Udvidet returret til d. 31. januar 2025

Datasikkerhed

Her finder du spændende bøger om Datasikkerhed. Nedenfor er et flot udvalg af over 1.000 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Vinit Kumar Gunjan
    1.700,95 kr.

    This book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabilities that IoT platforms must have in order to address those cyber risks effectively. The chapters fuse together deep cyber security expertise with artificial intelligence (AI), machine learning, and advanced analytics tools, which allows readers to evaluate, emulate, outpace, and eliminate threats in real time. The book¿s chapters are written by experts of IoT and machine learning to help examine the computer-based crimes of the next decade. They highlight on automated processes for analyzing cyber frauds in the current systems and predict what is on the horizon. This book is applicable for researchers and professionals in cyber security, AI, and IoT.

  • af Aleksander Essex
    831,95 kr.

    ¿This book constitutes the revised selected papers from the workshops affiliated with the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which took place in Bol, Brä, Croatia, in May 2023. The 7 full papers presented in this book were carefully reviewed and selected from 18 submissions. They stem from the following workshops:CoDecFin 2022: 3rd Workshop on Coordination of Decentralized FinanceDeFi 2022: 2nd Workshop on Decentralized FinanceVoting 2022: 7th Workshop on Advances in Secure Electronic VotingWTSC 2022: 6th Workshop on Trusted Smart Contracts

  • af Hossam Nabil Elshenraki
    2.152,95 kr.

    As the metaverse rapidly evolves, a comprehensive examination of the emerging threats and challenges is imperative. In the groundbreaking exploration within Forecasting Cyber Crimes in the Age of the Metaverse , the intersection of technology, crime, and law enforcement is investigated, and it provides valuable insights into the potential risks and strategies for combating cybercrimes in the metaverse. Drawing upon research and scientific methodologies, this book employs a forward-thinking approach to anticipate the types of crimes that may arise in the metaverse. It addresses various aspects of cybercrime, including crimes against children, financial fraud, ransomware attacks, and attacks on critical infrastructure. The analysis extends to the protection of intellectual property rights and the criminal methods employed against metaverse assets. By forecasting the future of cybercrimes and cyber warfare in the metaverse, this book equips law enforcement agencies, policymakers, and companies with essential knowledge to develop effective strategies and countermeasures. It explores the potential impact of cybercrime on police capabilities and provides valuable insights into the planning and preparedness required to mitigate these threats.

  • af Charles Johnson Jr
    237,95 kr.

    Il libro aggiornato su Dark Web & Dark Net.Devi leggere questo libro se vuoi conoscere o intraprendere il viaggio nel dark web. In questo breve libro, imparerai le storie agghiaccianti del dark web e della dark net. Conoscerai i fondamenti, i fatti e le cifre sul surface web, il deep web e il dark web.Il libro fornisce anche un'ampia panoramica delle minacce digitali attuali ed emergenti e dei crimini informatici. Sarai aggiornato con informazioni cruciali su frodi e furti di identità effettuati quotidianamente sul dark web.In particolare, imparerai: Cos'è esattamente il dark web?L'origine del deep web e del dark web.Attività che si svolgono sul dark web.Come il dark web ti influenza.Come vengono venduti i dati personali sul dark web.I dati più spesso scambiati sul dark web.Traffico di organi umani e servizi di pornografia infantile nel dark web.Il mercato del dark web.La rete Tor e come funziona il browser Tor.La storia di Ross William Ulbricht, l'uomo dietro la Via della Seta.La verità sul surface web: perché alcuni siti non possono essere considerati attendibili con le tue informazioni.Le cose più importanti che imparerai: cosa puoi fare per proteggerti da attività dannose nel dark web.Come mantenere la tua identità Internet al sicuro su base giornaliera.

  • af Dmitry Vostokov
    629,95 kr.

