
ilość książek w kategorii: 5021
![]() |
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK(TM) Framework and open source tools
ISBN: 9781838556372 / Angielski / Miękka / 2021 / 398 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Diving into Secure Access Service Edge: A technical leadership guide to achieving success with SASE at market speed
ISBN: 9781803242170 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. Implement Secure Access Service Edge (SASE) for secure network and application communications, exploring SASE services including SD-WAN, ZTF, and more with expert Jeremiah Ginn who helps CxO leaders achieve SASE success Key Features Merge networking and security services into a single architecture to simplify network infrastructure Explore how zero trust network access (ZTNA) restricts access to provide native application segmentation Focus on a native, multitenant cloud architecture that scales dynamically with demand Book DescriptionThe SASE concept was coined by Gartner after seeing a...
Implement Secure Access Service Edge (SASE) for secure network and application communications, exploring SASE services including SD-WAN, ZTF, and more...
|
cena:
191,00 |
![]() |
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats to your organization
ISBN: 9781804613672 / Angielski / Miękka / 2023 / 584 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threats Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features Protect your organization from cybersecurity threats with field-tested strategies Understand threats such as exploits, malware, internet-based threats, and governments Measure the effectiveness of your organization's current cybersecurity program against modern attackers' tactics Book DescriptionTim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web...
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threats Purchase of the pr...
|
cena:
191,00 |
![]() |
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs
ISBN: 9781801817332 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase of the print or Kindle book includes a free PDF eBook Key Features Master ZAP to protect your systems from different cyber attacks Learn cybersecurity best practices using this step-by-step guide packed with practical examples Implement advanced testing techniques, such as XXE attacks and Java deserialization, on web applications Book DescriptionMaintaining your cybersecurity posture in the ever-changing, fast-paced security landscape requires constant attention and advancements. This book...
Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase of the print or Kindle book includes a free PDF eBo...
|
cena:
191,00 |
![]() |
Windows APT Warfare: Identify and prevent Windows APT attacks effectively
ISBN: 9781804618110 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn Windows system design from the PE binary structure to modern and practical attack techniques used by red teams to implement advanced prevention Purchase of the print or Kindle book includes a free PDF eBook Key Features Understand how malware evades modern security products Learn to reverse engineer standard PE format program files Become familiar with modern attack techniques used by multiple red teams Book DescriptionAn Advanced Persistent Threat (APT) is a severe form of cyberattack that lies low in the system for a prolonged time and locates and then exploits sensitive...
Learn Windows system design from the PE binary structure to modern and practical attack techniques used by red teams to implement advanced prevention ...
|
cena:
191,00 |
![]() |
Executive\'s Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program
ISBN: 9781804619230 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits Key Features Get started as a cybersecurity executive and design an infallible security program Perform assessments and build a strong risk management framework Promote the importance of security within the organization through awareness and training sessions Book DescriptionRansomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your...
Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits Key Features Get ...
|
cena:
191,00 |
![]() |
Information Security Handbook - Second Edition: Enhance your proficiency in information security program development
ISBN: 9781837632701 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Pentesting Active Directory and Windows-based Infrastructure: A comprehensive practical guide to penetration testing Microsoft infrastructure
ISBN: 9781804611364 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
ISBN: 9781805126546 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals
ISBN: 9781800564411 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
ISBN: 9781837632152 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats
ISBN: 9781800564671 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation
ISBN: 9781800560802 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux
ISBN: 9781835088982 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Decentralized Identity Explained: Embrace decentralization for a more secure and empowering digital experience
ISBN: 9781804617632 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Unveiling NIST Cybersecurity Framework 2.0: Secure your organization with the practical applications of CSF
ISBN: 9781835463079 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization
ISBN: 9781805124962 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Pentesting APIs: A practical guide to discovering, fingerprinting, and exploiting APIs
ISBN: 9781837633166 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR
ISBN: 9781836203216 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |
![]() |
AWS Security Cookbook - Second Edition: Practical solutions for securing AWS cloud infrastructure with essential services and best practices
ISBN: 9781835081891 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,00 |