Transform your network operations with AI-powered automation, and learn code generation, prompt engineering, and practical recipes for building custom network tools using AI assistants and PythonKey……続きを見る
著者:Federico Martínez
出版社: Universidad Austral Ediciones
発売日: 2025年09月30日
Este trabajo examina el desarrollo y el impacto actual del Internet de las cosas (IoT), abordando sus aplicaciones en el hogar, la industria y la sociedad. Analiza sus beneficios, como la automatiza……続きを見る
The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover……続きを見る
Get to grips with the latest container examples, Python 3 features, GitLab DevOps, network data analysis, and cloud networking to get the most out of Python for network engineering with the latest e……続きを見る
Securing your business can be daunting, especially when you're small. That's why Security for Everyone offers low-cost, scalable solutions to securing your startup or growing business. It will test ……続きを見る
Sortez des sentiers battus et forcez les limites des systèmes informatique
Les hackers n'ont de cesse de repousser les limites, d’explorer l’inconnu et de faire évoluer leur science. Connaître leurs……続きを見る
CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtain CISSP certification. The exam is designed to ensure th……続きを見る
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.Ne……続きを見る
Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved ……続きを見る
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying o……続きを見る
INSTANT USA TODAY BESTSELLER!
National security strategist and former FBI counterintelligence operative Eric O’Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and……続きを見る
This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components……続きを見る
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create h……続きを見る
Methods Used to Solve Discrete Math ProblemsInteresting examples highlight the interdisciplinary nature of this areaPearls of Discrete Mathematics presents methods for solving counting problems and ……続きを見る
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. Wit……続きを見る
著者:Jon Erickson
出版社: No Starch Press
発売日: 2008年02月01日
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves ha……続きを見る
Power up your network applications with Python programming
Key Features
Master Python skills to develop powerful network applications
Grasp the fundamentals and functionalities of SDN
Design multi-……続きを見る
Portal's ZK-SWAPS white paper, available in ebook format. (Part 1 of 3)
ABSTRACT: In this white paper, we unveil a multilayered system purpose-built for spot trading cryptocurrencies which allows us……続きを見る
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systemsーenergy production, water, gas, and other vital systemsーbecomes more important, and hea……続きを見る
Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an……続きを見る
Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy best suited to your organization. It focu……続きを見る
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scam……続きを見る
Man in the Browser è il primo libro dedicato interamente all’omonimo attacco informatico. Diversi professionisti hanno collaborato alla redazione del presente volume e grazie alle loro diverse spec……続きを見る
Introdução da segurança de redes Wi-Fi, focada em testes de segurança do protocolo WPS (Wi-Fi Protected Setup). Este e-livro oferece um primeiro passo essencial para entender o processo de teste de ……続きを見る
Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law ……続きを見る
This book presents the concept of cryptcoding which arises from the need to obtain secure and accurate transmission. Therefore, it is necessary to improve constantly existing and develop new algorit……続きを見る
Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features • Learn all you need to know about different identity patterns and implement……続きを見る
Why you can’t protect your enterprise from cyber problems; and suggestions on how to fix that.
You are not looking to the practices of established industries for cyber hiring and cyber training gui……続きを見る
著者:Eric Diehl
出版社: Springer International Publishing
発売日: 2016年12月15日
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentica……続きを見る