Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
Packt Publishing - ebooki
-
Nowość
This book helps you understand how to safeguard your AWS workloads, while equipping you with the knowledge you need to gain AWS (SCS-C02) certification.- PDF + ePub pkt
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
Nowość
This practical guide to implementing DeFi in your projects guides you through building full-stack DeFi solutions with popular tools and teaches you how to leverage blockchain technologies to manage crypto assets.- PDF + ePub pkt
Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain
-
Nowość
Catapult your cybersecurity expertise to new heights using expert-backed recipes. With this cookbook, you’ll leverage the power of large language model generative AI like ChatGPT to gain a competitive edge in the ever-changing cybersecurity domain.- PDF + ePub pkt
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Nowość
This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments.- PDF + ePub pkt
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
Nowość
The OSINT Handbook book helps you understand the significance of open-source intelligence and master advanced techniques and tools, equipping you with the skills you need to navigate the digital landscape effectively.- PDF + ePub pkt
The OSINT Handbook. A practical guide to gathering and analyzing online information The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Manage physical and Cloud based endpoints, boost security, and simplify app control with ease. Stay up to date with the latest features and cloud services, empowering you to excel in device management. Master Intune, master your endpoints.
- PDF + ePub pkt
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
Christiaan Brinkhoff, Per Larsen, Steve Dispensa, Scott Manchester
-
Whether you're a beginner or a seasoned security professional, this practical guide will equip you with the knowledge and skills to build a robust, proactive, and resilient security posture for your organization with Microsoft's XDR and SIEM.
- PDF + ePub pkt
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.
- PDF + ePub pkt
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics.
- PDF + ePub pkt
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Embark on an API security journey, from understanding API inner workings to exploiting vulnerabilities. This book will teach you how to attack APIs, defend by building robust APIs using secure development techniques, and ensure runtime protection.
- PDF + ePub pkt
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
The comprehensive yet concise guide offers secure practices for handling sensitive data payloads, including credentials, certificates, and tokens, enabling secure access to and from your organization's resources for apps running on Kubernetes.
- PDF + ePub pkt
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
This comprehensive guide covers a range of topics in cloud security with a practical focus on providing valuable insights and skills to enable you to secure multi-cloud environments effectively.
- PDF + ePub pkt
Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
-
TLS is the most important and widely used security protocol in the world. This book takes you on a journey through modern cryptography with TLS as the guiding light. It explains all necessary cryptographic primitives and how they are used within TLS. You’ll explore the inner workings of TLS and its design structure.
- PDF + ePub pkt
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
This book helps you build a comprehensive foundation in cybersecurity, and prepares you to overcome the challenges of today's digital world. Whether you're pursuing a career in cybersecurity or looking to enhance your existing knowledge, this book is your ultimate guide to passing the SY0-701 exam.
- ePub pkt
CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition
-
This book is a comprehensive guide to configuring and managing Microsoft Intune, a cloud-based endpoint management (MDM) tool. It covers everything from the initial setup and configuration to troubleshooting and automating tasks.
- PDF + ePub pkt
Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
-
Although cloud computing has made infrastructure management easy, the demand for competent IT administrators is high. This book is a primary support and source of ideas for those seeking to grasp how Azure transforms infrastructure administration
- PDF + ePub pkt
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
This book is a comprehensive, hands-on guide for individuals new to DevSecOps who want to implement DevSecOps practices successfully and efficiently. With its help, you’ll be able to shift security toward the left, enabling you to merge security into coding in no time.