    Solid C and C++ knowledge is a must to fully understand Windows diagnostic artifacts such as memory dumps and do diagnostic, forensic, and root cause analysis beyond listing stack traces, DLL, and driver information. This full-color reference book is a part of the Accelerated C & C++ for Windows Diagnostics training course organized by Software Diagnostics Services. The text contains slides, brief notes highlighting particular points, and replicated source code fragments that are easy to copy into your favorite IDE. The book's detailed Table of Contents makes the usual Index redundant. We hope this reference is helpful for the following audiences: C and C++ developers who want to deepen their knowledgeSoftware engineers developing and maintaining products on Windows platformsTechnical support, escalation, DevSecOps, cloud and site reliability engineers dealing with complex software issuesQuality assurance engineers who test software on Windows platformsSecurity and vulnerability researchers, reverse engineers, malware and memory forensics analysts

  • af Dmitry Vostokov
    812,95 kr.

    A pattern language to cover from a small debugging trace to a distributed log with billions of messages from hundreds of computers, thousands of components, threads, and processes.

  • af Steve Suehring
    487,95 kr.

    "How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do organizations increase security within their DevOps processes? This practical guide helps you answer those questions and more. Author Steve Suehring provides unique content to help practitioners and leadership successfully implement DevOps and DevSecOps. Learning DevSecOps emphasizes prerequisites that lead to success through best practices and then takes you through some of the tools and software used by successful DevSecOps-enabled organizations. You'll learn how DevOps and DevSecOps can eliminate the walls that stand between development, operations, and security so that you can tackle the needs of other teams early in the development lifecycle. This book helps you: Learn why DevSecOps is about culture and processes, with tools to support the processes; Understand why DevSecOps practices are key elements to deploying software in a 24-7 environment; Deploy software using a DevSecOps toolchain and create scripts to assist; Integrate processes from other teams earlier in the software development lifecycle; Help team members learn the processes important for successful software development"--

  • af Christian Cachin
    772,95 - 1.205,95 kr.

  • af Bart Mennink
    935,95 kr.

    This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.

  • af Sujeet Shenoi
    1.681,95 - 1.690,95 kr.

  • af Yaochu Jin
    1.313,95 - 1.770,95 kr.

    This book introduces readers to the fundamentals of and recent advances in federated learning, focusing on reducing communication costs, improving computational efficiency, and enhancing the security level. Federated learning is a distributed machine learning paradigm which enables model training on a large body of decentralized data. Its goal is to make full use of data across organizations or devices while meeting regulatory, privacy, and security requirements. The book starts with a self-contained introduction to artificial neural networks, deep learning models, supervised learning algorithms, evolutionary algorithms, and evolutionary learning. Concise information is then presented on multi-party secure computation, differential privacy, and homomorphic encryption, followed by a detailed description of federated learning. In turn, the book addresses the latest advances in federate learning research, especially from the perspectives of communication efficiency, evolutionary learning, and privacy preservation.The book is particularly well suited for graduate students, academic researchers, and industrial practitioners in the field of machine learning and artificial intelligence. It can also be used as a self-learning resource for readers with a science or engineering background, or as a reference text for graduate courses.       

  • af Susan Thomas
    1.189,95 - 1.199,95 kr.

    This book is about the establishment of the Insolvency and Bankruptcy Code, in 2016, one of the most important new developments in Indian commercial law. The law has major implications for firms, their creditors, and a variety of the professional services that feed into the decisions of borrowers and lenders including lawyers, accountants and valuers. A new profession of insolvency professionals has come to exist owing to the law. There are several questions about bankruptcy reform in the mind of researchers, policy makers and practitioners. How has the reform progressed? How has it reshaped the incentives of firms? What are the difficulties faced? What are the optimal paths for borrowers and lenders and their advisors under the rubric of the law? How should laws and institutions be modified? The book has a unique set of chapters, by key people who have shaped the field which offer novel insights into these questions.The book has been edited by key people who have worked on bankruptcy reform since 2010. Dr. Sahoo has been the chairperson of the Insolvency and Bankruptcy Board of India since the establishment of this regulatory agency. Dr. Thomas was a member of the Bankruptcy Law Reforms Committee which drafted the IBC, and led the internal team of the BLRC which drafted the law. The book is an authentic and credible analysis of the happenings in the Indian insolvency and bankruptcy ecosystem from the start, with interest areas for international and domestic, economics/finance and law, researcher and practitioner communities.

  • af Farid Haque
    167,95 kr.

