Vi bøger
Levering: 1 - 2 hverdage

Datasikkerhed

Her finder du spændende bøger om Datasikkerhed. Nedenfor er et flot udvalg af over 1.987 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Imen Jemili
    635,95 kr.

    This book constitutes revised selected papers from the 4th International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2023, which took place in Bizerte, Tunisia, on May 27, 2023.The 6 full papers included in this book were carefully reviewed and selected from 13 submissions. The book also contains one invited talk. The contributions focus on vehicular networks and emerging technologies and cyber safety and security of intelligent transportation systems.

  • af Hang Zhou
    1.888,95 - 1.896,95 kr.

    This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication.Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.

  • af Samia Bouzefrane
    641,95 kr.

    This book constitutes the refereed post-proceedings of the 9th International Conference on Mobile, Secure, and Programmable Networking, MSPN 2023, held in Paris, France, during October 26¿27, 2023.The 15 full papers included in this book were carefully reviewed and selected from 31 submissions. They were organized in topical sections as follows vertical tools on machine leaning and artificial intelligence, network programming and Cloud computing, Industrial Internet of things, Digital Twins and Security.

  • af Sean Morrissey
    563,95 kr.

    iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community.

  • af Rob Botwright
    437,95 kr.

    Introducing the "Trojan Exposed" Book Bundle: Your Ultimate Defense Against Cyber Threats!¿¿¿¿¿ Are you concerned about the ever-present threat of cyberattacks and Trojan malware? ¿¿¿¿ Do you want to strengthen your cybersecurity knowledge and capabilities? ¿¿¿¿ Whether you're a beginner or a seasoned professional, this bundle is your comprehensive guide to fortify your digital defenses.¿¿¿¿ Book 1: "Trojan Exposed: A Beginner's Guide to Cybersecurity" ¿¿¿¿ Learn the foundational principles of cybersecurity and understand the history of Trojans. ¿¿¿¿ Discover essential tips to safeguard your digital environment and protect your data. ¿¿¿¿¿¿¿¿¿ Ideal for beginners who want to build a solid cybersecurity foundation.¿¿¿¿ Book 2: "Trojan Exposed: Mastering Advanced Threat Detection" ¿¿¿¿¿¿¿¿ Dive deep into the intricacies of Trojan variants and advanced detection techniques. ¿¿¿¿ Equip yourself with expertise to identify and mitigate sophisticated threats. ¿¿¿¿ Perfect for those looking to take their threat detection skills to the next level.¿¿¿¿ Book 3: "Trojan Exposed: Expert Strategies for Cyber Resilience" ¿¿¿¿ Shift your focus to resilience and preparedness with expert strategies. ¿¿¿¿¿ Build cyber resilience to withstand and recover from cyberattacks effectively. ¿¿¿¿ Essential reading for anyone committed to long-term cybersecurity success.¿¿¿¿ Book 4: "Trojan Exposed: Red Team Tactics and Ethical Hacking" ¿¿¿¿ Take an offensive approach to cybersecurity. ¿¿¿¿ Explore the tactics used by ethical hackers and red teamers to simulate real-world cyberattacks. ¿¿¿¿¿¿¿¿¿ Gain insights to protect your systems, identify vulnerabilities, and enhance your cybersecurity posture.¿¿¿¿ Why Choose the "Trojan Exposed" Bundle? ¿¿¿¿ Gain in-depth knowledge and practical skills to combat Trojan threats. ¿¿¿¿ Benefit from a diverse range of cybersecurity topics, from beginner to expert levels. ¿¿¿¿ Achieve a well-rounded understanding of the ever-evolving cyber threat landscape. ¿¿¿¿ Equip yourself with tools to safeguard your digital world effectively.Don't wait until it's too late! Invest in your cybersecurity education and take a proactive stance against Trojan threats today. With the "Trojan Exposed" bundle, you'll be armed with the knowledge and strategies to protect yourself, your organization, and your data from the ever-present cyber menace.¿¿¿¿¿ Strengthen your defenses. ¿¿¿¿ Master advanced threat detection. ¿¿¿¿ Build cyber resilience. ¿¿¿¿ Explore ethical hacking tactics.Join countless others in the quest for cybersecurity excellence. Order the "Trojan Exposed" bundle now and embark on a journey towards a safer digital future.

