Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When……続きを見る
Working with Microsoft's network directory service for the first time can be a headache for system and network administrators, IT professionals, technical project managers, and programmers alike. Th……続きを見る
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes add……続きを見る
Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques About This Book • Identify, collect, and analyze Hadoop evidence forensically • Learn about Hadoop's interna……続きを見る
COMPUTER HACKING
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking.
Inside, you will learn the basics of hacking for beg……続きを見る
Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the current CIPP exa……続きを見る
A guide to hacking the human element.
Even the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an email attachment, or revealing sensitive……続きを見る
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender Ke……続きを見る
Gain an in-depth understanding of Microsoft Defender 365, explore its features, and learn successful implementation strategies with this expert-led practitioner's guide. Key FeaturesUnderstand the h……続きを見る
An essential resource for anyone preparing for the CIPM certification exam and a career in information privacy
As cybersecurity and privacy become ever more important to the long-term viability and ……続きを見る
¿Sabes si te han hackeado? ¿Sabe si alguna información personal fue robada de su sistema o cuenta? ¿Siempre has querido aprender a proteger tu sistema de este tipo de ataques? Si respondiste que sí ……続きを見る
When you think of hacking, what might come to your mind are complex codes and scripts that only geniuses can understand. Again, the notion created by the media is that malicious people only do hacki……続きを見る
This book is written in a friendly manner written by an expert with numerous years of practical experience utilizing SolarWinds Orion NPM as a network monitoring solution. This book is for systems a……続きを見る
Few of the many defensive tactics books on the market include the training and methods of martial arts. Drawing on the centuries-old techniques of Ninjutsu, Defensive Tactics for Today’s Law Enforce……続きを見る
Do you know if you were hacked? Do you know if some personal information was stolen from your system or account? Have you always wanted to learn how to protect your system from such attacks? If you ……続きを見る
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systemsーenergy production, water, gas, and other vital systemsーbecomes more important, and hea……続きを見る
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuti……続きを見る
During the Global Financial Crisis in 2008, our financial infrastructure failed.
Governments bailed out the very institutions that let the economy down. This episode spurred a serious rethink of our……続きを見る
The style and approach of the book is an easytoread SharePoint admin guide. This is not a stepbystep instruction book, but rather a guide on how to implement and execute a disaster recovery plan to ……続きを見る
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices.... The authors have heaps of experience in the topics and bring……続きを見る
著者:Joel Brenner
出版社: Penguin Publishing Group
発売日: 2011年09月29日
Now available in a new edition entitled GLASS HOUSES: Privacy, Secrecy, and Cyber Insecurity in a Transparent World.
A former top-level National Security Agency insider goes behind the headlines to ……続きを見る
The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker……続きを見る
Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring……続きを見る
A fully updated edition of the world’s bestselling computer security book Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating att……続きを見る
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, met……続きを見る
著者:Joel Scambray
出版社: McGraw Hill LLC
発売日: 2007年12月25日
The latest Windows security attack and defense strategies
"Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell
Meet the challenges of Windows ……続きを見る
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical ……続きを見る
著者:Joel D Yonts
出版社: Secure Robotics Inc.
発売日: 2023年10月13日
Secure Intelligent Machines
Protecting AI from Cyberattack
We are poised on the edge of the greatest transformation in our world since the industrial revolution. Artificial intelligence, with its lo……続きを見る
Découvrez le paysage actuel de la cybersécurité en 2023 avec cet e-book complet et à jour. Explorez les meilleures pratiques, les outils innovants et les stratégies efficaces pour protéger vos donné……続きを見る
IT-Administratoren bewegen Sich bei ihrer täglichen Arbeit regelmäßig in einem juristischen Minenfeld. Welche Daten müssen im Rahmen eines Auskunftsbegehrens herausgegeben werden? Welche Daten gehör……続きを見る