Category: Security & Encryption

Cloud Defense Strategies with Azure Sentinel 7

Cloud Defense Strategies with Azure Sentinel

eBook Details: Paperback: 301 pages Publisher: WOW! eBook (October 16, 2021) Language: English ISBN-10: 1484271319 ISBN-13: 978-1484271315 eBook Description: Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active Directory, Azure Monitor, Azure Security Center, and others such as Azure Defender’s many security layers. This Cloud Defense Strategies with Azure Sentinel book is divided into three parts. Part I helps...

Designing Secure Software 3

Designing Secure Software

eBook Details: Paperback: 312 pages Publisher: WOW! eBook (October 19, 2021) Language: English ISBN-10: 1718501927 ISBN-13: 978-1718501928 eBook Description: Designing Secure Software: A Guide for Developers: What every software professional should know about security Designing Secure Software consolidates Loren Kohnfelder’s more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building security into software design early and involving the entire team in the process. The book begins with a discussion of core concepts like trust, threats, mitigation, secure design patterns, and cryptography. The...

Practical Linux Forensics 1

Practical Linux Forensics

eBook Details: Paperback: 400 pages Publisher: WOW! eBook (October 26, 2021) Language: English ISBN-10: 171850196X ISBN-13: 978-1718501966 eBook Description: Practical Linux Forensics: A Guide for Digital Investigators: A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems that have been misused, abused, or the target of malicious attacks. This essential practitioner’s guide will show you how to locate and interpret digital evidence found on Linux desktops, servers, and IoT devices, draw...

Ethical Hacking: A Hands-on Introduction to Breaking In 6

Ethical Hacking: A Hands-on Introduction to Breaking In

eBook Details: Paperback: 376 pages Publisher: WOW! eBook (September 21, 2021) Language: English ISBN-10: 1718501870 ISBN-13: 978-1718501874 eBook Description: Ethical Hacking: A Hands-on Introduction to Breaking In: A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans A crash course in modern hacking techniques, Ethical Hacking: A Hands-on Introduction to Breaking In is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You’ll begin with the basics: capturing a victim’s network traffic...

Nmap Network Exploration and Security Auditing Cookbook – Third Edition 0

Nmap Network Exploration and Security Auditing Cookbook – Third Edition

eBook Details: Paperback: 436 pages Publisher: WOW! eBook; 3rd edition (September 13, 2021) Language: English ISBN-10: 1838649352 ISBN-13: 978-1838649357 eBook Description: Nmap Network Exploration and Security Auditing Cookbook, 3rd Edition: A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for IT personnel, security engineers, system administrators, and application security enthusiasts Nmap is one of the most powerful tools for network discovery and security auditing used by millions of IT professionals, from system administrators to cybersecurity specialists. This Nmap Network Exploration and Security Auditing Cookbook, Third Edition introduces Nmap and its family – Ncat, Ncrack, Ndiff, Zenmap, and...