33 livres(s)
Télécharger le livre :  FAIK
Ajouter à ma liste d'envies

FAIK


Perry Carpenter


Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence In an era where artificial intelligence can create content indistinguishable from reality, how do we separate truth from fiction?...

Parution : 2024-08-20
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  How to Catch a Phish
Ajouter à ma liste d'envies

How to Catch a Phish


Nicholas Oles


Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and...

Parution : 2023-06-20
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
26,61
Télécharger le livre :  Blockchain Security from the Bottom Up
Ajouter à ma liste d'envies

Blockchain Security from the Bottom Up


Howard E. Poston


The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant...

Parution : 2022-07-26
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  Security Awareness For Dummies
Ajouter à ma liste d'envies

Security Awareness For Dummies


Ira Winkler


Make security a priority on your team  Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and...

Parution : 2022-03-24
Format(s) : PDF, ePub
Éditeur : For Dummies
J'achète
28,47
Télécharger le livre :  8 Steps to Better Security
Ajouter à ma liste d'envies

8 Steps to Better Security


Kim Crawley


Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical...

Parution : 2021-08-16
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  The Art of Attack
Ajouter à ma liste d'envies

The Art of Attack


Maxie Reynolds


Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles...

Parution : 2021-07-07
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  Hacken für Dummies
Ajouter à ma liste d'envies

Hacken für Dummies


Kevin Beaver


Um einen Hacker zu überlisten, müssen Sie sich in dessen Denkweise hineinversetzen. Deshalb lernen Sie mit diesem Buch, wie ein Bösewicht zu denken. Der Fachmann für IT-Sicherheit Kevin Beaver teilt mit Ihnen sein Wissen über Penetrationstests und typische...

Parution : 2020-10-27
Format(s) : ePub
Éditeur : Wiley-VCH
Collection : Für Dummies
J'achète
22,68
Télécharger le livre :  Privileged Attack Vectors
Ajouter à ma liste d'envies

Privileged Attack Vectors


Morey J. Haber , Brad Hibbert


See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached....

Parution : 2017-12-08
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
28,47
Télécharger le livre :  Deploying Secure Containers for Training and Development
Ajouter à ma liste d'envies

Deploying Secure Containers for Training and Development


Henry Dalziel , Jon Schipp


In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. -...

Parution : 2015-12-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Essential Skills for Hackers
Ajouter à ma liste d'envies

Essential Skills for Hackers


Kevin Cardwell , Henry Dalziel


Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what...

Parution : 2015-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Cyber Security Awareness for Corporate Directors and Board Members
Ajouter à ma liste d'envies

Cyber Security Awareness for Corporate Directors and Board Members


Henry Dalziel , David Willson


Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate...

Parution : 2015-12-08
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Breaking into Information Security
Ajouter à ma liste d'envies

Breaking into Information Security


Anthony J. Stieber , Chris Liu , Josh More


Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and...

Parution : 2015-12-05
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  You: For Sale
Ajouter à ma liste d'envies

You: For Sale


Stuart Sumner


Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and...

Parution : 2015-08-20
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Infosec Management Fundamentals
Ajouter à ma liste d'envies

Infosec Management Fundamentals


Henry Dalziel


Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business...

Parution : 2015-08-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Next Generation Red Teaming
Ajouter à ma liste d'envies

Next Generation Red Teaming


Henry Dalziel


Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of theRed Team is to see how weak or otherwise the organization's security posture is....

Parution : 2015-08-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Dissecting the Hack
Ajouter à ma liste d'envies

Dissecting the Hack


Jayson E Street


Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor,Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a...

Parution : 2015-07-20
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Cloud Storage Security
Ajouter à ma liste d'envies

Cloud Storage Security


Michael Winburn , Aaron Wheeler


Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case...

Parution : 2015-07-06
Format(s) : PDF, epub sans DRM
Éditeur : Elsevier
J'achète
30,54
Télécharger le livre :  Phishing Dark Waters
Ajouter à ma liste d'envies

Phishing Dark Waters


Michele Fincher , Christopher Hadnagy


An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing...

Parution : 2015-03-18
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
31,65
Télécharger le livre :  The Basics of Digital Forensics
Ajouter à ma liste d'envies

The Basics of Digital Forensics


John Sammons


The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to...

Parution : 2014-12-09
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
29,49
Télécharger le livre :  How to Attack and Defend Your Website
Ajouter à ma liste d'envies

How to Attack and Defend Your Website


Henry Dalziel


How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application,...

Parution : 2014-12-05
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
33,71
12 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés