Catalog Search Results
Author
Description
Securing the Future of IoT with Advanced Edge Computing Solutions
Book Description
Embark on a journey into the cutting-edge world of secure edge computing. In this meticulously crafted handbook, delve deep into the intricacies of this transformative technology that is reshaping the landscape of computing.
From its fundamental principles to advanced applications, this book leaves no stone unturned in demystifying the complexities of secure...
Author
Description
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that."Instant Citrix Security How-to" will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be...
Author
Description
Step into the vital world of cybersecurity with "Cybersecurity for Beginners." This comprehensive guide provides everything you need to safeguard your digital life, from understanding basic concepts to implementing robust security measures. Designed for individuals with little to no prior knowledge, this book breaks down complex topics into easy-to-understand steps, empowering you to protect your personal and professional data from cyber threats.
With...
Author
Description
Welcome to "Navigating the Dark Waters of Cybersecurity Incident Response," a comprehensive guide that will help you prepare for and respond to cyber attacks. Written by a team of experienced cybersecurity experts, this book provides practical advice, real-world examples, and actionable insights that will help you navigate the complex and often murky world of cybersecurity incident response.
"Navigating the Dark Waters" offers a step-by-step approach...
Author
Description
Securing the Future of IoT with Advanced Edge Computing Solutions
Key Features
● Tailored security protocols for edge computing, ensuring comprehensive protection against cyber threats.
● Master strategies for deploying, monitoring, and securing edge devices to maintain a resilient IoT ecosystem.
● Gain valuable insights from real-world examples, guiding you through the implementation of secure edge computing solutions across diverse...
Author
Description
Master one of the most essential tools a professional pen tester needs to know.
Book Description
This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension,...
Author
Description
Master one of the most essential tools a professional pen tester needs to know.
Book Description
This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension,...
Author
Description
Your one-stop guide to learning and implementing Red Team tactics effectively
Key Features:
- Target a complex enterprise environment in a Red Team activity
- Detect threats and respond to them with a real-world cyber-attack simulation
- Explore advanced penetration testing tools and techniques
Book Description:
Red Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities....
Author
Description
Password security is a critical matter when it comes to protecting the interests of application users and their data for a satisfactory user experience. With the advancement in technology, now more than ever, application developers need to be able to implement reliable mechanisms to prevent passwords from being stolen. Java Password and Authentication Security provides a practical approach to implement these reliable mechanisms with the possibility...
Author
Description
Become a Cisco security specialist by developing your skills in network security and explore advanced security technologies
Key Features Enhance your skills in network security by learning about Cisco's device configuration and installation Unlock the practical aspects of CCNA security to secure your devices. Explore tips and tricks to help you achieve the CCNA Security 210-260 Certification Book Description
With CCNA Security certification, a network...
Author
Description
Master Python scripting to build a network and perform security operations
Key Features
Learn to handle cyber attacks with modern Python scripting
Discover various Python libraries for building and securing your network
Understand Python packages and libraries to secure your network infrastructure
Book Description
It's becoming more and more apparent that security is a critical aspect of IT infrastructure. A data breach is a major security incident,...
Author
Description
Python is an easy-to-learn and cross-platform programming language that has unlimited third-party libraries. Plenty of open source hacking tools are written in Python, which can be easily integrated within your script. This book is packed with step-by-step instructions and working examples to make you a skilled penetration tester. It is divided into clear bite-sized chunks, so you can learn at your own pace and focus on the areas of most interest...
Author
Description
Develop blockchain application with step-by-step instructions, working example and helpful recommendations
Key Features
Understanding the blockchain technology from the cybersecurity perspective
Developing cyber security solutions with Ethereum blockchain technology
Understanding real-world deployment of blockchain based applications
Book Description
Blockchain technology is being welcomed as one of the most revolutionary and impactful innovations...
Author
Description
Leverage the simplicity of Python and available libraries to build web security testing tools for your application
Key Features
Book Description
Web penetration testing is the use of tools and code to attack a website or web app in order to assess its vulnerability to external threats. While there are an increasing number of sophisticated, ready-made tools to scan systems for vulnerabilities, the use of Python allows you to write system-specific scripts,...
Author
Description
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.
This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples.
We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring...
Author
Description
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State...
17) Piraté
Author
Description
Le livre de piratage est destiné à servir de guide de niveau intermédiaire à certains outils et compétences de test de pénétration courants, en particulier ceux du piratage sans fil et du maintien de l'anonymat. Le livre se concentre davantage sur l'exécution pratique et fournit des procédures étape par étape pour l'installation des plates-formes et des outils essentiels, ainsi que la théorie derrière certaines attaques de base. Acquérez...
18) Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Compu
Author
Description
Keeping this high-demand information from yourself will be detrimental to your technologically-clueless future self... Do computers and technology, in general, feel alien-like to you, as if it's something way past your time? The advancements made in technology have taken over how our society functions, and so there's no other way to deal with your shortcomings than to handle it head-on. According to TechCo, technology has influenced nearly every aspect...
Author
Description
Start your journey to digital safety with "Cybersecurity for Beginners." This essential guide is perfect for anyone looking to understand the basics of cybersecurity and how to protect themselves from online threats. Written in a clear and accessible style, this book provides practical advice and step-by-step instructions to help you secure your digital life, whether you're a tech novice or simply looking to boost your cyber defenses.
In "Cybersecurity...
Author
Description
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.
Book Description
Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive...
Didn't find it?
Can't find what you are looking for?
Search Hurst Public LibraryOr request an item not in the catalog. Submit Request