  • af Rob Botwright
    437,95 kr.

    ¿¿¿¿ Wireless Exploits and Countermeasures Book Bundle ¿¿¿¿Unveil the Secrets of Wireless Security with Our Comprehensive Bundle!Are you ready to dive into the intriguing world of wireless network security? Introducing the "Wireless Exploits and Countermeasures" book bundle - a collection of four essential volumes designed to empower you with the skills, knowledge, and tools needed to safeguard wireless networks effectively.¿¿¿¿ Book 1 - Wireless Exploits and Countermeasures: A Beginner's Guide Begin your journey with a solid foundation in wireless security. This beginner-friendly guide introduces you to wireless networks, helps you grasp the fundamentals, and equips you with the essential tools and strategies to secure them. Perfect for newcomers and those seeking to reinforce their basics.¿¿¿¿ Book 2 - Mastering Kali Linux NetHunter for Wireless Security Ready to take your skills to the next level? "Mastering Kali Linux NetHunter" is your go-to resource. Explore advanced Wi-Fi scanning, mobile security assessments, and wireless exploits using the powerful Kali Linux NetHunter platform. Ideal for aspiring mobile security experts and seasoned professionals alike.¿¿¿¿ Book 3 - Aircrack-ng Techniques: Cracking WEP/WPA/WPA2 Keys Unlock the secrets of Wi-Fi encryption with "Aircrack-ng Techniques." Delve deep into cracking WEP, WPA, and WPA2 keys using Aircrack-ng. This volume arms you with the techniques and knowledge needed to assess Wi-Fi vulnerabilities and enhance network security.¿¿¿¿ Book 4 - Kismet and Wireshark: Advanced Wireless Network Analysis Ready to become a wireless network analysis expert? "Kismet and Wireshark" takes you on an advanced journey. Learn passive and active reconnaissance, wireless packet capture, traffic analysis, and how to detect and respond to wireless attacks. This volume is your guide to mastering complex wireless network assessments.¿¿¿¿ Unlock the Power of Wireless Security Today!Don't miss this opportunity to embark on a journey through the exciting realm of wireless security. Arm yourself with the skills to protect your digital world. Whether you're a newcomer or an experienced professional, this bundle has something for everyone.Secure your copy of the "Wireless Exploits and Countermeasures" book bundle now and become a wireless security expert! ¿¿¿¿¿¿¿¿¿¿¿¿

  • af Rob Botwright
    437,95 kr.

    Unlock the Power of Network Security with the NMAP Network Scanning Series!Welcome to the Network Security, Monitoring, and Scanning Library, a comprehensive bundle that will empower you with the knowledge and skills needed to navigate the intricate world of network security and reconnaissance. In today's digital age, safeguarding your networks and data has never been more critical, and this book bundle is your ultimate guide to network security excellence.Book 1: NMAP for Beginners - A Practical Guide to Network Scanning Are you new to network scanning? This book is your perfect starting point. Dive into foundational concepts and follow easy-to-understand instructions to kickstart your journey toward mastering network scanning.Book 2: NMAP Mastery - Advanced Techniques and Strategies for Network Analysis Ready to take your skills to the next level? Explore advanced techniques, NMAP scripting, customized scanning, and perform in-depth network assessments. Become a true NMAP expert.Book 3: NMAP Security Essentials - Protecting Networks with Expert Skills Learn the art of network protection! Discover expert-level skills to secure your network infrastructure, analyze firewall rules, and harden network devices. Protect what matters most.Book 4: NMAP Beyond Boundaries - Mastering Complex Network Reconnaissance Ready for the big leagues? Delve into geospatial mapping, IoT security, cloud scanning, and web application assessment. Tackle intricate network challenges with confidence.Whether you're an IT professional, network administrator, or cybersecurity enthusiast, this bundle caters to your needs. Each book is informative, practical, and transformative, providing you with the skills required to protect and secure your networks.Embark on this educational journey and master the art of network scanning, securing your digital assets, and navigating the complexities of the modern cybersecurity landscape. Join us and become a network security expert today!