- PDF + ePub pkt
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Malware Science is your go-to guide to the synergy of cybersecurity and data science. You’ll first learn about malware lifecycle before delving into data science techniques for improved detection and analysis. This book will also help you decipher key regulations like GDPR and CCPA, making it an indispensable resource for cybersecurity pros
- PDF + ePub pkt
Malware Science. A comprehensive guide to detection, analysis, and compliance Malware Science. A comprehensive guide to detection, analysis, and compliance
-
The Essential Guide to Web3 serves as a gateway to the decentralized web—also known as the decentralized internet—to enable you to embark on an immersive journey into the fascinating world of Web3. With brief overviews of the blockchain and the Ethereum ecosystem at the outset, this book quickly immerses you in practical blockchain ap
- PDF + ePub pkt
The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network
-
The advent of cloud networks and the AWS, Azure, and GCP platforms has revolutionized how companies of all sizes in all industries do business online. This book will help you meet the emerging demand for pentesting as it guides you through the tools, techniques, and security measures used by pentesters and red teamers in the 2020s and beyond.
- PDF + ePub pkt
Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications
-
Fedora Linux System Administration enables you to configure your workstation to improve the performance of your daily tasks. The chapters provide you with the necessary knowledge and help you to review the fundamentals that every modern system administrator should understand.
- PDF + ePub pkt
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Cybersecurity architects are responsible for ensuring that the enterprises are protected from cyberattacks. This book covers the nuts and bolts of how to keep your organization safe by helping you understand the intricacies of mitigating risks, creating an implementation roadmap, ensuring continuous improvement, and beyond.
- PDF + ePub pkt
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
As cyber-attacks grow and APT groups advance their skillset, you need to be able to protect your enterprise against cyber-attacks. In order to limit your attack surface, you need to ensure that you leverage the same skills and tools that an adversary may use to hack your environment and discover the security gaps. This book will teach you how to th
- PDF + ePub pkt
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi
- PDF + ePub pkt
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Get started on Zero Trust with this step-by-step playbook and learn everything you need to know for a successful Zero Trust journey with tailored guidance for every role, covering strategy, operations, architecture, implementation, and measuring success. This book will become an indispensable reference for everyone in your organization.
- PDF + ePub pkt
Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners
-
Burp Suite is an immensely powerful and popular tool for web application security testing. This book provides a collection of recipes that address vulnerabilities in web applications and APIs. It offers guidance on how to configure Burp Suite, make the most of its tools, and explore into its extensions.
- PDF + ePub pkt
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
This Automotive Cybersecurity Engineering Handbook untangles the complexities of building secure automotive products and helps you to comply with cybersecurity standards. It provides practical tools, tips, and techniques coupled with real-world examples to enable you to create cyber-resilient automotive products with ease.
- PDF + ePub pkt
Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles
-
This hands-on guide will help you design and build a variety of penetration testing labs that mimic modern cloud environments running on AWS, Azure, and GCP. In addition to these, you will explore a number of practical strategies on how to manage the complexity, cost, and security risks involved when setting up vulnerable cloud lab environments.
- PDF + ePub pkt
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
ISACA Certified in Risk and Information Systems Control (CRISC®) Certification Guide is an enterprise IT risk management professional’s dream. With its in-depth approach and various self-assessment exercises, this book arms you with knowledge of every single aspect of the certification, and is a fantastic career companion after you
- PDF + ePub pkt
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
This book will help you to design, develop, and operate security controls on Google Cloud as well as discover best practices for relevant security domains, including identity and access management, network, and data.
- PDF + ePub pkt
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
Attacking and Exploiting Modern Web Attacks will help you understand how to identify attack surfaces and detect vulnerabilities. This book takes a hands-on approach to implementation and associated methodologies and equips you with the knowledge and skills needed to effectively combat web attacks.
- PDF + ePub pkt
Attacking and Exploiting Modern Web Applications. Discover the mindset, techniques, and tools to perform modern web attacks and exploitation Attacking and Exploiting Modern Web Applications. Discover the mindset, techniques, and tools to perform modern web attacks and exploitation
-
This is a practical guide that enables SOC professionals to analyze the most common security appliance logs that exist in any environment.
- PDF + ePub pkt
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
The Microsoft 365 Security, Compliance, and Identity Administration is a comprehensive guide that helps you employ Microsoft 365's robust suite of features and empowers you to optimize your administrative tasks.
