Use the Elastic Stack for search, security, and observability-related use cases while working with large amounts of data on-premise and …
If you are willing to search around the internet for the same info, you will most likely find it. I …
Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched …
The first comprehensive guide to discovering and preventing attacks on the Android OSAs the Android operating system continues to increase …
A no-holds-barred examination of the National Security Agency packed with startling secrets about its past, newsbreaking revelations about its present-day …
Over 170 advanced recipes to search, analyze, deploy, manage, and monitor data effectively with Elasticsearch 5.x About This Book Deploy …
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large …
Enhance your skill set to pentest against real-world Microsoft infrastructure with hands-on exercises and by following attack/detect guidelines with OpSec …
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. …
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that …
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, …
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security …
Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever …
The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC ServicesThis completely new, vendor-neutral guide brings together all the …
This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer …
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to …
A practical guide to testing your networks security with Kali Linux - the preferred choice of penetration testers and hackers …
"Revolutionize the world of content delivery with 'Web Content Caching and Distribution: Proceedings of the 8th International Workshop' by Davison. …
The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing …
An example-driven approach to securing Oracle APEX applicationsAs a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to …
Learn the basics of ElasticSearch like data indexing, analysis, and dynamic mapping Query and filter ElasticSearch for more accurate and …
Over 130 advanced recipes to search, analyze, deploy, manage, and monitor data effectively with ElasticSearch About This BookDeploy and manage …
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other …
Master the art of penetration testing with Kali Linux Overview Learn penetration testing techniques with an in-depth coverage of Kali …
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category …
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of …
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with …
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting …
Dive into security testing and web app scanning with ZAP, a powerful OWASP security toolPurchase of the print or Kindle …
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic …
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in …
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect …
As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles …
* Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology * …
Inside Cisco IOS Software Architecture offers crucial and hard-to-find information on Cisco's Internetwork Operating System (IOS) Software. IOS Software provides …
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in …