著者:Chris Brown
出版社: New Cyber Press
発売日: 2025年05月13日
Your job as CISO isn't to secure the company.
It's to turn under-informed risk acceptance into fully-informed risk acceptance.
Anything more is zealotry. Anything less is failure.
CISO Impact and In……続きを見る
Protect your cloud, virtual, and on-premises environments by implementing Veeam's powerful backup and replication technology Purchase of the print or Kindle book includes a free PDF eBookKey Feature……続きを見る
"InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Pro……続きを見る
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what th……続きを見る
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack a……続きを見る
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pen……続きを見る
The first two books in this series "Stealing the Network: How to Own the Box and "Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of t……続きを見る
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logg……続きを見る
CompTIA Linux+ Certification Study Guide (2009 Exam) offers a practical guide for those interested in pursuing a Linux+ certification. It covers the required content as specified in CompTIAs exam ob……続きを見る
The Ultimate Tool for MINDSTORMS® ManiacsThe new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics info……続きを見る
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuratio……続きを見る
In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordl……続きを見る
Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical guide for those preparing for the Linux+ certification exam.The book begins with a review of important concepts that are needed for ……続きを見る
Cloud-typische Sicherheitsthemen verständlich und praxisnah erklärt
Strategien und Lösungsansätze für alle gängigen Cloud-Plattformen, u.a. AWS, Azure und IBM Cloud
Deckt das breite Spektrum der Se……続きを見る
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security f……続きを見る
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicat……続きを見る
The overwhelming majority of a software systemâ??s lifespan is spent in use, not in design or implementation. So, why does conventional wisdom insist that software engineers focus primarily on the d……続きを見る
Protect your cloud, virtual, and on-premises environments by implementing Veeam's powerful backup and replication technology
Key Features
Gain in-depth knowledge of CDP and hardened repositories th……続きを見る
著者:Chris McNab
出版社: O'Reilly Media
発売日: 2016年12月06日
How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you’l……続きを見る
著者:Chris Sanders
出版社: No Starch Press
発売日: 2017年03月30日
It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your n……続きを見る
When an attacker breaks into your network, you have a home-field advantage. But how do you use it?
Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring hone……続きを見る
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management
Organizations spend tremendous time and resources addressing vu……続きを見る
著者:Chris Dotson
出版社: O'Reilly Media
発売日: 2023年10月06日
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best pra……続きを見る
Discover the new cybersecurity landscape of the interconnected software supply chain
In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran informa……続きを見る
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and……続きを見る
In introducing the National Security Commission on AI’s final report, Eric Schmidt, former Google CEO, and Robert Work, former Deputy Secretary of Defense, wrote: “The human talent deficit is the go……続きを見る
Ace the AZ 801 exam and master advanced Windows Server and Infrastructure-as-a-Service workload administration with this comprehensive guide
Purchase of the print or Kindle book includes a free PDF ……続きを見る
著者:Chris Jackson
出版社: Pearson Education
発売日: 2010年06月02日
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.
Cisco n……続きを見る
Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully w……続きを見る
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 200……続きを見る