- PDF + ePub pkt
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
PowerShell is a powerful framework and tool that can help both red and blue teamers. It’s easy to learn and provides direct access to the Windows subsystem and APIs. This book will provide you with the skills and knowledge to make the most of PowerShell from both a red and blue team perspective. You’ll learn to attack, secure, and bui
- PDF + ePub pkt
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Reconnaissance for Ethical Hackers provides highly contextual real-world techniques used by threat actors, ethical hackers, and pentesters to collect valuable information about organizations that can be used for future attacks and operations. This book will help you develop the ethical hacking skills needed to successfully perform reconnaissance.
- PDF + ePub pkt
Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting
-
With this new edition, get to grips with Keycloak in a hands-on way with the help of brilliant examples. Keycloak - Identity and Access Management for Modern Applications 2E teaches you how to secure new and existing applications.
- PDF + ePub pkt
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Microsoft is making a strong name for itself in the security ecosystem. When correctly set, Microsoft 365 Defender includes a number of solutions that can help your organization become more secure. Knowing how to use each tool and understanding the outcomes of the threats and incidents will improve your detection capability. In this book, you will
- PDF + ePub pkt
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Gain a comprehensive understanding of the detection engineering lifecycle, why it’s important, and how it can be leveraged to protect your organization. Authored by three cybersecurity veterans, this practical guide covers everything from fundamental concepts to career insights, enriching your cybersecurity expertise and bolstering your CV.
- PDF + ePub pkt
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Automating security tasks can save cybersecurity tasks a lot of time, but getting to grips with SOAR requires a comprehensive introduction. This book, written by an automation expert, will help you get all the information you need to use SOAR confidently as well as show you its capabilities in action with the help of real-life examples.
- PDF + ePub pkt
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.
- PDF + ePub pkt
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
This comprehensive guide will help you understand practical aspects of information systems auditing. It covers key areas such as governance and management of IT, information systems acquisition, development, implementation and information systems operations, business resilience, and the crucial topic of protecting information assets.
- PDF + ePub pkt
CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition
-
This book is a comprehensive guide that explains multi-factor identification and its integration into your security infrastructure. From theoretical foundations to hands-on implementation, this book will teach you everything there is to know about choosing the right MFA solution or product for your business and configuring it for maximum impact.
- PDF + ePub pkt
Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA
-
The MS-100 certification validates your knowledge of identity and security aspects of a Microsoft 365 tenant. With the help of this book, you’ll explore core features such as self-service password reset and Azure AD identity protection, enabling you to implement Azure AD identity and secure access easily.
- PDF + ePub pkt
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
This book focuses on how machine learning can be used to solve cybersecurity issues such as fraud detection, malware analysis, deepfake identification, and misinformation detection. Each chapter covers the theory of the latest ML methods, and instructs readers in implementation, thus leading to an end-to-end understanding of the problem.
- PDF + ePub pkt
10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques 10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques
-
Aligning Security Operations with MITRE ATT&CK Framework is a comprehensive guide to assessing your SOC and improving it through alignment and implementation using the Mitre ATT&CK framework. As you progress through the chapters, you’ll gain both insight and practical skills to improve detection and response toward threats with the help of e
- PDF + ePub pkt
Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security
-
Through this book, you’ll learn to administer core and advanced Windows Server and Infrastructure-as-a-Service workloads utilizing the available - on-premises, hybrid, and cloud technologies. All the skills you acquire will prepare you to ace the AZ-801: Configuring Windows Server Hybrid Advanced Services Exam.
- PDF + ePub pkt
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
With Mastering Veeam Backup and Replication you’ll learn how to install Veeam Backup & Replication 12 on your system, the Core Architecture enhancements, as well as about other enhancements. You’ll also gain an understanding of security, Object Storage direct, and CDP with Cloud Connect.
