著者:Chris Brown
出版社: New Cyber Press
発売日: 2025年05月13日
Your job as CISO isn't to secure the company.
It's to turn under-informed risk acceptance into fully-informed risk acceptance.
Anything more is zealotry. Anything less is failure.
CISO Impact and In……続きを見る
Written by Frank Vasquez, an embedded Linux expert, this new edition enables you to harness the full potential of Linux to create versatile and robust embedded solutions All formats include a free P……続きを見る
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security f……続きを見る
The overwhelming majority of a software systemâ??s lifespan is spent in use, not in design or implementation. So, why does conventional wisdom insist that software engineers focus primarily on the d……続きを見る
Build, customize, and deploy Linux-based embedded systems with confidence using Yocto, bootloaders, and build toolsKey FeaturesMaster build systems, toolchains, and kernel integration for embedded L……続きを見る
Harness the power of Linux to create versatile and robust embedded solutions About This Book • Create efficient and secure embedded devices using Linux • Minimize project costs by using open source ……続きを見る
Open Sources 2.0 is a collection of insightful and thought-provoking essays from today's technology leaders that continues painting the evolutionary picture that developed in the 1999 book Open Sour……続きを見る
When an attacker breaks into your network, you have a home-field advantage. But how do you use it?
Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring hone……続きを見る
著者:Chris Tyler
出版社: O'Reilly Media
発売日: 2009年02月09日
"Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros."
-- Behdad Esfahbod, Fedora developer
Thi……続きを見る
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of ……続きを見る
SUSE Linux: A Complete Guide to Novell's Community Distribution will get you up to speed quickly and easily on SUSE, one of the most friendly and usable Linux distributions around. From quick and ea……続きを見る
Leverage the power of Linux to develop captivating and powerful embedded Linux projectsAbout This BookExplore the best practices for all embedded product development stagesLearn about the compelling……続きを見る
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated a……続きを見る
著者:Chris Tyler
出版社: O'Reilly Media
発売日: 2008年12月17日
This book puts you in charge of the most flexible and adaptable graphical interface in the computer industry. The X Window System underlies graphical desktops on Linux and Unix systems, and supports……続きを見る
Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and auto……続きを見る
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated a……続きを見る
Learn to confidently develop, debug, and deploy robust embedded Linux systems with hands-on examples using BeagleBone and QEMUKey FeaturesStep-by-step guide from toolchain setup to real-time program……続きを見る
"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make……続きを見る
If you maintain or plan to build Puppet infrastructure, this practical guide will take you a critical step further with best practices for managing the task successfully. Authors Chris Barbour and J……続きを見る
Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to
Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your gu……続きを見る
Your data has already been sold... Get it back.
There are so many times when we are online, and we need to make sure that our data is safe. We assume that we are doing a good job with a bit of anti-……続きを見る