Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic …
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. …
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in …
Cyber Threat Hunting teaches you how to identify potential breaches of your security. You’ll learn by exploring real-life scenarios drawn …
What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. …
Become an expert at managing enterprise identity infrastructure by leveraging Active Directory Key Features • Explore the new features in …
An accessible introduction to cybersecurity concepts and practicesCybersecurity Essentialsprovides a comprehensive introduction to the field, with expert coverage of essential …
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOKFrom the basics to advanced techniques: …
Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical …
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book …
NGINX is a high-performance HTTP server and mail proxy designed to use very few system resources. With the many tutorials …
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides …
Secure web application from todays most devious hackers. Web Application Security: A Beginners Guide helps you stock your security toolkit, …
Nginx is an open source and cross-platform reverse proxy server designed for low memory usage and high performance and concurrency. …
SAP Press / Rheinwerk Publishing, 2014. — 722 p. — ISBN 1592299520, 978-1-59229-952-2 (print), ISBN 978-1-59229-953-9 (e-book). Learn how traditional …
Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how …
In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, …
FromWiredsenior writer Andy Greenberg comes the true story of the desperate hunt to identify and track an elite team of …
Some books give you good advice, but only about part of the security problem. Others provide solutions so generic that …
Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend …
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or …
This textbook was written from the perspective of someone who began his software security career in 2005, long before the …
The text provides a systematic approach to the problems involved in the application of error-correcting codes in data networks. It …
Sound investment decisions require an in-depth knowledge of the financial markets and available financial instruments. This book provides students and …
Книга по аппаратному взлому. Based on a dissertation submitted September 2004 by the author for the degree of Doctor of …
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical …
I decided to write this book for a couple of reasons. One was that I've now written a couple of …
Отностельно новая модель оценки акций, определющая внутреннюю (intrinsic) стоимость акций как совокупность "статичной" стоимости и "франшизы", компоненты роста. Излагаемая в …
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities …
Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as …
Новая книга от самого дорого коуча в мире. очередная инструкция как привести свои финансовые дела в порядок. И сделать доходы …
Damondaran on Valuation will not only convince you of the vitality of the many valuation models available to you, it …
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know …
Google Cloud Platform in Action teaches you to build and launch applications that scale, leveraging the many services on GCP …