- PDF + ePub pkt
Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition
-
This book helps you set up your own virtual and portable forensic lab and guides on memory analysis and full forensic analysis using industry-recognized tools. You’ll explore malware and network artifact analyses and implement all the pillars of digital forensics such as acquisition, analysis, and presentation using cutting-edge tools.
- PDF + ePub pkt
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
-
Gain a solid understanding of security, compliance, and regulatory risks associated with the rapid digitization of systems and processes post pandemic. This book guides you with the proper steps you need to take to mitigate risks and attacks and helps you make your business future-proof.
- PDF + ePub pkt
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith
-
This practical guide will help developers working with networking technologies such as CSMA, P2P, Wi-Fi, Wi-Fi 6, and LTE to perform advanced network simulations using ns-3. This book provides a hands-on approach to evaluating useful test scenarios of wired, Wi-Fi, LTE networks in the context of real-time deployments and research activities.
- PDF + ePub pkt
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3 Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
Mastering Blockchain, Fourth Edition, is the blockchain bible to equip you with extensive knowledge of distributed ledger technology, cryptocurrencies, and blockchain platforms such as Ethereum, Solana, and Bitcoin. With updates on new concepts like privacy, scalability, and DeFi, this book will help keep your knowledge and skills up to date.
- PDF + ePub pkt
Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition
-
With .NET MAUI for C# Developers, you’ll learn to create cross-platform apps for iOS, Android, Windows, and Mac by writing the code once and leveraging the application to automatically produce native code for each. With the help of this book, you’ll be well prepared to build commercial MAUI programs that integrate into the overall .NE
- PDF + ePub pkt
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications .NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
This book targets IT professionals who implement and manage native security features within the Azure platform. You’ll learn all about Identity, Network Security Groups, Azure Firewall, Web Application Firewall, DDoS, Azure Bastion, Azure VPN, and native Azure security tools such as Microsoft Defender for Cloud and Microsoft Sentinel.
- PDF + ePub pkt
Azure Security Cookbook. Practical recipes for securing Azure resources and operations Azure Security Cookbook. Practical recipes for securing Azure resources and operations
-
This book provides a security baseline to reduce the risk of future attacks. The chapters will teach you how to secure your Windows endpoint, protect devices with Microsoft Defender, and secure hybrid workloads using Azure Arc, enabling you to protect your infrastructure, network, and data with the help of SASE and the Zero Trust model.
- PDF + ePub pkt
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks. It starts with a tutorial on compiling code and goes on to explain the process of Windows systems and how attackers can exploit it to evade security measures, ensuring that you can stay safe from ATP malware.
- PDF + ePub pkt
Windows APT Warfare. Identify and prevent Windows APT attacks effectively Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Zed Attack Proxy Cookbook covers detailed recipes to strengthen the security posture of your organization using practical web app penetration and testing techniques. The book will help you integrate ZAP into your CI/CD pipeline and ensure hitch-free assessments.
- PDF + ePub pkt
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.
- PDF + ePub pkt
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. You’ll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration and auditing.
- PDF + ePub pkt
Mastering Linux Security and Hardening. A practical guide to protecting your Linux system from cyber attacks - Third Edition Mastering Linux Security and Hardening. A practical guide to protecting your Linux system from cyber attacks - Third Edition
-
The Executive’s Cybersecurity Program Handbook helps you perform internal assessments to drive strategic cybersecurity program development and evaluate risk within an organization. With this book, you’ll be able to build an incident response team and implement administrative and technical security controls.
- PDF + ePub pkt
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
This book will help you understand how a blue team is formed and why it is crucial for businesses. You’ll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.
- PDF + ePub pkt
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
This book is a guide to help security professionals learn about the process of discovering and publishing vulnerabilities in software. They'll learn how to build and execute winning vulnerability research strategies and disclosure methods and find out exactly how to claim credit for their work by opening CVEs and sharing their research publicly.