    We live in a world that is filled with misinformation and disinformation. In our precarious digital environment, the need for awareness about this risk is greater than ever.In Bug Byes, investigator Ava Williams uses her wits and journalism skills to uncover a disinformation campaign set to damage critical American communications infrastructure. With help from a few allies along the way, Ava races to expose the web of lies being spun online.Created by the CISA (the U.S. Cybersecurity and Infrastructure Security Agency), Bug Bytes is the second graphic novel in the Resilience Series, which was created to illustrate the threat that inaccurate information (fake news) can have on important events that shape the future of our democracy. Yes, the threat is real, and very dangerous. Everyone needs to understand how it works and how to recognize the truth. This exciting and entertaining little book can help.

  • af Joe Grant
    197,95 kr.

    ¿Sabes si te han hackeado? ¿Sabe si alguna información personal fue robada de su sistema o cuenta? ¿Siempre has querido aprender a proteger tu sistema de este tipo de ataques? Si respondiste que sí a todas estas preguntas, has venido al lugar correcto.A diferencia de la piratería maliciosa, la piratería ética es una forma legal de probar las vulnerabilidades de un sistema. Muchas organizaciones todavía desconfían de los hackers éticos, y tienen todo el derecho a serlo ya que algunos hackers mienten para su propio beneficio. Dicho esto, muchas organizaciones ahora están buscando hackers éticos porque quieren identificar una manera de protegerse a sí mismos y a sus clientes y empleados.En el transcurso del libro, usted aprenderá más acerca de lo que es la piratería ética y comenzará a comprender los diferentes tipos de ataques que un hacker ético puede realizar en un sistema.Este libro hablará sobre:¿ Qué es el hackeo ético y cómo es diferente del hackeo maliciosä Por qué es importante hackear un sistemä Cuáles son las diferentes fases del hackeo éticö Los pasos que un hacker ético debe tomar para protegerse¿ Las diferentes habilidades que un hacker ético debe tener¿ Las diferentes herramientas que un hacker puede utilizar para probar un sistemä Diferentes tipos de ataques que se pueden realizar en un sistemä Cómo el hacker debe proteger un sistema de este tipo de ataquesEste libro proporciona numerosos ejemplos de diferentes ataques y también incluye algunos ejercicios que puedes seguir cuando realizas estos ataques por primera vez. Es importante recordar que el hackeo ético se está convirtiendo en una de las profesiones más buscadas porque cada organización está buscando una manera de proteger sus datos.Entonces, ¿qué estás esperando - toma una copia del libro ahora!

  • af Ahmed F Sheikh
    313,95 kr.

    The CompTIA Linux+ Certification" book - the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+ Certification. Whether you're a beginner or an experienced professional, this comprehensive resource is designed to equip you with the knowledge and skills needed to excel in the world of Linux.With its comprehensive coverage, this book delves into essential Linux concepts, commands, and techniques, providing you with a complete reference guide. You'll review how to customize and navigate the shell environment, write powerful scripts, configure user interfaces, perform administrative tasks, configure system services, establish network connections, and secure your system. No stone is left unturned in this in-depth exploration of Linux administration.What sets this book apart is its practical approach. Real-world scenarios and practical applications take center stage, ensuring that you not only understand the theory but also know how to apply it effectively.Troubleshooting common issues becomes second nature as you gain the skills to diagnose and resolve system problems with ease. You'll discover industry best practices and standards, enabling you to optimize systems, implement robust security measures, and adhere to compliance regulations.You Will Learn:¿    Linux operating systems, including installation, configuration, and management of Linux-based servers and systems. ¿    Essential administrative tasks, such as user and group management, file system administration, network configuration, and security implementation.¿    Insights into troubleshooting common Linux issues, enabling readers to diagnose and resolve system problems effectively.¿    Practical techniques for identifying and addressing system errors, performance bottlenecks, network connectivity issues, and other challenges that may arise in a Linux environment.¿    Industry best practices and standards in Linux administration.¿    System optimization, backup and recovery strategies, security practices, and adherence to compliance regulations.

  • af Rob Botwright
    432,95 kr.