  • af V T Sreekumar
    352,95 kr.

    Embark on a transformative journey through the pages of "Infinite Possibilities," a guide that illuminates the extraordinary avenues of manifesting your deepest aspirations. This book is your compass in the boundless realm of potential, offering insights, strategies, and a roadmap to navigate the labyrinth of your dreams.Unveiling the Canvas of Imagination: Step into the world of boundless imagination and creative potential. "Infinite Possibilities" invites you to explore the vast landscapes of your dreams, encouraging you to dream bigger, bolder, and with unwavering belief in the limitless possibilities that await.Navigating the Online Universe: Delve into the digital frontier as the book unveils the tremendous possibilities of earning money online. From crafting a solid foundation to building automated income streams, each chapter is a beacon guiding you through the intricacies of the virtual realm, providing practical insights into leveraging technology and mastering digital marketing.From Hustle to Harmony: Discover the delicate balance between work and well-being. "Infinite Possibilities" unveils the art of transitioning from hustle to harmony, helping you navigate the challenges of the digital age while maintaining a sense of balance, purpose, and well-being.Legacy of Prosperity: Aspire to create a legacy that echoes through generations. This guide takes you on a journey into the heart of generational wealth, offering strategies for strategic financial planning, entrepreneurship, and the timeless art of leaving behind a legacy that transcends material wealth.Key Features:Holistic Guidance: "Infinite Possibilities" is not just a guide to financial success; it's a holistic companion on your journey to manifesting dreams. From nurturing creativity to fostering well-being, each chapter offers a comprehensive approach to personal and professional fulfilment.Practical Strategies: Dive into practical strategies that demystify the complexities of the online landscape. Whether you're a seasoned entrepreneur or just beginning your online ventures, this guide provides actionable insights to propel you toward success.Inspiration for Every Chapter of Life: No matter where you are on your journey-whether you're dreaming, building, or envisioning a legacy-each chapter is designed to resonate with your unique aspirations. "Infinite Possibilities" is a timeless guide that grows with you.Visionary Wisdom: Immerse yourself in the wisdom of visionaries who have navigated the path of dreams to achieve unprecedented success. Learn from their experiences, embrace their insights, and apply their wisdom to your own journey.Interactive Reflections: Throughout the book, find prompts and reflections that encourage self-discovery and introspection. Engage with these interactive elements to personalize the guidance and align it with your individual dreams and goals."Infinite Possibilities" is more than a book; it's a companion, a mentor, and a source of inspiration on your quest to manifesting your dreams. Whether you seek financial abundance, work-life harmony, or a legacy of prosperity, this guide is your gateway to the limitless possibilities that await you in the expansive universe of your dreams.

  • af V T Sreekumar
    337,95 kr.

    Embark on a transformative journey towards unparalleled success with "The Success Equation: Unlocking the Secrets of Achievement." This compelling and insightful book, written by acclaimed authors, guides readers through a comprehensive exploration of the multifaceted elements that culminate in true success.In this illuminating work, the authors delve into the intricacies of success, dissecting it into key components that form the elusive equation for achieving one's goals. From mindset mastery to financial wisdom, the book covers a spectrum of topics, offering a holistic approach to personal and professional triumph.Unveil the secrets of shaping a resilient mindset that withstands challenges, learn the art of strategic synergy to craft a blueprint for success, and discover the transformative power of leaving a lasting legacy. Each chapter is meticulously crafted to provide practical insights, actionable strategies, and real-world examples, making "The Success Equation" a valuable guide for individuals at any stage of their journey.As the authors unravel the complexities of success, they emphasize the interplay of various factors such as mindset, collaboration, financial mastery, and the pursuit of a meaningful legacy. The book doesn't just stop at uncovering these elements; it provides readers with the tools and knowledge needed to integrate them into their lives.Whether you are an aspiring professional, an entrepreneur, or someone seeking personal growth, this book offers a roadmap to navigate the challenges and triumphs on the path to success. Each chapter is a key to unlock a different facet of achievement, providing readers with a comprehensive guide to not just setting goals, but surpassing them."The Success Equation: Unlocking the Secrets of Achievement" is not just a book; it's a manual for mastering the art of success. It challenges conventional notions, encourages a paradigm shift in thinking, and empowers individuals to unlock their full potential. Embrace the wisdom within these pages, and embark on a journey that will redefine your understanding of success and equip you with the tools to achieve it.