- PDF + ePub pkt
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
Combating Crime on the Dark Web gives you a deep understanding of how criminal elements operate on the dark web and how you can strategize and use various tools to disrupt those operations. If you’re looking to pave your way to an exciting and rewarding career in crime prevention, this book is a must-read.
- PDF + ePub pkt
Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime
-
This 2nd edition book will show you how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
- PDF + ePub pkt
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
DevSecOps in Practice with VMware Tanzu is a comprehensive learning reference covering the best-in-class tools that will aid in enhancing developer productivity, operational efficiency, and intrinsic security. This book will help you in laying out the easiest path to production for apps built to run in multi-cloud Kubernetes environments.
- PDF + ePub pkt
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
-
Cloud Auditing Best Practices is a complete guide to assessing security and IT controls in the big three cloud environments: Azure, AWS, and GCP. Once you’ve read this book, you’ll be able to build and execute an IT audit plan that will effectively assess cloud security and IT controls adherence to compliance objectives with ease.
- PDF + ePub
- Audiobook MP3 pkt
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
This book will prepare cybersecurity professionals for the SC-100 exam while also helping them build a strong foundation for implementing the strategies they learn. A mixture of theoretical and practical knowledge, as well as practice questions and a mock exam will ensure you’re confident to take the exam.
- PDF + ePub
- Audiobook MP3 pkt
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
As hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.
- PDF + ePub
- Audiobook MP3 pkt
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
This is a guide for cloud identity experts who want to understand the principles to design and implement an identity strategy that fits their organization. As you progress through this book, you’ll learn how cloud evolution affected identity strategy within the enterprise.
- PDF + ePub
- Audiobook MP3 pkt
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
Cyber anonymity is very essential as most devices, applications, and browsers collect information on every single activity that you perform in cyberspace. This book helps you understand the importance of cyber anonymity and you will learn techniques that will help you perform tasks without disclosing your information.
- PDF + ePub pkt
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
This book not only helps you gain a deep understanding of crucial information security concepts, but also supercharges your preparation for the CISM exam through interactive practice questions, flashcards, and exam tips.
- PDF + ePub pkt
Certified Information Security Manager Exam Prep Guide. Gain the confidence to pass the CISM exam using test-oriented study material - Second Edition Certified Information Security Manager Exam Prep Guide. Gain the confidence to pass the CISM exam using test-oriented study material - Second Edition
-
An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities.
- PDF + ePub pkt
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
The CompTIA Network+ Certification Guide makes the most complex Network+ concepts easy to understand despite having no prior knowledge. It offers exam tips in every chapter along with access to practical exercises and an exam checklist that map to the exam objectives. Moreover, it is the perfect study guide to help you confidently pass the CompTIA
- PDF + ePub pkt
CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition
-
Digital transformation of enterprises and hybrid multi-cloud adoption pose many security challenges. This book presents useful security patterns that discuss the problem context and solution. You’ll receive clear guidance on implementation and best practices for securing infrastructure, protecting data and providing continuous security and c
- PDF + ePub pkt
Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud
-
This book will help you become confident with system administration and equip you with the knowledge required to get certified in Red Hat Enterprise Linux 9 RHCSA, the standard enterprise Linux used in data centers and the cloud worldwide.
- PDF + ePub pkt
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
Pablo Iranzo Gómez, Pedro Ibánez Requena, Miguel Pérez Colino, Scott McCarty
-
This guide to SASE services is for those implementing SD-WAN, SASE, cloud infrastructure, remote access, or integrating a multi-cloud strategy that may or may not include edge computing solutions. This book shows the past, present, and future of SASE and how you can learn today and prepare for the future.
- PDF + ePub pkt
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
This book will help you discover the powerful capabilities of Dapr by implementing a sample application with microservices leveraging all the building blocks. Throughout the book, you’ll find out how Dapr helps you simplify the creation of resilient and portable microservices.