    ¿¿¿¿ Explore the Ultimate Bug Hunting & Cybersecurity Journey! ¿¿¿¿¿Introducing the "Bug Hunting 101: Novice to Virtuoso" book bundle, accompanied by "Web Application Security for Ethical Hackers." Dive into a world where cybersecurity meets ethical hacking, and become a true virtuoso in the art of cyber defense.¿¿¿¿ Book 1 - Bug Hunting: A Novice's Guide to Software Vulnerabilities ¿¿¿¿ Are you new to bug hunting and cybersecurity? This book is your stepping stone. Learn the fundamentals of software vulnerabilities, ethical hacking, and essential skills to embark on your bug hunting journey. Real-world examples will guide you in building a strong foundation.¿¿¿¿ Book 2 - Intermediate Bug Hunting Techniques: From Novice to Skilled Hunter ¿¿¿¿¿¿¿¿ Ready to level up? This intermediate guide takes you deeper into the world of bug hunting. Explore advanced techniques in vulnerability discovery, scanning, and enumeration. Gain confidence as you tackle complex security challenges with practical insights.¿¿¿¿ Book 3 - Advanced Bug Bounty Hunting: Mastering the Art of Cybersecurity ¿¿¿¿ Elevate your skills with advanced bug bounty hunting strategies. Discover cryptographic flaws, master network intrusion, and explore advanced exploitation techniques. This book guides you in strategically engaging with bug bounty programs, taking your expertise to new heights.¿¿¿¿ Book 4 - Virtuoso Bug Hunter's Handbook: Secrets of the Elite Ethical Hackers ¿¿¿¿ Uncover the secrets of elite ethical hackers. Dive into the mindset, techniques, and advanced artifacts used by the virtuosos. Maximize your participation in bug bounty programs, and navigate legal and ethical considerations at the elite level of bug hunting.¿¿¿¿ Secure Your Cyber Future Today! ¿¿¿¿ This book bundle equips you with the knowledge, skills, and ethical responsibility required to safeguard the digital world. As the digital landscape continues to evolve, ethical hackers and bug hunters like you play a pivotal role in ensuring its security.Whether you're a beginner or an experienced professional, this bundle caters to all levels. Join us on this transformative journey from novice to virtuoso, and become a guardian of the digital realm.¿¿¿¿ Don't miss this opportunity to own the complete "Bug Hunting 101: Novice to Virtuoso" book bundle with "Web Application Security for Ethical Hackers." Get your copy now and empower yourself in the exciting world of cybersecurity! ¿¿¿¿

  • af Hoeteck Wee
    827,95 - 930,95 kr.

  • af Shane Molinari
    487,95 kr.

    Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international compliance standards to stay ahead of the ever-evolving cyber threat landscapeKey FeaturesGet introduced to three primary AI tactics used in malware and detectionLeverage data science tools to combat critical cyber threatsUnderstand regulatory requirements for using AI in cyber threat managementPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis. This insightful guide will teach you how to apply the principles of data science to online security, acting as both an educational resource and a practical manual for everyday use.Malware Science starts by explaining the nuances of malware, from its lifecycle to its technological aspects before introducing you to the capabilities of data science in malware detection by leveraging machine learning, statistical analytics, and social network analysis. As you progress through the chapters, you'll explore the analytical methods of reverse engineering, machine language, dynamic scrutiny, and behavioral assessments of malicious software. You'll also develop an understanding of the evolving cybersecurity compliance landscape with regulations such as GDPR and CCPA, and gain insights into the global efforts in curbing cyber threats.By the end of this book, you'll have a firm grasp on the modern malware lifecycle and how you can employ data science within cybersecurity to ward off new and evolving threats.What you will learnUnderstand the science behind malware data and its management lifecycleExplore anomaly detection with signature and heuristics-based methodsAnalyze data to uncover relationships between data points and create a network graphDiscover methods for reverse engineering and analyzing malwareUse ML, advanced analytics, and data mining in malware data analysis and detectionExplore practical insights and the future state of AI's use for malware data scienceUnderstand how NLP AI employs algorithms to analyze text for malware detectionWho this book is forThis book is for cybersecurity experts keen on adopting data-driven defense methods. Data scientists will learn how to apply their skill set to address critical security issues, and compliance officers navigating global regulations like GDPR and CCPA will gain indispensable insights. Academic researchers exploring the intersection of data science and cybersecurity, IT decision-makers overseeing organizational strategy, and tech enthusiasts eager to understand modern cybersecurity will also find plenty of useful information in this guide. A basic understanding of cybersecurity and information technology is a prerequisite.Table of ContentsMalware Data Science Life Cycle OverviewAn Overview of the International History of Cyber Malware ImpactsTopological Data Analysis for Malware Detection and AnalysisArtificial Intelligence for Malware Data Analysis and DetectionBehavior-Based Malware Data Analysis and DetectionThe Future State of Malware Data Analysis and DetectionThe Future State of Key International Compliance RequirementsEpilogue - A Harmonious Overture to the Future of Malware Data Science and Cybersecurity

  • af Vandana Verma Sehgal
    387,95 kr.

