"Docker for Beginners - Practical Guide to Containerization Mastery" is a comprehensive guide designed for those who want to discover and master Docker, a revolutionary technology in the field of co……続きを見る
A complete guide to securing the core components of cloud services, with practical, real-world examples using the built-in security features of Azure, AWS, and GCPKey FeaturesDiscover hands-on techn……続きを見る
"Docker pour Débutants - Guide Pratique et Maîtrise de la Conteneurisation" est un guide complet destiné à ceux qui souhaitent découvrir et maîtriser Docker, une technologie révolutionnaire dans le ……続きを見る
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). T……続きを見る
¿Siente curiosidad sobre cómo realizan pruebas de intrusión los hackers? ¿Ha querido tomar cursos presenciales de hacking ético, pero no tiene el tiempo o el dinero para hacerlo? Este libro tiene la……続きを見る
Cyberwarfare, a term that encompasses a wide range of computer-based attacks on targeted enemy states, has emerged as one of the most pressing national security concerns of the 21st century. All aro……続きを見る
¿Siente curiosidad sobre cómo realizan pruebas de intrusión los hackers? ¿Ha querido tomar cursos presenciales de hacking ético, pero no tiene el tiempo o el dinero para hacerlo?_x000D_ _x000D_ Este……続きを見る
From Exposed To Secure reveals the everyday threats that are putting your company in danger and where to focus your resources to eliminate exposure and minimize risk.
Top cybersecurity and complianc……続きを見る
著者:Karina Astudillo
出版社: RA-MA, S.A. Editorial y Publicaciones
発売日: 2024年01月23日
¿Siente curiosidad sobre cómo realizan pruebas de intrusión los hackers? ¿Ha querido tomar cursos presenciales de hacking ético, pero no tiene el tiempo o el dinero para hacerlo?Este libro tiene la ……続きを見る
A modern guide for aspiring Linux administratorsーfrom command line basics to enterprise featuresKey FeaturesExplore a Linux environment with a focus on networking, installation, configuration, and ……続きを見る
Ransomware und Cyber-Erpressung – Sie können etwas dagegen tun
Sie verstehen, wie Angreifer vorgehen.
Sie lernen, was Sie tun müssen, wenn es Sie erwischt hat.
Sie wissen, welche Maßnahmen Sie ab s……続きを見る
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES
Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identifica……続きを見る
Imagine the internet lurking with predators lying in wait to prey on your innocent child. Now, wouldn’t that thought bring any parent into a state of fearful panic?
Unfortunately, this thought is no……続きを見る
The best test preparation resource for the CompTIA Linux+ certification exam
In the newly updated Third Edition of CompTIA Linux+ Practice Tests: Exam XK0-005, veteran Linux expert, Steve Suehring, ……続きを見る
**'A must-read' – New Scientist
The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created – and an existential threat to democracy and human rights.**
……続きを見る
Dieses Buch bietet eine systematische Einführung in die Kernelprogrammierung und in die Entwicklung von Gerätetreibern unter Linux - angefangen bei den Grundlagen bis hin zu speziellen Treibern und ……続きを見る
Boost your confidence and get the competitive edge you need to crack the exam in just 21 days!
About This Book
Day-by-day plan to study and assimilate core concepts from CISSP CBK
Revise and take a……続きを見る
"The ethical hacker and IT security expert, Karina Astudillo B., has trained thousands of university students and IT professionals since 1996, and has helped hacking enthusiasts worldwide by sharing……続きを見る
Over 90 recipes to gain the critical skills needed to deploy and manage OpenDaylight-based solutions
About This Book
This book will help you to build intelligent SDN networks that save your company……続きを見る
Linux Install or Dual Boot is an ebook that gives instructions on how to install Linux, a free and open source operating system, onto your computer. Linux can be installed on older recycled computer……続きを見る
Get to grips with the most common as well as complex Linux networking configurations, tools, and services to enhance your professional skills Key Features • Learn how to solve critical networking pr……続きを見る
L’autore, attraverso un’analisi dettagliata sul funzionamento dei Malware in ambiente Android, vuole suscitare nel lettore la consapevolezza dei rischi connessi all'installazione delle App dal Googl……続きを見る
A complete pentesting guide facilitating smooth backtracking for working hackers
About This Book
Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux
Gain……続きを見る
iPhone 12 is made with A14 Bionic chip, next-generation neural engine. The world’s best Nano-powered processor, according to Apple, is 15% faster and 50% more energy efficiency than the most recent ……続きを見る
Build, Manage and Improve your infrastructure effortlessly.
About This Book
An up-to-date and comprehensive resource on Terraform that lets you quickly and efficiently launch your infrastructure
Le……続きを見る
"La hacker ecuatoriana y experta en seguridad informática, Karina Astudillo B., ha entrenado a miles de estudiantes universitarios y profesionales de computación desde 1996 y ha ayudado a los entusi……続きを見る