Category: Security & Encryption

Cybersecurity for Space: A Guide to Foundations and Challenges, 2nd Edition 0

Cybersecurity for Space, 2nd Edition

eBook Details: Paperback: 235 pages Publisher: WOW! eBook (July 17, 2024) Language: English ISBN-10: 8868803383 ISBN-13: 978-8868803383 eBook Description: Cybersecurity for Space: A Guide to Foundations and Challenges, 2nd Edition Space is one of the fastest growing military, government and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure cybersecurity is addressed in the burgeoning field of space operations. This revised and expanded Cybersecurity for Space, 2nd Edition will prime the reader with the knowledge needed to understand the unique challenges to space operations which affect the implementation of cybersecurity. Further,...

Introduction to Kali Purple 0

Introduction to Kali Purple

eBook Details: Paperback: 376 pages Publisher: WOW! eBook (June 28, 2024) Language: English ISBN-10: 1835088988 ISBN-13: 978-1835088982 eBook Description: Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux. Combine the offensive capabilities of Kali Linux with the defensive strength of a security operations center to enhance cybersecurity for business and training purposes. Introduction to Kali Purple combines red team tools from the Kali Linux OS and blue team tools commonly found within a security operations center (SOC) for an all-in-one approach to cybersecurity. This book takes you from an overview of today’s cybersecurity services and...

Ethical Password Cracking 0

Ethical Password Cracking

eBook Details: Paperback: 168 pages Publisher: WOW! eBook (July 15, 2024) Language: English ISBN-10: 1804611263 ISBN-13: 978-1804611265 eBook Description: Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking. Investigate how password protection works and delve into popular cracking techniques for penetration testing and retrieving data. Whether you’re looking to crack passwords as part of a thorough security audit or aiming to recover vital information, this book will equip you with the skills to accomplish your goals. Written by a cybersecurity expert with over fifteen years of experience in penetration testing, Ethical Password Cracking offers a...

Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 21 LTS and Jakarta EE 11, 2nd Edition 0

Cryptography and Cryptanalysis in Java, 2nd Edition

eBook Details: Paperback: 315 pages Publisher: WOW! eBook (July 28, 2024) Language: English ISBN-10: 8868804403 ISBN-13: 978-8868804403 eBook Description: Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 21 LTS and Jakarta EE 11, 2nd Edition Here is your in-depth guide to cryptography and cryptanalysis in Java. This Cryptography and Cryptanalysis in Java, 2nd Edition book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21’s new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the “hot points” (advantages...

Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition 0

Defensive Security Handbook, 2nd Edition

eBook Details: Paperback: 285 pages Publisher: WOW! eBook; 2nd edition (July 30, 2024) Language: English ISBN-10: 1098127242 ISBN-13: 978-1098127244 eBook Description: Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget for an information security (InfoSec) program. If you’re forced to protect yourself by improvising on the job, this Defensive Security Handbook, 2nd Edition pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. This Defensive Security Handbook: Best Practices...