“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.”
ーVint Cerf, I……続きを見る
著者:ADARSH C JOSE
出版社: ADARSH C JOSE
発売日: 2024年01月11日
Dive into the Digital Shadows: Unleash Your Inner Hacker with "The Hacker's Toolbox"
Cracking passwords. Exploiting vulnerabilities. Penetrating networks. These aren't the fantasies of Hollywood hac……続きを見る
A collection of Satoshi Nakamoto’s writings on Bitcoin.
This collection contains Satoshi’s words, compiled and neatly formatted without commentary. Each chapter contains Satoshi’s writings from a sp……続きを見る
Discover how to write high-quality character driver code, interface with userspace, work with chip memory, and gain an in-depth understanding of working with hardware interrupts and kernel synchroni……続きを見る
著者:IP Specialist
出版社: IP Specialist
発売日: 2018年10月09日
Ec-Council Certified Ethical Hacker CEH v10 covers the latest exam blueprint, comprised of 20 Modules which includes the practice of information security and hacking tools which are popularly used b……続きを見る
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies.
Key Features
Learn protocol analysis, optimization and troubleshooting usin……続きを見る
Key FeaturesExplore the power of Python libraries to tackle difficult network problems efficiently and effectivelyUse Python for network device automation, DevOps, and software-defined networkingBec……続きを見る
著者:Seth Enoka
出版社: No Starch Press
発売日: 2022年12月06日
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.
This book is an easy-to-follow series of tutorials that will ……続きを見る
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg a……続きを見る
What can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications? This practical guide demonstrates how the latest version of the Hypertext Tr……続きを見る
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threats Purchase of the print or Kindle book includes a free eBook in PDF form……続きを見る
SNMP
Simple Network Management Protocol
Four lies in one acronym?
It’s baroque. It’s arcane. And it’s everywhere.
SNMP is one of those system management skills that people acquire by experience, stu……続きを見る
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Rem……続きを見る
From Charles M. Kozierok, the creator of the highly regarded www.pcguide.com, comes The TCP/IP Guide. This completely up-to-date, encyclopedic reference on the TCP/IP protocol suite will appeal to n……続きを見る
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security t……続きを見る
"Safeguarding the Digital Fortress: A Guide to Cyber Security" is an essential resource that equips readers with the knowledge and tools needed to navigate the complex world of cyber security. In th……続きを見る
Get a comprehensive understanding of gRPC fundamentals through real-world examples. With this practical guide, you’ll learn how this high-performance interprocess communication protocol is capable o……続きを見る
著者:Gerald Carter
出版社: O'Reilly Media
発売日: 2009年02月09日
Be more productive and make your life easier. That's what LDAP System Administration is all about.
System administrators often spend a great deal of time managing configuration information located o……続きを見る
Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this concise book, you'll delve into the aspects of each prot……続きを見る
Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microsoft Windows, Linux, networking, and more
Key Features
Find out how you can leverage some of the mos……続きを見る
Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. An ideal follow-up to Pac……続きを見る
Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features • Learn the ins and outs of log forwarding and troubles……続きを見る
Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key F……続きを見る
A practical guide to capturing and analyzing network traffic using Wireshark.
This book shows real world network traffic analysis and shows the techniques that DevOp teams need to use to detect mali……続きを見る
WebRTC, Web Real-Time Communications, is revolutionizing the way web users communicate, both in the consumer and enterprise worlds. WebRTC adds standard APIs (Application Programming Interfaces) and……続きを見る
Architect, engineer, integrate, and implement security across increasingly complex, hybrid enterprise networks
Key Features
Learn how to apply industry best practices and earn the CASP+ certificati……続きを見る
Go under the hood of an operating Voice over IP network, and build your knowledge of the protocols and architectures used by this Internet telephony technology. With this concise guide, you’ll learn……続きを見る
著者:Glen D. Singh
出版社: Packt Publishing
発売日: 2021年06月04日
Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certification Key Features • Receive expert guidance on how to kickstart your career in ……続きを見る
If you are attracted to Hacking world, this book must be your first step. This book teaches you how to think like hackers and protect your computer system from malware, viruses, etc. It will give yo……続きを見る
Harness Kubernetes' extensibility to deploy modern patterns and learn to effectively handle production issues Key Features • Build and run efficient cloud-native applications on Kubernetes using ind……続きを見る