Cilium is now considered the de facto cloud native networking platform for Kubernetes, connecting, securing, and monitoring millions of applications across thousands of clusters. With such versatili……続きを見る
AI Forensics provides the first comprehensive framework for investigating artificial intelligence systems when they fail, cause harm, or become subjects of legal or regulatory scrutiny. As artificia……続きを見る
In "Careers in Information Technology: Cybersecurity Analyst," readers are introduced to the vital and ever-changing topic of cybersecurity in a perceptive manner. This thorough guide delves into th……続きを見る
In the digital age, where information technology is integral to our daily lives, the threat of computer viruses looms ever larger. "Computer Viruses Unveiled: Types, Trends, and Mitigation Strategie……続きを見る
Every digital system is a battlefield. Every network is a target.
Security is no longer optionalーit is survival.
In Fortifying the Digital Fortress: A Comprehensive Guide to Information Systems Sec……続きを見る
The cloud powers the modern worldーbut without security, it becomes its greatest vulnerability.
Cloud Security Specialists are the guardians standing between innovation and catastrophe.
In Careers i……続きを見る
NEW SECOND EDITION ALIGNED WITH ISC2'S 2024 EXAM OUTLINE. The goal of this concise study guide is simple: to help you confidently pass the CISSP exam and to provide you with a foundation of security……続きを見る
Unlock the full potential of long-term options with Option LEAPS: The Hidden Potential of LEAPS Contracts, the ultimate guide for investors ready to elevate their trading strategy. Whether you’re a ……続きを見る
¿Qué es "observar" sino el acto de examinar atentamente, prestar atención detallada y analizar minuciosamente un objeto, evento o situación? ¿Y cómo puede esta palabra tan simple transformar la form……続きを見る
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, a data query and manipulation language for APIs adopted by ma……続きを見る
著者:Cynthia Tysick
出版社: Taylor & Francis
発売日: 2025年09月29日
An accessible introduction to the technical and social construct of digital identity, this book helps students understand how the data they generate through online activities and apps is used and th……続きを見る
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world……続きを見る
The Lightning Network (LN) is a rapidly growing second-layer payment protocol that works on top of Bitcoin to provide near-instantaneous transactions between two parties. With this practical guide, ……続きを見る
INTRODUCTION: WELCOME TO THE WORLD OF CRYPTO ー YOUR NEW FINANCIAL FRONTIER
Why This Book, Why Now
Something big is happening in the world of money. Quietly at first, then louder with each passing y……続きを見る
This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam
Take the latest version of the CompTIA Security+ exam with complete confidence using the detail……続きを見る
著者:Jon Erickson
出版社: No Starch Press
発売日: 2008年02月01日
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves ha……続きを見る
Worried about hackers taking over your website? Discover how to secure your
WordPress site so you’ll never lose control.
Are you afraid of losing your personal information in a security breach? Has ……続きを見る
著者:Vickie Li
出版社: No Starch Press
発売日: 2021年11月16日
Bug Bounty Bootcampteaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You’ll also learn how……続きを見る
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart gr……続きを見る
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus soft……続きを見る
Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about ……続きを見る
In einer Welt, die zunehmend digitaler wird, mag das Internet manchmal, wie ein unübersichtlicher Dschungel voller Informationen und Möglichkeiten erscheinen. Dieses Buch ist mein Versuch, Ihnen ein……続きを見る
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. Wit……続きを見る
Build a resilient, cloud-native foundation by tackling common anti-patterns head on with practical strategies, cultural shifts, and technical fixes across AWS, Azure, and GCPKey FeaturesIdentify com……続きを見る
Implement decentralized blockchain applications to build scalable Dapps
Key Features
Understand the blockchain ecosystem and its terminologies
Implement smart contracts, wallets, and consensus prot……続きを見る
著者:Kevin Mitnick
出版社: Little, Brown and Company
発売日: 2011年08月15日
In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother a……続きを見る
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Hundreds ……続きを見る
This volume assembles hundreds of cases and studies to provide the most accurate and comprehensive picture of the status of pornography in the criminal justice system. Presenting high-level research……続きを見る
Dieses Buch bietet eine umfassende Einführung in die Welt der Datensicherung und führt durch die essenziellen Bereiche – von Bedrohungen bis hin zu praktischen Schutzstrategien. Die digitale Ära mac……続きを見る
Both enterprise and consumer cloud adoption will lead the market into new realms. From the “cloud to the ground,” each chapter of our ebook looks back at the short history of cloud computing from th……続きを見る