir".
L'indagine continua con il fascicolo 2 della serie: Case #001: NjRAT (un Remote Acce……続きを見る
Master the Art of High-Performance Linux Engineering
In the era of multicore processors and massive data throughput, standard programming practices are often insufficient. True system performance is……続きを見る
Schützen Sie Ihre privaten oder geschäftlichen Daten!
Dieses Buch führt Sie in die Grundlagen der Cybersicherheit ein. Sie erfahren, welche Bedrohungen es gibt, wie Sie sie erkennen und wie Sie sich……続きを見る
Stop Viewing the Operating System as a Black Box.
The illusion of direct control is the primary abstraction of modern programming. When you write code that prints text, allocates memory, or reads a ……続きを見る
The autonomous supply chain is the attack surface of the next decade. This is the book that defends it. Download the ASCR Blueprint artifacts directly from the book. Deploy them. Customize them. Use……続きを見る
Master the Machinery of the Internet: A Deep Dive into Linux Kernel Networking and Server Architecture
Network programming is often taught as a simple sequence of function calls. A student learns to……続きを見る
This book illustrates how Spamhaus went from potential internet savior to always-screaming false-alarm paper ghost harassing good actors and threatening trust in the very ecosystem which Spamhaus pr……続きを見る
著者:Santa Rosa
出版社: JOY R&D BOOKS
発売日: 2023年12月03日
Literacy of command line interface to carry out tasks like software installation is important to reduce dependency on specialists and technicians, allowing you to speed up your work. This guide is a……続きを見る
Transform Your Embedded Linux Development from Theory to Production-Ready Systems
Building embedded Linux systems requires more than just downloading a pre-built image. Embedded Software Design prov……続きを見る
Explore the design of a RISC-V DSP processor using the SpringCore architecture, covering pipeline design, DSP acceleration, LLVM toolchain support, debugging with OpenOCD, and integration into a rea……続きを見る
Build real-world DevOps skills through 90 days of hands-on projects. Learn Linux, Git, Terraform, Ansible, Docker, Kubernetes, and CI/CD to automate infrastructure, deploy applications, and launch y……続きを見る
Transform Linux into a Precision Real-Time Controller for Industrial Automation
Are you ready to harness the full power of Linux for mission-critical industrial control systems? This comprehensive g……続きを見る
Federated Learning in Finance: Unlocking Privacy-Preserving and Cyber Resilience using AI is an edited volume designed to explore how Federated Intelligence can help the finance industry defend agai……続きを見る
Design for resilience in a digital world and explore how integrating human factors into cybersecurity reduces errors, fortifies defenses, and aligns protection strategies with authentic human behavi……続きを見る
Build, evaluate, and measure effective cybersecurity strategies using real-world threat intelligence and lessons from decades of enterprise defense experience.Key FeaturesApply data-driven strategie……続きを見る
Learn the workflows professionals use to triage systems, uncover hidden activity, recover deleted evidence, crack encrypted containers, analyze Windows memory, and detect tampering using realistic h……続きを見る
CISO: Evolution of a Vocation comprises three levels. The first level shares the author’s personal journey, beginning as a homeless college dropout and culminating in over thirty years of service as……続きを見る
著者:James Zollern
出版社: Indepently Published
発売日: 2026年03月26日
A hyper-intelligent computer virus from space infects computers around the world and silently shuts down digital infrastructure. What begins as a digital anomaly spreads to people, infecting humanit……続きを見る
Fire Brigades to Firewalls: A Public Safety Guide to Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecu……続きを見る
They’re not just after your money. They’re after your confidence. And if you’re over 60, you’re a prime target. Every day, scammers launch thousands of attacks aimed directly at seniors. Fake IRS ca……続きを見る
Master ethical hacking with the definitive ethical hacking study guide, fully updated with chapter review questions and practice tests
As cyber threats evolve and data breaches make headlines, organ……続きを見る
Protect your iOS apps from evolving attacks with a complete, practical toolkit of defensive techniques, cryptographic foundations, and real-world app hardening techniques. Key FeaturesBuild a strong……続きを見る
著者:Pratik M. Lotia
出版社: Verses Kindler Publication
発売日: 2026年04月07日
Storm at the Edge: A Guide to DDoS Survival is a comprehensive technical roadmap for navigating the volatile landscape of modern cyber warfare. Moving from the "anatomy of a botnet" to sophisticated……続きを見る
Security is rarely a product you can install; it is a fundamental property of system architecture. In modern computing, the traditional network perimeter has dissolved. To build resilient infrastruc……続きを見る
Da Unix al software libero con il progetto GNU di Stallman e la licenza GPL. Poi la nascita del kernel Linux e l'iniziativa open-source.
Gli ostacoli storici alla diffusione di Linux tra grandi pote……続きを見る
Memory corruption is the root cause of the most severe security breaches in computing history. Buffer overflows, use-after-free conditions, and memory leaks continue to compromise critical infrastru……続きを見る
Master the art of ethical vulnerability discovery and remediation in Linux environments.
Deploying unaudited software into a production Linux environment is a significant liability. Hidden vulnerabi……続きを見る
Master Terraform and Ace Your Certification in One Comprehensive Guide
Get ready to become an infrastructure automation expert. This complete study guide prepares you for the HashiCorp Certified Ter……続きを見る
A comprehensive reference for mastering Linux shell commands. From basic to advanced, this guide covers commands, bash scripting, system management, special bash characters, and keyboard shortcuts t……続きを見る