- PDF + ePub pkt
Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition
-
This comprehensive guide will aid the C-suite and executives in understanding the necessity of cyber resilience in their organizations, self-assess their role in supporting their company’s cybersecurity program, and provide practical takeaways and insights on navigating their working relationship with the other C-suite counterparts.
- PDF + ePub
- Audiobook MP3 pkt
Building a Cyber Resilient Business. A cyber handbook for executives and boards Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Flutter developers already building mobile apps and developers working with Dart will find this book useful for constructing exquisite, interactive, and native-like web applications. The book makes it easy to learn how to build and deploy web apps using identical Flutter and Dart codebase that you may already be acquainted with.
- PDF + ePub pkt
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Network Protocols for Security Professionals is a comprehensive guide that will take you through the basics of network security and help you get to grips with the network, network devices, and traffic analysis-based attacks. The book covers practical ways to attack and defend network protocols.
- PDF + ePub pkt
Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
-
Cybersecurity – Attack and Defense Strategies, Third Edition is a completely revised new edition of this bestselling book that covers the very latest security threats and defense strategies.
- PDF + ePub pkt
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Helm is a powerful open-source tool for automating application deployments on Kubernetes. Managing Kubernetes Resources Using Helm provides you with the ability to significantly reduce operational stress around application deployment and lifecycle management.
- PDF + ePub + Mobi pkt
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
Malware analysis is a powerful investigation technique widely used in various information security areas including digital forensics and incident response processes. With the help of this book, you’ll be able to use practical examples and comprehensive insights to analyze any type of malware you may encounter within the modern world.
- PDF + ePub pkt
Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition
-
Windows Server 2022 is Microsoft's latest version of the server OS. It brings significant improvements in security, secure connectivities, Azure hybrid capabilities, storage, and other vital features. This book covers all Windows Server 2022 administration fundamentals, giving you valuable insights into Microsoft's role-based certifications.
- PDF + ePub pkt
Windows Server 2022 Administration Fundamentals. A beginner's guide to managing and administering Windows Server environments - Third Edition Windows Server 2022 Administration Fundamentals. A beginner's guide to managing and administering Windows Server environments - Third Edition
-
This book is a technical reference that investigates, analyzes, and explains every part of the FastAPI framework and demonstrates the use of these parts by helping you solve problems. Some topics are experimental and original given the current development setups. Overall, the book is a recipe, blueprint, study, and reference combined into one.
- PDF + ePub pkt
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
While penetration testing is highly competitive, it’s easy to be stuck in a monotonous routine client after client. This book will provide hands-on experience with penetration testing while guiding you through the behind-the-scenes action along the way.
- PDF + ePub pkt
Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition
-
Check Point Firewall Administration R81.10+ is for security administrators to develop the skills necessary for effective deployment and operation of Check Point firewalls or high availability clusters. This book will help you to improve network segmentation and implement airtight access control policies.
- PDF + ePub pkt
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
With this edition, you’ll be able to secure your company’s data and users in today’s threat landscape. This book will help you to holistically approach the method of securing your Windows environment, with best practice recommendations, real-world scenarios, and by guiding you through implementing a zero-trust multi-layered app
- PDF + ePub pkt
Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition
-
Learn Wireshark provides an overview of protocol analysis. You’ll become more confident in navigating the interface while examining protocols such as TCP, IP, and ICMP. The book features tips on how to use display and capture filters, save, export, and share captures, create graphs, and become more proficient in troubleshooting latency issue
- PDF + ePub pkt
Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition
-
This book introduces you to two distinct applications of computer-based investigations, from criminal acts investigated by the police to acts performed by an employee investigated by their employer or a third-party investigator.
- PDF + ePub pkt
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
This book will take you through some key cybersecurity job roles and teach you the important technical and behavioral questions that will help you pass the interview, land the job, and grow in your cybersecurity career.
