Mostrando 401 - 417 Resultados de 417 Para Buscar 'defensive end', tiempo de consulta: 0.09s Limitar resultados
  1. 401
    por Orzach, Yoram
    Publicado 2022
    “…As you progress, you'll develop a thorough understanding of network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols. By the end of this network security book, you'll be well versed in network protocol security and security countermeasures to protect network protocols. …”
    Libro electrónico
  2. 402
    Publicado 2007
    “…As new projects come to their end and others begin, it seems important to make a point regarding the health of the river and to evaluate what it represents for its diverse users, civil society or for the economy of Mali. …”
    Libro electrónico
  3. 403
    Publicado 2016
    Libro electrónico
  4. 404
    Publicado 2020
    “…Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. …”
    Libro electrónico
  5. 405
    Publicado 2022
    “…The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. …”
    Libro electrónico
  6. 406
    Publicado 2022
    “…With the help of real-world use cases and examples, by the end of this book, you'll be able to integrate the best of both sides: red team tactics and blue team security measures. …”
    Libro electrónico
  7. 407
    Publicado 2021
    “…As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. …”
    Libro electrónico
  8. 408
    Publicado 2021
    “…Finally, you'll get to grips with common tooling utilized by professional malware analysts and understand the basics of reverse engineering with the NSA's Ghidra platform.By the end of this malware analysis book, you'll be able to perform in-depth static and dynamic analysis and automate key tasks for improved defense against attacks.What You Will Learn:Discover how to maintain a safe analysis environment for malware samplesGet to grips with static and dynamic analysis techniques for collecting IOCsReverse-engineer and debug malware to understand its purposeDevelop a well-polished workflow for malware analysisUnderstand when and where to implement automation to react quickly to threatsPerform malware analysis tasks such as code analysis and API inspectionWho this book is for:This book is for incident response professionals, malware analysts, and researchers who want to sharpen their skillset or are looking for a reference for common static and dynamic analysis techniques. …”
    Libro electrónico
  9. 409
    Publicado 2016
    “…Along with a review of penetration testing frameworks, this book is also a detailed manual on preparing a platform for wireless penetration testing. By the end of this book, you will be at the point when you can practice, and research without worrying about your lab environment for every task. …”
    Libro electrónico
  10. 410
    Publicado 2023
    “…As you advance, you'll cover practical examples of malware and online game hacking, such as EXE infection, shellcode development, software packers, UAC bypass, path parser vulnerabilities, and digital signature forgery, gaining expertise in keeping your system safe from this kind of malware. By the end of this book, you'll be well equipped to implement the red team techniques that you've learned on a victim's computer environment, attempting to bypass security and antivirus products, to test its defense against Windows APT attacks. …”
    Libro electrónico
  11. 411
    Publicado 2014
    “…Before going freelance, he served as CIO for a national chain of hospitals and healthcare facilities, and as network engineer for the US Department of Defense at Fort Knox, where he oversaw Exchange Server. …”
    Video
  12. 412
    Publicado 2023
    “…These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set. By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments. …”
    Libro electrónico
  13. 413
    Publicado 2022
    “…It also includes different types of licenses and policies, professional conduct, remote access technologies, and so on. By the end of the course, we will make sure you are ready to pass the CompTIA A+ Core 2(220-1102) exam. …”
    Video
  14. 414
    Publicado 2022
    “…He is also the NSA program administrator for his college's Center of Academic Excellence in cyber defense. Having taught many students over the years, Steve's favorite part about educating people is the "AHA!" …”
    Video
  15. 415
    Publicado 2023
    “…This book is an indispensable ally for anyone looking to thrive in the financial sector. By the end of this book, you'll be able to transform your approach to investing and trading by blending AI-driven analysis, data visualization, and real-world applications. …”
    Libro electrónico
  16. 416
    Publicado 2023
    “…Mark's training clients include the Department of Defense, Lockheed Martin, Discover Card Services, and Kaiser Permanente. …”
    Video
  17. 417
    Publicado 2023
    “…You also learn how to use a variety of software tools (both commercial as well as free/open source) and how to use those tools to discover knowledge from a wide variety of data sources. At the end of the course, you will not only know what predictive analytics is and what it can do for an organization but also develop basic skills to practice predictive analytics using numerous tools and platforms, most of which are free and open source. …”
    Video