Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
401por Orzach, Yoram“…As you progress, you'll develop a thorough understanding of network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols. By the end of this network security book, you'll be well versed in network protocol security and security countermeasures to protect network protocols. …”
Publicado 2022
Libro electrónico -
402Publicado 2007“…As new projects come to their end and others begin, it seems important to make a point regarding the health of the river and to evaluate what it represents for its diverse users, civil society or for the economy of Mali. …”
Libro electrónico -
403Publicado 2016Libro electrónico
-
404Publicado 2020“…Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. …”
Libro electrónico -
405Publicado 2022“…The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. …”
Libro electrónico -
406Publicado 2022“…With the help of real-world use cases and examples, by the end of this book, you'll be able to integrate the best of both sides: red team tactics and blue team security measures. …”
Libro electrónico -
407Publicado 2021“…As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. …”
Libro electrónico -
408Publicado 2021“…Finally, you'll get to grips with common tooling utilized by professional malware analysts and understand the basics of reverse engineering with the NSA's Ghidra platform.By the end of this malware analysis book, you'll be able to perform in-depth static and dynamic analysis and automate key tasks for improved defense against attacks.What You Will Learn:Discover how to maintain a safe analysis environment for malware samplesGet to grips with static and dynamic analysis techniques for collecting IOCsReverse-engineer and debug malware to understand its purposeDevelop a well-polished workflow for malware analysisUnderstand when and where to implement automation to react quickly to threatsPerform malware analysis tasks such as code analysis and API inspectionWho this book is for:This book is for incident response professionals, malware analysts, and researchers who want to sharpen their skillset or are looking for a reference for common static and dynamic analysis techniques. …”
Libro electrónico -
409Publicado 2016“…Along with a review of penetration testing frameworks, this book is also a detailed manual on preparing a platform for wireless penetration testing. By the end of this book, you will be at the point when you can practice, and research without worrying about your lab environment for every task. …”
Libro electrónico -
410Publicado 2023“…As you advance, you'll cover practical examples of malware and online game hacking, such as EXE infection, shellcode development, software packers, UAC bypass, path parser vulnerabilities, and digital signature forgery, gaining expertise in keeping your system safe from this kind of malware. By the end of this book, you'll be well equipped to implement the red team techniques that you've learned on a victim's computer environment, attempting to bypass security and antivirus products, to test its defense against Windows APT attacks. …”
Libro electrónico -
411Publicado 2014“…Before going freelance, he served as CIO for a national chain of hospitals and healthcare facilities, and as network engineer for the US Department of Defense at Fort Knox, where he oversaw Exchange Server. …”
-
412Publicado 2023“…These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set. By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments. …”
Libro electrónico -
413Publicado 2022“…It also includes different types of licenses and policies, professional conduct, remote access technologies, and so on. By the end of the course, we will make sure you are ready to pass the CompTIA A+ Core 2(220-1102) exam. …”
Video -
414Publicado 2022“…He is also the NSA program administrator for his college's Center of Academic Excellence in cyber defense. Having taught many students over the years, Steve's favorite part about educating people is the "AHA!" …”
Video -
415Publicado 2023“…This book is an indispensable ally for anyone looking to thrive in the financial sector. By the end of this book, you'll be able to transform your approach to investing and trading by blending AI-driven analysis, data visualization, and real-world applications. …”
Libro electrónico -
416Publicado 2023“…Mark's training clients include the Department of Defense, Lockheed Martin, Discover Card Services, and Kaiser Permanente. …”
Video -
417Publicado 2023“…You also learn how to use a variety of software tools (both commercial as well as free/open source) and how to use those tools to discover knowledge from a wide variety of data sources. At the end of the course, you will not only know what predictive analytics is and what it can do for an organization but also develop basic skills to practice predictive analytics using numerous tools and platforms, most of which are free and open source. …”
Video