Catalog Search Results
Author
Description
The rapid expansion of IT and digital businesses has brought along a surge in online threats, amplifying cybersecurity risks and the need for effective solutions. Enter the OSINT framework, a pivotal ally, enabling organizations with a powerful toolset to proactively fortify security measures. The OSINT Handbook offers practical guidance and insights to enhance your OSINT capabilities. Starting with an introduction to the concept of OSINT, this book...
Author
Description
"Vital Years: A Guide to Healthy Aging Strategies" is a beacon of wisdom and practical insights for those seeking to navigate the journey of aging with grace, resilience, and vibrant health. In a world where the concept of aging is evolving, this comprehensive guide serves as a trusted companion, offering a roadmap to ensure your years are not just endured but embraced with vitality.This book takes a holistic approach, delving into the intricate tapestry...
Author
Description
The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and...
Author
Description
Ce petit livre examine les risques de certaines pratiques informatiques sur Internet et les réseaux sociaux. Nos informations confidentielles sont endommagées chaque fois que nous entrons dans le cyberespace, en particulier lorsqu'un utilisateur clique sur un lien. Certaines menaces dans les réseaux sont dues à des escroqueries, au harcèlement, à la saisie d'ordinateurs et à des chevaux de Troie, qui visent à blesser et à voler de l'argent...
Author
Description
Ace the CompTIA Security+ exam with over 700 practice exam questions written using the style and format of the Security+ exam
Security+ certification is the most popular entry-level certification for cybersecurity professionals. It has no work experience requirement, making it accessible to everyone willing to put in the time to prepare for the exam. Security+? Practice Tests are the perfect tools to prepare for the CompTIA Security+ exam.
The first...
Author
Description
Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools and tactics used to mitigate cyber threats
Key Features
Book Description
In today's world, the crime-prevention landscape is impossible to navigate. The dark web means new frontiers of combat against bad actors that pop up daily. Everyone from narcotics dealers to human traffickers are exploiting the...
Author
Description
Criando humanos en un mundo digital muestra cómo los niños digitales deben aprender a navegar por este entorno, desde el equilibrio de la vida real y virtual hasta convertirse en modelos positivos y líderes.
Sexting, cyberbullying, la venganza del porno, depredadores en línea... todas estas amenazas potenciales pueden tentar a los padres a arrebatar de las manos de sus hijos, el teléfono inteligente o la tableta. Si bien la privación puede...
Author
Description
You don't need to risk your security and privacy on consumer-grade security products any longer. Book DescriptionpfSense® is a powerful, commercial-grade firewall that provides capabilities far beyond what you can get in consumer products. This book will walk you through setting up your pfSense® firewall with many easy to follow recipes to choose from, depending on your needs. What you will learn* Blocking malware, phishing and malicious sites and...
Author
Description
A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilities
Key Features
Book Description
Securing an IT environment can be challenging, however, effective penetration testing and threat identification can make all the difference. This book will help you learn how to use the Metasploit Framework optimally for comprehensive penetration testing.
Complete...
Author
Description
Libro especializado que se ajusta al desarrollo de la cualificación profesional y adquisición del certificado de profesionalidad "INAF0108 - PANADERÍA Y BOLLERÍA". Manual imprescindible para la formación y la capacitación, que se basa en los principios de la cualificación y dinamización del conocimiento, como premisas para la mejora de la empleabilidad y eficacia para el desempeño del trabajo.
12) Django Building Dynamic Website With Django: A Complete Step by Step Guide to Learn to Build Modern
Author
Description
In an era yearning for transparency, accountability, and inclusive decision-making, DAOs powered by ICP technology emerge as a beacon of hope, revolutionizing governance, finance, and society. This groundbreaking book delves into the transformative power of ICP DAOs, empowering you to navigate the decentralized landscape and harness its boundless potential.Uncover the intricacies of ICP DAOs, from their technological foundation rooted in ICP blockchain...
Author
Description
In Killer Tech and the Drive to Save Humanity, Mark Stross presents a gripping exploration of our entanglement with technology in a world where digital platforms increasingly dictate our lives. With thought-provoking insights and real-life anecdotes, Mark unveils the hidden costs of our digital addiction and challenges readers to reconsider their relationship with technology.
The message is clear: "If you're not paying for the product, you are...
Author
Description
Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environment
Key Features
Book Description
Azure Sentinel is a Security Information and Event Management (SIEM) tool developed by Microsoft to integrate cloud security and artificial intelligence (AI). Azure Sentinel not only helps clients identify security issues in their environment, but also uses automation to help resolve...
Author
Description
Este ebook pretende ofrecer una comprensión en profundidad del mundo de la piratería informática y cómo superar posibles ataques. En este ebook, presentaremos la definición de hacker, los tipos de hackers, las motivaciones de los hackers, la historia de los hackers, las técnicas de hacking más comunes, así como las formas de mantener seguros sus sistemas y redes.
Didn't find it?
Can't find what you are looking for?
Search Hurst Public LibraryOr request an item not in the catalog. Submit Request