Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
381Publicado 2022“…With the help of real-world use cases and examples, by the end of this book, you'll be able to integrate the best of both sides: red team tactics and blue team security measures. …”
Libro electrónico -
382Publicado 2021“…As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. …”
Libro electrónico -
383Publicado 2021“…Finally, you'll get to grips with common tooling utilized by professional malware analysts and understand the basics of reverse engineering with the NSA's Ghidra platform.By the end of this malware analysis book, you'll be able to perform in-depth static and dynamic analysis and automate key tasks for improved defense against attacks.What You Will Learn:Discover how to maintain a safe analysis environment for malware samplesGet to grips with static and dynamic analysis techniques for collecting IOCsReverse-engineer and debug malware to understand its purposeDevelop a well-polished workflow for malware analysisUnderstand when and where to implement automation to react quickly to threatsPerform malware analysis tasks such as code analysis and API inspectionWho this book is for:This book is for incident response professionals, malware analysts, and researchers who want to sharpen their skillset or are looking for a reference for common static and dynamic analysis techniques. …”
Libro electrónico -
384Publicado 2016“…Along with a review of penetration testing frameworks, this book is also a detailed manual on preparing a platform for wireless penetration testing. By the end of this book, you will be at the point when you can practice, and research without worrying about your lab environment for every task. …”
Libro electrónico -
385Publicado 2023“…As you advance, you'll cover practical examples of malware and online game hacking, such as EXE infection, shellcode development, software packers, UAC bypass, path parser vulnerabilities, and digital signature forgery, gaining expertise in keeping your system safe from this kind of malware. By the end of this book, you'll be well equipped to implement the red team techniques that you've learned on a victim's computer environment, attempting to bypass security and antivirus products, to test its defense against Windows APT attacks. …”
Libro electrónico -
386Publicado 2014“…Before going freelance, he served as CIO for a national chain of hospitals and healthcare facilities, and as network engineer for the US Department of Defense at Fort Knox, where he oversaw Exchange Server. …”
-
387Publicado 2023“…These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set. By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments. …”
Libro electrónico -
388Publicado 2022“…It also includes different types of licenses and policies, professional conduct, remote access technologies, and so on. By the end of the course, we will make sure you are ready to pass the CompTIA A+ Core 2(220-1102) exam. …”
Video -
389Publicado 2022“…He is also the NSA program administrator for his college's Center of Academic Excellence in cyber defense. Having taught many students over the years, Steve's favorite part about educating people is the "AHA!" …”
Video -
390Publicado 2023“…This book is an indispensable ally for anyone looking to thrive in the financial sector. By the end of this book, you'll be able to transform your approach to investing and trading by blending AI-driven analysis, data visualization, and real-world applications. …”
Libro electrónico -
391Publicado 2023“…Mark's training clients include the Department of Defense, Lockheed Martin, Discover Card Services, and Kaiser Permanente. …”
Video -
392Publicado 2023“…You also learn how to use a variety of software tools (both commercial as well as free/open source) and how to use those tools to discover knowledge from a wide variety of data sources. At the end of the course, you will not only know what predictive analytics is and what it can do for an organization but also develop basic skills to practice predictive analytics using numerous tools and platforms, most of which are free and open source. …”
Video