    Get to grips with application security, secure coding, and DevSecOps practices to implement in your development pipelineKey FeaturesUnderstand security posture management to maintain a resilient operational environmentMaster DevOps security and blend it with software engineering to create robust security protocolsAdopt the left-shift approach to integrate early-stage security in DevSecOpsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDevSecOps is built on the idea that everyone is responsible for security, with the goal of safely distributing security decisions at speed and scale to those who hold the highest level of context. This practice of integrating security into every stage of the development process helps improve both the security and overall quality of the software. This book will help you get to grips with DevSecOps and show you how to implement it, starting with a brief introduction to DevOps, DevSecOps, and their underlying principles.After understanding the principles, you'll dig deeper into different topics concerning application security and secure coding before learning about the secure development lifecycle and how to perform threat modeling properly. You'll also explore a range of tools available for these tasks, as well as best practices for developing secure code and embedding security and policy into your application. Finally, you'll look at automation and infrastructure security with a focus on continuous security testing, infrastructure as code (IaC), protecting DevOps tools, and learning about the software supply chain.By the end of this book, you'll know how to apply application security, safe coding, and DevSecOps practices in your development pipeline to create robust security protocols.What you will learnFind out how DevSecOps unifies security and DevOps, bridging a significant cybersecurity gapDiscover how CI/CD pipelines can incorporate security checks for automatic vulnerability detectionUnderstand why threat modeling is indispensable for early vulnerability identification and actionExplore chaos engineering tests to monitor how systems perform in chaotic security scenariosFind out how SAST pre-checks code and how DAST finds live-app vulnerabilities during runtimePerform real-time monitoring via observability and its criticality for security managementWho this book is forThis book is for DevSecOps engineers and application security engineers. Developers, pentesters, and information security analysts will also find plenty of useful information in this book. Prior knowledge of the software development process and programming logic is beneficial, but not required.Table of ContentsIntroducing DevSecOpsDevSecOps PrinciplesUnderstanding the Security PostureUnderstanding ObservabilityUnderstanding Chaos EngineeringContinuous Integration and Continuous DeploymentThreat ModelingSoftware Composition Analysis (SCA)Static Application Security Testing (SAST)Infrastructure-as-Code (IaC) ScanningDynamic Application Security Testing (DAST)Setting Up a DevSecOps Program with Open Source ToolsLicenses Compliance, Code Coverage, and Baseline PoliciesSetting Up a Security Champions ProgramCase StudiesConclusion

  • af It Governance Publishing
    277,95 kr.

    Understand how information security standards can improve your organisation's security and set it apart from competitors with this introduction to ISO 27001 and ISO 27002.

  • af Jörg Schwenk
    531,95 - 715,95 kr.

    Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.Topics and features:* Covers the essential standards in Internet cryptography* Integrates work exercises and problems in each chapter* Focuses especially on IPsec, secure e-mail and TLS* Summarizes real-world cryptography in three introductory chapters* Includes necessary background from computer networks* Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes* Provides additional background on web security in two concluding chaptersOffering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.Professor Dr. Jorg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book's topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.

  • af Uwe Wolff
    670,95 kr.

