Master the practical aspects of information systems auditing to pass the CISA exam and accelerate your career. Purchase of the book unlocks access to web-based exam prep resources like practice ques……続きを見る
著者:Matt Walker
出版社: McGraw Hill LLC
発売日: 2019年06月21日
Don’t Let the Real Test Be Your First Test!
Fully updated for the CEH v10 exam objectives, this practical guide contains more than 600 realistic practice exam questions to prepare you for the EC-Cou……続きを見る
The past decade has witnessed the broad adoption of artificial intelligence and machine learning (AI/ML) technologies. However, a lack of oversight in their widespread implementation has resulted in……続きを見る
著者:Matt Hand
出版社: No Starch Press
発売日: 2023年10月31日
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systemsーand how to evade it.
Nearly every enterpri……続きを見る
Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command
"Linux Essentials for Hackers & Pentesters" is a hands-on tutorial-style book that teaches you……続きを見る
Gain a firm, practical understanding of securing your network and utilize Python’s packages to detect vulnerabilities in your applicationKey FeaturesDiscover security techniques to protect your netw……続きを見る
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.
This gr……続きを見る
著者:Jon Erickson
出版社: No Starch Press
発売日: 2008年02月01日
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves ha……続きを見る
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world……続きを見る
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniques Key Features • Explore memory forensics, one of the vital branches of digital investigation •……続きを見る
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Rem……続きを見る
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of ad……続きを見る
Companies are spending billions on machine learning projects, but it’s money wasted if the models can’t be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you t……続きを見る
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their wor……続きを見る
著者:Matt Walker
出版社: McGraw Hill LLC
発売日: 2019年07月03日
Thoroughly revised to cover all CEH v10 exam objectives, this bundle includes two books, online resources, and a bonus quick review guide
This fully updated, money-saving self-study set prepares you……続きを見る
A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilities
Key Features
Perform pentesting i……続きを見る
"Safeguarding the Digital Fortress: A Guide to Cyber Security" is an essential resource that equips readers with the knowledge and tools needed to navigate the complex world of cyber security. In th……続きを見る
★★★★★LEARNING STARTS WITH VIEWING THE WORLD DIFFERENTLY. ★★★★★
Knowledge flow ー A mobile learning platform provides Apps and Books.
Knowledge flow provides learning book of Beginning Linux Programm……続きを見る
著者:Richie Miller
出版社: Pastor Publishing Ltd
発売日: 2023年01月05日
If you want to become a Cybersecurity Professional, this book is for you!
If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Whether you want to become an In……続きを見る
Learn to gather and analyze publicly available data for your intelligence needs
In Deep Dive: Exploring the Real-world Value of Open Source Intelligence, veteran open-source intelligence analyst Rae……続きを見る
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way
This practical guide reveals the powerful weapons and devious methods cyber-terrorist……続きを見る
Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features • Collect, normalize, and analyze ……続きを見る
A practical roadmap to protecting against cyberattacks in industrial environments
In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security author……続きを見る
Get ready for a career in IT security and efficiently prepare for the SY0-601 exam with a single, comprehensive resource
CompTIA Security+ Practice Tests: Exam SY0-601, Second Edition efficiently pr……続きを見る
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats
Key Features
Create a solid i……続きを見る
著者:Peter Kim
出版社: Secure Planet LLC
発売日: 2015年07月30日
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides t……続きを見る
著者:Todd Barnum
出版社: O'Reilly Media
発売日: 2021年03月18日
If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate securit……続きを見る
Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key F……続きを見る
Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features • Learn the ins and outs of log forwarding and troubles……続きを見る
Reimagine the future of the internet
All our devices and gadgetsーfrom our refrigerators to our home security systems, vacuum cleaners, and stereosーare going online, just like our computers did. Bu……続きを見る