- PDF + ePub
- Audiobook MP3 pkt
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
-
Microsoft Defender for Cloud is an infrastructure management system that enhances security status and provides threat protection of hybrid workloads in the cloud. Microsoft Defender for Cloud Cookbook provides comprehensive coverage of Microsoft Defender for Cloud features and capabilities as well as hands-on and implementation guides and examples.
- PDF + ePub pkt
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
This book provides ultimate coverage of concepts, tools, and resources required to take the CEH exam. By the end of this book, you'll have obtained the information necessary to prepare for the 312-50 exam and become a CEH v11 certified ethical hacker.
- PDF + ePub pkt
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities
-
This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through step-by-step exercises. You'll learn how to respond to cybersecurity incidents using intelligence-based threat hunting techniques.
- PDF + ePub pkt
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
This book is your ultimate guide to OPNsense, an open-source next-generation firewall solution. The book comes packed with hands-on examples that will enable you to enhance network security like a professional.
- PDF + ePub pkt
OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense
-
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.
- PDF + ePub pkt
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Complete with step-by-step explanations of essential concepts and practical examples, you’ll begin by creating your very first app from the get-go. You’ll learn how to use it as a means to explore and understand the Honeycode development environment and concepts.
- PDF + ePub pkt
Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming
-
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You’ll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.
- PDF + ePub
- Audiobook MP3 pkt
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.
- PDF + ePub pkt
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini
-
This easy-to-follow guide is for network and security professionals who want to learn how to use Palo Alto’s Next Generation Firewall, and how it can be leveraged to gain deep insight into the traffic, applications and threats that traverse your network.
- PDF + ePub
- Audiobook MP3 pkt
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
This book will focus right from scratch on how to set up an environment and perform reverse engineering on iOS and Android mobile apps. The book takes you on a journey of exploring the internals of mobile apps, how they are built, and how to take each piece apart while trying to understand the internal working of the apps.
- PDF + ePub pkt
Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
-
Simplifying security concepts of Microsoft Azure and Microsoft 365, this book will help you gain knowledge necessary to take and pass Exam SC-900 to achieve the Microsoft Security, Compliance, and Identity Fundamentals certification. You'll be able to implement the acquired practical knowledge in real-world scenarios in no time.
- PDF + ePub pkt
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure
-
MS-700 Managing Microsoft Teams Exam Guide offers complete, up-to-date coverage of the MS-700 exam’s objectives along with ample practice questions and explanations, so that you can take the exam with confidence, fully equipped to pass the first time.
- PDF + ePub pkt
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
This book takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report.
- PDF + ePub
- Audiobook MP3 pkt
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Mastering Cyber Intelligence provides critical knowledge that will help you stay ahead of adversaries and proactively protect your organization against known and unknown cyber threats. You'll build the security skills required to conduct effective threat intelligence, integrate it into operations, and identify gaps in security postures.
- PDF + ePub pkt
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Security is integrated into every cloud, but most users take cloud security for granted. Revised to cover product updates up to early 2022, this book will help you understand Microsoft Azure's shared responsibility model that can address any challenge, cybersecurity in the cloud, and how to design secure solutions in Microsoft Azure.
- PDF + ePub pkt
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
The evolving ransomware threat landscape brings new challenges to the security personnel of many organizations. The effects of human-operated attacks make practical security approaches the need of the hour as proper response and investigation are crucial. This book discusses how to use these approaches, focusing on real-world scenarios and tools.
- PDF + ePub pkt
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
Shellcode is code that is used to execute a command within software memory to take control of or exploit a target computer. Offensive Shellcode from Scratch helps you to understand what shellcode is, along with its components, the tools used to build shellcode, and how shellcode can be used within Linux and Windows.
- PDF + ePub pkt
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Memory forensics is a vital part of modern digital forensic examinations as threat actors have started using memory-based malware more often. This comprehensive guide focuses on the application of modern memory forensics techniques to detect hidden threats in memory and reconstruct user activity based on volatile data.