    Spätestens seit den massiven Desinformationsangriffen auf westliche Impfstoffhersteller während der Coronapandemie ist klar: Gezielt gestreute ¿Fake News¿ haben sich vom politischen in den wirtschaftlichen Raum ausgebreitet und Unternehmen werden sich zunehmend bewusst, dass auch sie zur Zielscheibe werden können. Die Folgen eines Desinformationsangriffs können gravierend sein: Wertverluste, Reputationsschäden sowie verunsicherte Mitarbeitende, Geschäftspartner und Investoren. Die modernen Kommunikationskrieger verfügen im Internet und in den sozialen Medien über ein mächtiges, breit gefächertes und relativ kostengünstiges Arsenal, mit dem sich Desinformationen in minutenschnelle effektiv verbreiten lassen, sodass Unternehmen kaum Zeit bleibt, sich wirksam dagegen zu wehren. Uwe Wolff beleuchtet die neue Situation, in der sich Unternehmen befinden, gibt Auskunft zur Abwehr von Desinformationsangriffen und zu deren zukünftiger Entwicklung. Dazu interviewte er unter anderem Medienanwälte und Kriminologen, Unternehmens- und IT-Berater, einen Darknet-Spezialisten, sowie einen Medien-Prankster und den ehemaligen Vorsitzenden der deutschen Wikimedia.

  • af Rob Botwright
    432,95 kr.

    Introducing the "Metasploit Masterclass for Ethical Hackers" Book Bundle - Your Path to Becoming a Cybersecurity Expert!¿¿¿¿ Are you fascinated by the world of ethical hacking and cybersecurity? ¿¿¿¿ Do you want to master the art of securing networks, web applications, wireless devices, and IoT technology? ¿¿¿¿ Are you ready to embark on a journey that will turn you into a cybersecurity pro?Look no further! This exclusive book bundle brings together four comprehensive volumes designed to make you a cybersecurity expert. Say hello to the "Metasploit Masterclass for Ethical Hackers" - your ultimate guide to becoming a highly skilled ethical hacker and a defender of the digital world.¿¿¿¿ Book 1: Network Reconnaissance and Vulnerability Scanning Learn the fundamentals of ethical hacking, network reconnaissance, and vulnerability scanning. Gather critical information about target networks, identify potential vulnerabilities, and become a pro at scanning for weaknesses.¿¿¿¿ Book 2: Web Application Penetration Testing Dive deep into the realm of web application security. Discover how to assess, exploit, and secure vulnerabilities in web applications. Your expertise in web application security will be in high demand.¿¿¿¿ Book 3: Wireless and IoT Hacking With the rise of wireless networks and IoT devices, new threats emerge. Uncover the secrets of wireless and IoT hacking - from exploiting vulnerabilities to securing these technologies effectively.¿¿¿¿ Book 4: Advanced Threat Detection and Defense Stay on the cutting edge of cybersecurity. Explore advanced threat detection methods, proactive threat hunting, and the use of Metasploit for defensive purposes. Protect against even the most sophisticated cyber threats.This book bundle is your gateway to a world of cybersecurity excellence. Whether you're starting your cybersecurity journey or seeking to enhance your skills, these books offer a holistic and hands-on approach to mastering the art and science of ethical hacking.¿¿¿¿ Why Choose the "Metasploit Masterclass for Ethical Hackers" Bundle?· Expert Guidance: Learn from experienced cybersecurity professionals.· Hands-On Learning: Gain practical skills through real-world examples and exercises.· Comprehensive Coverage: Master various aspects of ethical hacking and cybersecurity.· Career Advancement: Boost your career prospects in the high-demand field of cybersecurity.Secure your digital future and become a guardian of cyberspace with the "Metasploit Masterclass for Ethical Hackers" book bundle. Get started on your path to becoming a cybersecurity expert today!Don't miss this opportunity to invest in your cybersecurity knowledge. Click the link to grab your bundle and start your journey towards becoming a cybersecurity pro! ¿¿¿¿¿¿¿¿

  • af Kevin Daimi
    1.110,95 - 1.601,95 kr.

    This book provides an essential compilation of relevant and cutting edge academic and industry work on key Blockchain topics. This book concentrates on a wide range of advances related to Blockchains which include, among others, Blockchain principles, architecture and concepts with emphasis on key and innovative theories, methodologies, schemes and technologies of Blockchain, Blockchain platforms and architecture, Blockchain protocols, sensors and devices for Blockchain, Blockchain foundations, and reliability analysis of Blockchain-based systems.  Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity application experts in the listed fields and edited by prominent cybersecurity applications researchers and specialists.

  • af Bob Chaput
    322,95 kr.