  • af Reza Montasari
    1.718,95 kr.

    This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications.The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content.Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it.Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security.Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book's exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies.Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI's transformative role in shaping the future of national and international security.

  • af Mark Manulis
    640,95 kr.

    This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023. The 14 full papers included in the book were carefully reviewed and selected from 57 submissions. They focus on all theoretical and practical aspects related to information technology and communications security.

  • af Liang-Jie Zhang
    538,95 kr.

    This book constitutes the refereed proceedings of the 8th International Conference on Internet on Things, ICIOT 2023, held as part of SCF 2023, in Shenzhen, China, during December 17¿18, 2023.The 8 full papers presented in this volume were carefully reviewed and selected from 28 submissions. The papers cover topics in the field of sensors and other types of sensing devices, wired and wireless networks, platforms and tools, data processing/visualization/analysis and integration engines.

  • af Yan Meng
    1.330,95 - 1.339,95 kr.

  • af Anubhab Baksi
    1.221,95 kr.

    This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Considering the progress in the field of quantum computing over the past few years, there is an ever-growing need to analyze the ciphers that are being employed in ensuring security. The symmetric key ciphers are generally considered safe against quantum computers, though one must consider the possible impact due to Grover's search algorithm (that reduces the security claim to the square root bound of what is expected against a classical computer). This book consolidates all the major research works in one place and presents it with adequate clarity, making the subject matter easy to understand for seasoned researchers and students alike. It covers the prerequisite information, new research works (including some of the state of the art), thought-provoking problems for further research, and all the relevant source codes. This book is interesting to engineers, researchers, and students who work/study in the field of cryptography.

  • af Amit Joshi
    2.387,95 kr.

    This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies. The conference will be held in Jaipur, India during 8 ¿ 9 December 2023. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective strategies for its implementation for engineering and managerial applications. This book contains papers mainly focused on ICT for computation, algorithms and data analytics and IT security. The work is presented in five volumes

  • af Debasis Gountia
    1.712,95 kr.

    This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical. Some of the themes covered include network security, firewall security, automation in forensic science and criminal investigation, Medical of Things (MOT) security, healthcare system security, end-point security, smart energy systems, smart infrastructure systems, intrusion detection/prevention, security standards and policies, among others. This book is a useful guide for those in academia and industry working in the broad field of IT security.

  • af Adarsh Kumar
    1.288,95 kr.

    This book focuses on the sustainable security practices in the domain of blockchain, quantum, and post-quantum technologies dealing with the real-time applications. The topics discussed in this book include banking applications, protection of digital assets in healthcare, military defense applications, supply chain management, secure messaging, and keyless secure infrastructures.Blockchains and quantum technologies are the emerging technological developments both in academic and industrial domains. The problems related to quantum threat and execution of post-quantum signatures in a blockchain platform have become hot topics in today's scientific community because they have remarkably progressed in recent years and have found a variety of applications.This book is a valuable resource for academicians, researchers, students, and technicians in the field of blockchain and quantum computing.

  • af Dmitry Vostokov
    722,95 kr.