- PDF + ePub pkt
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
-
This book covers in detail all the objectives of the SC-200: Microsoft Security Operations Analyst exam. The book offers a blend of theory and practical examples that will not only help you pass this exam but also implement the knowledge in real-world scenarios.
- PDF + ePub pkt
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems
-
In the modern world, cyber threats have increased exponentially and a complex web of global data privacy regulations has made security and compliance difficult. This book will help you to understand what is happening in the digital landscape and deploy both timeless best practices and modernized approaches to overcome cybersecurity challenges.
- PDF + ePub pkt
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
CompTIA Advanced Security Practitioner (CASP+) candidates need to stay up to date with the emerging technologies and threats in this fast-changing environment. This book helps you to apply CASP+ concepts, understand processes and methodologies, and discover industry best practices for achieving CASP+ certification.
- PDF + ePub
- Audiobook MP3 pkt
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
This book is a guide to understanding new-age protocols and algorithms that are emerging for data protection in cybersecurity and information and communications technology (ICT) with the help of examples and use cases. You’ll begin by exploring classical cryptography and later progress to implementing algorithms for security and data privacy
- PDF + ePub pkt
Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
-
With this guide for developers, you'll learn how to build apps that use common cryptographic operations to improve security and respect user privacy. You'll understand how, when, and why to use safe, modern cryptographic algorithms and libraries in your code. You’ll learn using plenty of code samples in JavaScript for both Node.js and the br
- PDF + ePub pkt
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
Promocja
This book systematically takes you through all aspects of ethical hacking. Encompassing topics such as attack methodologies and featuring practical exercises, this book is an essential resource for cybersecurity enthusiasts.- PDF + ePub pkt
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
(100,08 zł najniższa cena z 30 dni)
-
Promocja
This book provides a holistic guide for CISOs, covering everything from understanding cyber threats to implementing resilient security measures, all tailored for varying levels of expertise.- PDF + ePub pkt
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
(121,68 zł najniższa cena z 30 dni)
-
Promocja
This book helps you build your own blockchains and production-grade decentralized apps on blockchains like Ethereum, Solana, NEAR, and Polkadot. You’ll explore best practices, code, and assets that can be used for scaffolding multiple projects.- PDF + ePub pkt
Rust for Blockchain Application Development. Learn to build decentralized applications on popular blockchain technologies using Rust Rust for Blockchain Application Development. Learn to build decentralized applications on popular blockchain technologies using Rust
(78,48 zł najniższa cena z 30 dni)
-
Promocja
With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management Framework emphasizes the importance of this standard and explains why security leaders should adopt it in their organizations.- PDF + ePub pkt
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
(100,08 zł najniższa cena z 30 dni)
-
Promocja
Ready to become a cloud security champion? This practical guide, written by a seasoned cybersecurity and AWS cloud consultant, equips you with the tools and strategies you need to achieve secure, compliant, and cost-effective AWS operations.- PDF + ePub pkt
Mastering AWS Security. Strengthen your cloud environment using AWS security features coupled with proven strategies - Second Edition Mastering AWS Security. Strengthen your cloud environment using AWS security features coupled with proven strategies - Second Edition
(100,08 zł najniższa cena z 30 dni)
-
Promocja
Implementing Palo Alto Prisma Access not only teaches you how and why to deploy Prisma Access, but also delves into component interaction. Discover how to leverage advanced configurations to optimize the user experience and tighten your security.- PDF + ePub pkt
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
(114,48 zł najniższa cena z 30 dni)
-
Promocja
In an era plagued by hacking and security breaches, this book navigates you through Kali Linux's latest version, adeptly addressing critical security dimensions. From confidentiality and integrity to availability and access control, empower yourself with efficient Kali Linux-based solutions.- ePub pkt
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition - Third Edition The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition - Third Edition
(107,28 zł najniższa cena z 30 dni)