    "This book should be mandatory reading for C-suite executives and board members. It shows you how to move from viewing cybersecurity as a risk to avoid, and a cost center that does not add value and is overhead, to seeing cybersecurity as an enabler and part of your core strategy to transform your business and earn customer and stakeholder trust."-Paul Connelly, First CISO at the White House and HCA HealthcareThis book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it's time to leverage your ECRM program and cybersecurity strategy in the same way.The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator,including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board's three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities.ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author Bob Chaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate,and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking.Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.

  • af Kim Crawley
    542,95 kr.

    Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectivelyKey Features:Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platformUnderstand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes)Get acquainted with the penetration testing tools and security measures specific to each platformPurchase of the print or Kindle book includes a free PDF eBookBook Description:With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively.In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.What You Will Learn:Familiarize yourself with the evolution of cloud networksNavigate and secure complex environments that use more than one cloud serviceConduct vulnerability assessments to identify weak points in cloud configurationsSecure your cloud infrastructure by learning about common cyber attack techniquesExplore various strategies to successfully counter complex cloud attacksDelve into the most common AWS, Azure, and GCP services and their applications for businessesUnderstand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentestingWho this book is for:This book is for pentesters, aspiring pentesters, and red team members seeking specialized skills for leading cloud platforms-AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.

  • af Alexander Herold
    637,95 kr.

    Die 2. Auflage des Erfolgswerks der Koloproktologie - zusätzlich Open Access für jeden kostenfrei! Das Standardwerk der Deutschen Gesellschaft für Koloproktologie für jeden konservativ und/oder operativ tätigen Koloproktologen bietet das komplette Spektrum von der Ileozökalklappe bis zum Anus in 2 Bänden. In Band 2 finden Sie aktuelles und praxisorientiertes Wissen zu Rektumprolaps, Divertikelerkrankung, Chronische Obstipation, Reizdarmsyndrom, Colitis ulcerosa, Morbus Crohn, Kolon-Karzinom, Analkarzinom, Rektumkarzinom, Hereditäre Kolorektale Karzinome, Seltene intestinale Tumoren, Peritonealkarzinose, Polypenmanagement, Stoma, perioperatives und postoperatives Management, Appendizitis, Mesenteriale Ischämie, Kurzdarmsyndrom und abdominelle Fisteln. Alle sonstigen Erkrankungen der Koloproktologie finden Sie in Band 1. Jedes Kapitel stellt einen umfassenden Überblick über die Ätiologie, Pathogenese, Klassifikation, Symptomatik, Diagnostik, konservative und operative Therapie sowie die Prophylaxe der einzelnen Erkrankungen dar. Abgerundet wird jedes Kapitel von einer Darstellung von Komplikationen, Besonderheiten und der aktuellen Evidenz.

  • af Rob Botwright
    432,95 kr.

    ¿¿¿¿ ZERO DAY: Novice No More - Unlock the Secrets of CybersecurityAre you ready to embark on a transformative journey into the world of cybersecurity? Look no further than the "ZERO DAY: Novice No More" book bundle, your comprehensive guide to exposing software vulnerabilities and eliminating bugs. This bundle is your ticket to mastering the art of safeguarding digital systems, whether you're a beginner or a seasoned IT professional.¿¿¿¿ What's Inside the Bundle:¿¿¿¿ Book 1 - ZERO DAY DEMYSTIFIED: Start your cybersecurity journey with a solid foundation. This beginner's guide breaks down complex concepts into easily digestible pieces, making it accessible to all. Learn how to identify, understand, and address software vulnerabilities confidently.¿¿¿¿ Book 2 - ZERO DAY EXPOSED: Transition from novice to intermediate with this book, where you'll explore advanced techniques for identifying and patching software bugs. Bridge the gap between basic understanding and comprehensive expertise.¿¿¿¿ Book 3 - MASTERING ZERO DAY: Are you ready to become an advanced practitioner? This book unveils cutting-edge strategies and methodologies used by cybersecurity experts. Tackle even the most challenging vulnerabilities with confidence and precision.¿¿¿¿ Book 4 - ZERO DAY UNLEASHED: Dive into the world of expert-level tactics for exploiting and protecting against software vulnerabilities. Learn both offensive and defensive tactics used by professionals to safeguard digital systems.¿¿¿¿ Why Choose the ZERO DAY Bundle?· Comprehensive Learning: This bundle covers the entire spectrum of cybersecurity, from beginners to experts. Whether you're new to the field or seeking advanced knowledge, there's something for everyone.· Expert Insights: Benefit from the wisdom of cybersecurity professionals who share their real-world experiences and knowledge gained through years of practice.· Practical Skills: Gain hands-on skills and techniques that you can apply immediately in real-world scenarios, making you an invaluable asset to any organization.· Secure Your Future: With the increasing prevalence of cyber threats, cybersecurity skills are in high demand. Invest in your future by acquiring the expertise to protect digital systems effectively.¿¿¿¿ Your Path to Cybersecurity Excellence Starts Here:Take the first step toward becoming a cybersecurity expert or enhancing your existing skills. The "ZERO DAY: Novice No More" book bundle is your roadmap to success in the dynamic and crucial field of cybersecurity. Don't miss this opportunity to gain the knowledge and skills needed to secure digital systems and protect against vulnerabilities.¿¿¿¿¿ Protect. Secure. Thrive. Start Your Journey Today!Click the link below to purchase the "ZERO DAY: Novice No More" bundle and embark on a cybersecurity adventure that will transform you from novice to expert. Your digital world awaits, and it's time to become its guardian.