    Solid C and C]+ knowledge is a must to fully understand Linux diagnostic artifacts such as core memory dumps and do diagnostic, forensic, and root cause analysis beyond listing backtraces. This full-color reference book is a part of the Accelerated C & C++ for Linux Diagnostics training course organized by Software Diagnostics Services. The text contains slides, brief notes highlighting particular points, and replicated source code fragments that are easy to copy into your favorite IDE. The book's detailed Table of Contents makes the usual Index redundant. We hope this reference is helpful for the following audiences: C and C++ developers who want to deepen their knowledgeSoftware engineers developing and maintaining products on Linux platformsTechnical support, escalation, DevSecOps, cloud and site reliability engineers dealing with complex software issuesQuality assurance engineers who test software on Linux platformsSecurity and vulnerability researchers, reverse engineers, malware and memory forensics analysts

  • af Trung Q Duong
    1.697,95 kr.

    Addressing the physical layer security challenges and proposing efficient and resilient physical layer security solutions for beyond 5G networks leading to 6G, this book will help readers better understand the expectations of 6G's physical layer security in supporting a range of communications and sensing technologies.

  • af Cong T Nguyen
    1.497,95 kr.

    Starting with an overview of blockchain technology and consensus mechanisms including basic concepts, network architecture and main components, the book then provides a review of advanced PoS-based consensus mechanisms and discusses important challenges including PoS consensus security and PoS performance and scalability issues.

  • af Paul Duplys
    537,95 kr.

    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionTLS is the most widely used cryptographic protocol today, enabling e-commerce, online banking, and secure online communication. TLS Cryptography in Depth will help you gain a deep understanding of how and why TLS works, how past attacks on TLS were possible, and how vulnerabilities that enabled them were addressed in the latest TLS version 1.3. By exploring the inner workings of TLS, you'll be able to configure it and use it more securely.Starting with the basic concepts, you'll be led step by step through the world of modern cryptography, guided by the TLS protocol. As you advance, you'll be learning about the necessary mathematical concepts from scratch. Even seemingly arcane topics such as public-key cryptography based on elliptic curves will be explained with a view on real-world applications in TLS. With easy-to-understand concepts, you'll find out how secret keys are generated and exchanged in TLS, and how they are used to create a secure channel between a client and a server.By the end of this book, you'll have understood the inner workings of TLS and how to configure TLS servers securely. Moreover, you'll have gained a deep knowledge of the cryptographic primitives that make up TLS and will be able to apply this knowledge in other security-related contexts.What you will learn- Understand TLS principles and protocols for secure internet communication- Find out how cryptographic primitives are used within TLS V1.3- Discover best practices for secure configuration and implementation of TLS- Evaluate and select appropriate cipher suites for optimal security- Get an in-depth understanding of common cryptographic vulnerabilities and ways to mitigate them- Explore forward secrecy and its importance in maintaining confidentiality- Understand TLS extensions and their significance in enhancing TLS functionalityWho this book is forThis book is for IT professionals, cybersecurity professionals, security engineers, cryptographers, software developers, and administrators looking to gain a solid understanding of TLS specifics and their relationship with cryptography. This book can also be used by computer science and computer engineering students to learn about key cryptographic concepts in a clear, yet rigorous way with its applications in TLS. There are no specific prerequisites, but a basic familiarity with programming and mathematics will be helpful.Table of Contents- The Role of Cryptography in the Connected World- Secure Channel and the CIA Triad- A Secret to Share- Encryption and Decryption- Entity Authentication- Transport Layer Security at a Glance- Public-Key Cryptography- Elliptic Curves- Digital Signatures- Digital Certificates and Certification Authorities- Hash Functions and Message Authentication Codes- Secrets and Keys in TLS 1.3- TLS Handshake Protocol Revisited- Block Ciphers and Their Modes of Operation- Authenticated Encryption- The Galois Counter Mode- TLS Record Protocol Revisited- TLS Cipher Suites- Attacks on Cryptography- Attacks on the TLS Handshake Protocol- Attacks on the TLS Record Protocol- Attacks on TLS Implementations

  • af Jean-Christophe Gaillard
    207,95 kr.

