Catalog Search Results
Author
Language
English
Description
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that."Instant Citrix Security How-to" will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be...
Author
Language
English
Description
Welcome to "Navigating the Dark Waters of Cybersecurity Incident Response," a comprehensive guide that will help you prepare for and respond to cyber attacks. Written by a team of experienced cybersecurity experts, this book provides practical advice, real-world examples, and actionable insights that will help you navigate the complex and often murky world of cybersecurity incident response.
"Navigating the Dark Waters" offers a step-by-step approach...
Author
Language
English
Description
According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This eBook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics covered include- using personal mobile devices at work (BYOD), password security, data encryption, raising user awareness, securing networks, legal aspects of...
Author
Language
English
Description
Your one-stop guide to learning and implementing Red Team tactics effectively
Key Features:
- Target a complex enterprise environment in a Red Team activity
- Detect threats and respond to them with a real-world cyber-attack simulation
- Explore advanced penetration testing tools and techniques
Book Description:
Red Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities....
5) Python pour les hackers : Le guide des script kiddies : apprenez à créer vos propres outils de hacki
Author
Language
Français
Description
Voulez-vous faire partie d'une communauté de hackers et acquérir une compétence d'un vrai hacker? Vous n'aimez pas qu'on vous traite de script kiddie, alors que vous vous considérez comme hacker? Moi non plus. Mais il y a une vérité qu'il ne faut pas ignorer... Voici mon histoire :Quand j'ai commencé à apprendre le hacking (il y a quelques années de cela), j'ai fait ce que fait tout débutant : installer Kali Linux (backtrack à l'époque)...
Author
Language
English
Description
Become a Cisco security specialist by developing your skills in network security and explore advanced security technologies
Key Features Enhance your skills in network security by learning about Cisco's device configuration and installation Unlock the practical aspects of CCNA security to secure your devices. Explore tips and tricks to help you achieve the CCNA Security 210-260 Certification Book Description
With CCNA Security certification, a network...
Author
Language
English
Description
Master Python scripting to build a network and perform security operations
Key Features
Learn to handle cyber attacks with modern Python scripting
Discover various Python libraries for building and securing your network
Understand Python packages and libraries to secure your network infrastructure
Book Description
It's becoming more and more apparent that security is a critical aspect of IT infrastructure. A data breach is a major security incident,...
Author
Language
English
Description
Develop blockchain application with step-by-step instructions, working example and helpful recommendations
Key Features
Understanding the blockchain technology from the cybersecurity perspective
Developing cyber security solutions with Ethereum blockchain technology
Understanding real-world deployment of blockchain based applications
Book Description
Blockchain technology is being welcomed as one of the most revolutionary and impactful innovations...
9) OSCP Offensive Security Certified Professional Practice Tests With Answers To Pass the OSCP Ethical
Author
Language
English
Description
Embark on a transformative journey into the world of cybersecurity mastery with mastering offensive security. This comprehensive guide is meticulously crafted to propel aspiring professionals through the intricate realm of offensive security, serving as an indispensable roadmap to conquering the challenges of the coveted Offensive Security Certified Professional (OSCP) certification. Delve into a multifaceted exploration of offensive security practices,...
Author
Language
English
Description
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State...
11) Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Compu
Author
Language
English
Description
Keeping this high-demand information from yourself will be detrimental to your technologically-clueless future self... Do computers and technology, in general, feel alien-like to you, as if it's something way past your time? The advancements made in technology have taken over how our society functions, and so there's no other way to deal with your shortcomings than to handle it head-on. According to TechCo, technology has influenced nearly every aspect...
Author
Language
English
Description
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
About This Book
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks
Perform advanced wireless assessment and penetration tests
Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali...
13) Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digita
Author
Language
English
Description
Security is a shared responsibility, and we must all own it
KEY FEATURES ● Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components.● Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams.● Adopts a perspective of developing a Cybersecurity strategy that aligns with business goals.
DESCRIPTION Once a business is connected to the Internet,...
Author
Language
English
Description
HACKING
Computer hacking is an often misunderstood activity, with hackers being portrayed in the media as all being criminals and deviants. However, as you will discover through reading this book, there is more to hacking than meets the eye!
This informative book dispels the myths surrounding computer hacking, and teaches you about the different types of hackers in the world. You will learn about the different hacking techniques that can be used,...
Author
Language
English
Description
Many organizations today are required to have a formal IT Security Program in place in order to do business with their clients.
An Information Security Program is not intended to be cumbersome or sit and collect dust on the shelf. With the proper planning and know how your information security program can drive business operations and ensure secure processes are followed along the way.
Below is a list of just a few of the items you will learn while...
Author
Language
English
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Language
English
Description
I am in cybersecurity, but I am not a hacker! This field has many branches and not all of them are deeply technical or hands on. Some of these jobs are high-paying with salaries up to 6 figures.
According to the White House, there are 700,000 cybersecurity positions open today. There is a good chance that you fit into some of these roles.
Using the techniques in this series, you can be a part of one of the fastest, highest paid career paths in IT....
Author
Language
English
Description
COMPUTER HACKING
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking.
Inside, you will learn the basics of hacking for beginners.
This includes the different types of hacking, the reasons behind hacking, jobs in the hacking world, how to do some basic hacks, and the skills a hacker requires.
Many hackers are hired by companies to ensure that their computer systems are...
Author
Language
English
Description
This is not your regular hacking book.
Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform. The kind of vulnerabilities you find in every corporate environment around the world: • Bypassing application whitelisting • Privilege escalation • Pivoting on other machines. It's up to you to exploit them in a meaningful way without screwing...
In Interlibrary Loan
Didn't find what you need? Items not owned by Pueblo Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request