  • af Rob Botwright
    432,95 kr.

    Introducing "Red Team Operations: Attack" Book Bundle!¿¿¿¿ Are you fascinated by the world of cybersecurity? ¿¿¿¿ Do you want to learn the art of ethical hacking and penetration testing? ¿¿¿¿ Are you curious about the tactics used by cyber adversaries?Look no further! Our exclusive "Red Team Operations: Attack" book bundle is your ultimate guide to mastering the intricate world of cybersecurity, ethical hacking, social engineering, and web application security. With four meticulously crafted volumes, this collection is designed to equip you with the skills needed to excel in today's ever-evolving digital battlefield.¿¿¿¿ Book 1 - Red Team Essentials: A Beginner's Guide to Attack Strategies This volume lays the foundation for understanding red teaming and ethical hacking. Perfect for beginners, it explores the essentials of planning, reconnaissance, and attack methodologies. Learn the mindset required to emulate adversaries effectively and discover techniques to assess and fortify security defenses.¿¿¿¿ Book 2 - Unlocking the Black Box: Advanced Techniques in Ethical Hacking Building on your foundational knowledge, this book delves into advanced penetration testing and vulnerability assessment techniques. Equip yourself with the skills needed to uncover hidden weaknesses within systems and applications.¿¿¿¿ Book 3 - Mastering the Art of Social Engineering: Tactics for Red Team Professionals Understanding the human element of security is crucial. This volume dives deep into the psychology of social engineering, teaching you the art of manipulating individuals to gain unauthorized access. Discover the tactics used by red team professionals to raise awareness and protect against social engineering attacks.¿¿¿¿ Book 4 - Web App Scanning Mastery: Expert Techniques for Red Team Specialists In the digital age, securing web applications is paramount. This book provides in-depth knowledge of scanning, vulnerability assessment, API authentication, and techniques to evade Web Application Firewall (WAF) detection. Become an expert in securing web applications.Why choose our "Red Team Operations: Attack" bundle?¿ Comprehensive: Covers all aspects of red teaming, ethical hacking, social engineering, and web application security. ¿ Beginner to Advanced: Suitable for newcomers and seasoned professionals looking to expand their skill set. ¿ Practical: Each volume is packed with real-world examples and hands-on exercises. ¿ Expert Authors: Authored by cybersecurity experts with years of practical experience. ¿ Stay Ahead: Keep up with the latest cybersecurity trends and threats. ¿ Protect and Defend: Learn how to safeguard sensitive information and critical infrastructure. ¿ Unlock Career Opportunities: Gain the knowledge needed to excel in the field of cybersecurity.Don't miss this opportunity to embark on a journey into the exciting and essential world of cybersecurity. Equip yourself with the skills and knowledge needed to protect against evolving threats and make a difference in the digital realm.Get your "Red Team Operations: Attack" book bundle today and join the ranks of cybersecurity professionals who are making a positive impact in the fight against cybercrime.Secure your bundle now and take the first step toward becoming a cybersecurity expert! ¿¿¿¿¿¿¿¿¿¿¿¿

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.