    A must-read for top executives seeking to break patterns of frustration and breach around cybersecurity and a precious management summary to the "Cybersecurity Leadership Handbook for the CISO and the CEO"

  • af Lindsay M. Thompson
    172,95 kr.

    Blockchain is transforming far more than finance through an explosion of decentralized projects aiming to remake entire systems. This book illuminates the expanding universe of DePINs - Decentralized Projects -that leverage blockchain's unique capabilities to drive revolutionary change.Learn how DePINs are pioneering new models of grassroots innovation across crucial realms like energy, connectivity, identity, governance, environmental sustainability and economic inclusion. Early examples hint at how rearchitecting systems around participation and transparency unlocks unprecedented opportunities to rebuild outdated infrastructure and unsafeguarded data monopolies.The book guides readers through the emerging landscape, showcasing use cases and paradigms where decentralized solutions address systemic issues overlooked by legacy centralized systems and profit-driven disruptors. Clear explanations make the technologies accessible for non-experts, while emphasizing real-world challenges and benefits over hype.Ultimately this work reveals how the DePIN revolution promises a future that is not just decentralized but also greener, more equitable, collaborative and empowering. But this requires expanding imagination beyond existing constraints. The book aims to accelerate this critical mindset shift ahead.

  • af Rob Botwright
    437,95 kr.

    Introducing the Ultimate Ethical Hacking Book Bundle: "PENTESTING 101: CRACKING GADGETS AND HACKING SOFTWARE"Are you ready to embark on a thrilling journey into the world of ethical hacking and cybersecurity? Look no further! Our "PENTESTING 101: CRACKING GADGETS AND HACKING SOFTWARE" book bundle is your one-stop guide to mastering the art of ethical hacking and safeguarding digital landscapes.This carefully curated bundle comprises four comprehensive volumes, each designed to take you from novice to expert in the exciting realm of cybersecurity:BOOK 1 - PENTESTING 101: A BEGINNER'S GUIDE TO ETHICAL HACKING ¿¿¿¿ Perfect for beginners, this book demystifies ethical hacking, guiding you through setting up your hacking environment and understanding the hacker mindset. Learn scanning and enumeration techniques and establish a solid foundation in ethical hacking.BOOK 2 - PENTESTING 101: EXPLOITING VULNERABILITIES IN NETWORK SECURITY ¿¿¿¿ Dive into the heart of network security as you explore how to exploit vulnerabilities in network protocols, gain unauthorized access to network resources, and safely intercept network traffic. Strengthen your ability to protect and secure networks effectively.BOOK 3 - PENTESTING 101: ADVANCED TECHNIQUES FOR WEB APPLICATION SECURITY ¿¿¿¿ With a focus on web application security, this volume equips you with the skills to tackle advanced vulnerabilities. Understand the intricacies of web application architecture, authentication, and session management testing. Learn to safeguard web applications from cyber threats.BOOK 4 - PENTESTING 101: MASTERING CYBERSECURITY CHALLENGES AND BEYOND ¿¿¿¿ Take your expertise to the next level with advanced network penetration testing techniques, exploration of IoT and embedded systems, and addressing challenges in cloud security. Become proficient in real-world ethical hacking scenarios, incident management, digital forensics, and career advancement.By purchasing "PENTESTING 101: CRACKING GADGETS AND HACKING SOFTWARE," you'll gain access to a treasure trove of knowledge, skills, and practical insights that will empower you to excel in the field of ethical hacking and cybersecurity.Why Choose Our Book Bundle? ¿ Comprehensive Coverage: From beginner to advanced topics, we've got you covered. ¿ Expert Authors: Learn from seasoned cybersecurity professionals with years of experience. ¿ Hands-On Learning: Practical exercises and real-world scenarios enhance your skills. ¿ Ethical Focus: We emphasize ethical hacking as a force for good in securing digital landscapes. ¿ Career Growth: Unlock new career opportunities and enhance your cybersecurity resume.Don't miss this chance to become a cybersecurity expert. Invest in your future and secure your digital world with "PENTESTING 101: CRACKING GADGETS AND HACKING SOFTWARE" today!¿¿¿¿¿ Take the first step towards becoming an ethical hacking maestro. Order now and embark on your cybersecurity journey! ¿¿¿¿

  • af Jit Sinha
    432,95 kr.

