Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratchPurchase of the print or Kindle book includes a free eBook in PDF format.
A practical guide to establishing a risk-based, business-focused information security program to ensure organizational successKey FeaturesFocus on business alignment, engagement, and support using risk-based methodologiesEstablish organizational communication and collaboration emphasizing a culture of securityImplement information security program, cybersecurity hygiene, and architectural and engineering best practicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionInformation Security Handbook is a practical guide that'll empower you to take effective actions in securing your organization's assets.
A practical guide to establishing a risk-based, business-focused information security program to ensure organizational successKey FeaturesFocus on business alignment, engagement, and support using risk-based methodologiesEstablish organizational communication and collaboration emphasizing a culture of securityImplement information security program, cybersecurity hygiene, and architectural and engineering best practicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionInformation Security Handbook is a practical guide that'll empower you to take effective actions in securing your organization's assets.
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution.
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution.
This book presents a fresh approach to cybersecurity issues, seeking not only to analyze the legal landscape of the European Union and its Member States, but to do so in an interdisciplinary manner, involving scholars from diverse backgrounds - ranging from legal experts to ICT and engineering professionals.
Go on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organizationKey FeaturesGain a comprehensive understanding of threat validationLeverage open source tools to test security detectionsHarness open source content to supplement detection and testingBook DescriptionThreat validation is an indispensable component of every security detection program, ensuring a healthy detection pipeline.
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and thought process to perform a successful ethical hackExplore the various stages of an ethical hack and the tools related to each phasePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
When CNN and FOX News asked Vicki Courtney to discuss child safety and the Internet on-air last summer, the best-selling author who is popular among both teenagers and parents knew this urgent issue had to become the core topic of her next book.
Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructionsKey FeaturesDiscover how to use Okta for complete identity and access management in your organizationExplore agentless desktop single sign-on, multifactor authentication, and lifecycle management for enhanced securityLearn about no-code and low-code automation functionalities, also known as Okta WorkflowsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIdentity and access management (IAM) is a set of policies and technologies used to ensure an organization's security, by carefully assigning roles and access to users and devices.
Authoritative Answers to All Your Linux Security Questions Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere.
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders.
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries.
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively.
Packed with real-world examples, this book simplifies cybersecurity, delves into malware development, and serves as a must-read for advanced ethical hackers Free with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesLearn how to develop and program Windows malware applications using hands-on examplesExplore methods to bypass security mechanisms and make malware undetectable on compromised systemsUnderstand the tactics and tricks of real adversaries and APTs and apply their experience in your operationsBook DescriptionMalware Development for Ethical Hackers is a comprehensive guide to the dark side of cybersecurity within an ethical context.
Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation with this comprehensive guideKey FeaturesGain hands-on experience with reputable and reliable tools such as KAPE and FTK ImagerExplore artifacts and techniques for successful cybercrime investigation in Microsoft Teams, email, and memory forensicsUnderstand advanced browser forensics by investigating Chrome, Edge, Firefox, and IE intricaciesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn this digitally driven era, safeguarding against relentless cyber threats is non-negotiable.
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power.
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic.
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances.
Firefox Hacks is ideal for power users who want to take full advantage of Firefox from Mozilla, the next-generation web browser that is rapidly subverting Internet Explorer's once-dominant audience.
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.
Written by the instructors and creators of the JNTCP-ER Certification Exams, JUNOS Enterprise Routing is the only comprehensive book for Juniper enterprise and edge routing environments.
If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable.