The current trend of hacking and security breaches shows how important it has become to pentest your environment to ensure endpoint protection. This book will take you through the latest version of Kali Linux to help you efficiently deal with crucia...Loe edasi...
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensi...Loe edasi...
The current trend of hacking and security breaches shows how important it has become to pentest your environment to ensure endpoint protection. This book will take you through the latest version of Kali Linux to help you efficiently deal with crucia...Loe edasi...
The adoption of blockchain for the value chain, insurance, and healthcare domain is flourishing. However, one of the key challenges faced in blockchain development is securing them. The book will cover essential architectural considerations, system...Loe edasi...
Cybersecurity Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book that covers the very latest security threats and defense strategies, updated for 2020....Loe edasi...
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensi...Loe edasi...
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those req...Loe edasi...
Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications.Real-World Bug Hunting is...Loe edasi...
In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensur...Loe edasi...
The book not only implements Hyperledger Fabric, but also shows you how to build and model a blockchain network with Composer. You will master several business blockchain technologies under the Hyperledger umbrella, including Sawtooth, Iroha, decent...Loe edasi...
Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for...Loe edasi...
Using Burp Suite, you can quickly build proof of concepts, extract data via an exploit, attack multiple end points in an application and even begin to script complex multi stage attacks. This book will provide a hands-on coverage on how you can get...Loe edasi...
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles...Loe edasi...
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficie...Loe edasi...
Adrian Pruteanu adopts the mindset of both a defender and an attacker in this practical guide to web application testing. By giving key insights into attack vectors and defenses, Becoming the Hacker builds your ability to analyze from both viewpoint...Loe edasi...
Python is the major programming language for network programming. This Learning Path shows you how to use the power and beauty of Python to complete numerous real-world tasks related to programming, monitoring, and administering networks....Loe edasi...
Microsoft Azure is a cloud computing platform that helps you build, deploy, and manage applications to overcome your business challenges. This book covers the commonly used Azure services and also explains how you effectively integrate and utilize t...Loe edasi...
Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions....Loe edasi...
Bug Bounty hunting is a new method which companies use to test their applications. There is no dedicated methodology in place right now to help researchers upskill themselves and become bug bounty hunters, that is why there is ambiguity as to what t...Loe edasi...
Network Scanning Cookbook enables a reader to understand how to perform a Network Scan, which includes Discovery, Scanning, Enumeration, Vulnerability detection etc using scanning tools like Nessus and Nmap. If the reader is an auditor, they will be...Loe edasi...
Industrial Internet is the integration of complex physical machines and networked sensors and software. Increasing the number of sensors in industrial equipment is going to increase the data being captured, which needs to be analyzed. This book is a...Loe edasi...