The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC ServicesThis completely new, vendor-neutral guide brings together all the …
This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to …
A practical guide to testing your networks security with Kali Linux - the preferred choice of penetration testers and hackers …
"Revolutionize the world of content delivery with 'Web Content Caching and Distribution: Proceedings of the 8th International Workshop' by Davison. …
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that …
Learn the basics of ElasticSearch like data indexing, analysis, and dynamic mapping Query and filter ElasticSearch for more accurate and …
Over 130 advanced recipes to search, analyze, deploy, manage, and monitor data effectively with ElasticSearch About This BookDeploy and manage …
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other …
Master the art of penetration testing with Kali Linux Overview Learn penetration testing techniques with an in-depth coverage of Kali …
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of …
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category …
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting …
Dive into security testing and web app scanning with ZAP, a powerful OWASP security toolPurchase of the print or Kindle …
As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles …
Tiller, a security services expert, is a "white hacker" who gets paid to hack into computers to show companies how …
* Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology * …
Inside Cisco IOS Software Architecture offers crucial and hard-to-find information on Cisco's Internetwork Operating System (IOS) Software. IOS Software provides …
There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several …
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in …
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high …
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead …
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's …
Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This …
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTERThe Pentester BluePrint: Your Guide to Being a Pentester offers readers …
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, …
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer …
Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products …
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of …
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, …
""Unlock the Power of Ceph: A Comprehensive Guide for Administrators and Architects!\n\nGet ready to master Ceph, the leading open-source, distributed …
The TNF and TNF receptor gene superfamilies control a variety of distinct physiological functions such as cell proliferation, differentiation, and …