Discover end-to-end penetration testing solutions to enhance your ethical hacking skills
Key Features
Practical recipes to conduct effective penetration testing using the latest version of Kali Lin……続きを見る
'An explosive new book' Daily Mail
'[A] careful, comprehensive interrogation of every major Facebook scandal. An Ugly Truth provides the kind of satisfaction you might get if you hired a private inv……続きを見る
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of ad……続きを見る
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way
This practical guide reveals the powerful weapons and devious methods cyber-terrorist……続きを見る
Master the practical aspects of information systems auditing to pass the CISA exam and accelerate your career. Purchase of the book unlocks access to web-based exam prep resources like practice ques……続きを見る
Conflict in cyberspace is not a new phenomenon, but the legality of hostile cyber activity at a state level remains imperfectly defined. While the United States and its allies are in general agreeme……続きを見る
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Rem……続きを見る
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapi……続きを見る
A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.
A crash course in modern hacking techniques, Ethical Hacking is alread……続きを見る
The definitive guide to incident response--updated for the first time in a decade!
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forens……続きを見る
Unlock the power of effective project management in the realm of cybersecurity. In this comprehensive e-book, discover a strategic approach to safeguarding your digital assets while optimizing your ……続きを見る
Get hands-on experience on concepts of Bug Bounty Hunting
Key Features
Get well-versed with the fundamentals of Bug Bounty Hunting
Hands-on experience on using different tools for bug hunting
Learn……続きを見る
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurrin……続きを見る
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques
Key Features
Create a solid incident response framework and manage cy……続きを見る
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in conte……続きを見る
著者:Andy Greenberg
出版社: Knopf Doubleday Publishing Group
発売日: 2019年11月05日
**"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russi……続きを見る
This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible forma……続きを見る
Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal in……続きを見る
It is apparent that file sharing on the Internet has become an emerging norm of media consumptionーespecially among young people. This book provides a critical perspective on this phenomenon, explor……続きを見る
Journalism has been transformed by the Internet and the Internet has opened journalists to levels of surveillance that would have horrified George Orwell. All journalists should be aware of the dang……続きを見る
Well, we've been warned that this time would come - probably from the earlier eighties on. Yes, computers have finally taken over and if you doubt it, we're here to convince you - but not because we……続きを見る
The charismatic forger immortalized in Catch Me If You Can exposes the astonishing tactics of today’s identity theft criminals and offers powerful strategies to thwart them based on his second caree……続きを見る
This book is an introduction to writing Linux shell scripts and installation of certain important tools for industry usage.
Topics included are the use of commands and shortcuts in shell scripting, ……続きを見る
Parents today have double the hassle of taking care of their child. Not only do you keep an eye on them in the real world, now you need to look out for their goings on in the internet world as well.……続きを見る
The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who ……続きを見る
If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to ……続きを見る
"...lucid, in-depth descriptions of the behavior of every HTML tag on every major browser and platform, plus enough dry humor to make the book a pleasure to read."
--Edward Mendelson, PC Magazine
"W……続きを見る
This is a pocket reference for getting started Raspberry Pi.
**TOC** 1. Introduction to Raspberry Pi 1.1 Raspberry Pi 1.2 Getting Hardware 2. Raspberry Pi Software 2.1 Raspberry Pi Operating Sys……続きを見る
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, t……続きを見る