    Empower Your Digital Shield with Splunk Expertise!Book DescriptionThe Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).It further explores topics such as data ingestion and normalization, understanding SIEM, and threat detection and response. It then delves into advanced analytics for threat detection, integration with other security tools, and automation and orchestration with Splunk.Additionally, it covers cloud security with Splunk, DevOps, and security operations. Moreover, the book provides practical guidance on best practices for Splunk in cybersecurity, compliance, and regulatory requirements. It concludes with a summary of the key concepts covered throughout the book.Table of Contents1. Introduction to Splunk and Cybersecurity2. Overview of Splunk Architecture3. Configuring Inputs and Data Sources4. Data Ingestion and Normalization5. Understanding SIEM6. Splunk Enterprise Security7. Security Intelligence8. Forensic Investigation in Security Domains9. Splunk Integration with Other Security Tools10. Splunk for Compliance and Regulatory Requirements11. Security Orchestration, Automation and Response (SOAR) with Splunk12. Cloud Security with Splunk13. DevOps and Security Operations14. Best Practices for Splunk in Cybersecurity15. Conclusion and Summary Index

  • af Philippa Mawking
    132,95 kr.

    One strategy to draw some attention to the website when launching an internet business at a low startup cost is through traffic. This is essentially a mechanism that makes sure each person's site is included in the viewing arrangement by having sites viewed during the exchange procedure. Learn everything you require right here.

  • af Jean-Christophe Gaillard
    357,95 kr.

    The author (JC Gaillard) has been involved with information security matters for over 20 years and started writing regularly on the topic in 2015.Talking to CISOs, CIO, CEOs and their teams as part of his day-to-day field work as consultant, he became gradually horrified by what he was seeing in too many large corporates in terms of security maturity levels and the actual problems some were still struggling with - something that goes way beyond anecdotal evidence and is at the heart of survey after survey every year.After all, information security good practices have been well established for over 20 years and many industry bodies have been promoting them and evolving them throughout that period.Why is it that large firms which have had fully functioning information security teams in place all that time, and have spent - collectively - hundreds of millions on the topic if not more on cyber security, are still struggling today with issues - such as patch management - which should have been on their radar for over 10 years?There is truly a cyber security lost decade for many between the CodeRed, Slammer and Blaster outbreaks of 2001-2003 and the Wannacry and Not Petya attacks of 2017.By failing to get the basics right in terms of security during that time while continuing to engage in massive cloud-driven business transformation programmes which have turned the enterprise into a truly borderless hybrid, many large firms have dramatically increased their level of exposure to cyber threats. And now the acceleration of the digital transformation emboldened by the COVID crisis - which has also heightened cyber threats - is making things even more complex. And politicians and regulators are now involved as the GDPR and CCPA have shown us over the past few years, now with privacy legislations building up across the U.S. and worldwide.At Board level, the "when-not-if" paradigm around cyber-attacks has taken root, but it creates fundamentally different dynamics for CISOs and CIOs, as the focus shifts radically from risk and compliance towards execution and delivery, often in exchange of massive investments around security.To embed those different dynamics around cyber security and make true progress, large organisations must stop thinking of the topic in pure technological terms, look back and address urgently the underlying cultural and governance issues that have been the true roadblocks of that "lost decade".This is the theme the author has been developing since 2015 through his contribution to the Corix Partners blog and we offer you in this book a selection of articles published between February 2015 and August 2021.They frame a true reflexion on those matters and offer elements of solution to start changing the narrative around cyber security.

  • af Gene Tsudik
    796,95 - 804,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.