Matthew Baker, Brandon Beck, Doron Chosnek, Jason McGee, Sean McKeown. — Cisco Press, 2023. — 320 p. — ISBN-13: 978-0-13-789973-9. Use Cisco Intersight to streamline, unify, and secure IT operations across data centers, clouds, and the edge The Cisco Intersight cloud operations platform delivers intelligent visualization, optimization, and orchestration for applications and...
CISO DRG, 2018. — 385 p. — ISBN10: 0997744146, 13 978-0997744149. An easy-to-use guide written by experienced practitioners for recently-hired or promoted Chief Information Security Officers (CISOs), individuals aspiring to become a CISO, as well as business and technical professionals interested in the topic of cybersecurity, including Chief Technology Officers (CTOs), Chief...
Packt Publishing Limited, 2018. — 316 p. — ISBN: 978-1-78883-923-5. Get more from your network by securing its infrastructure and increasing its effectiveness Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in...
CRC Press, 2020. — 224 p. — ISBN: 978-1-003-08121-0 (ebk). Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don’t touch a front end or a back end; today’s web apps impact just about every corner of it. Today’s web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a...
BPB Publications, 2023. — 303 р. — ISBN 978-93-5551-275-8. Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks. Key Features ● Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. ● Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. ●...
2nd Edition. — BPB Publications, 2024. — 446 p. — ISBN: 978-93-55519-436. Master Python 3 to develop your offensive arsenal tools and exploits for ethical hacking and red teaming Key Features Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. This edition...
Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier. — Cisco Press, 2023. — 336 p. — ISBN-13: 978-0-13-789973-9. Архитектура нулевого доверия Today’s organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people,...
3rd Edition. — Jones & Bartlett Learning, 2022. — 450 р. — ISBN 978-1284206166. Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by industry experts, this book provides a comprehensive...
Packt Publishing, 2019. — 504 p. — ISBN: 178899082X. Enhance your ethical hacking skills to build automated and intelligent systems. Implement defensive techniques in your ecosystem successfully with Python. Key Features Identify and expose vulnerabilities in your infrastructure with Python Learn custom exploit development Make robust and powerful cybersecurity tools with...
Wiley-Scrivener, 2019. — 330 p. — ISBN: 978-1-119-59226-6. The book provides cutting-edge research that delivers insights into the tools, opportunities, novel strategies, techniques, and challenges for handling security issues in cloud computing, Internet of Things and social networking. Security concerns around the rapid growth and variety of devices that are controlled and...
River Publishers, 2025. — 258 p. — ISBN 978-87-7004-698-5. This is an essential resource for navigating the complex, high-stakes world of cybersecurity. It bridges the gap between foundational cybersecurity knowledge and its practical application in web application security. Designed for professionals who may lack formal training in cybersecurity or those seeking to update...
Packt Publishing, 2018. — 240 p. Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Bug bounties have quickly become a critical part of the security economy. This book shows...
Packt Publishing Limited, 2018. — 138 p. — ISBN: 978-1-78953-397-2. Leverage the simplicity of Python and available libraries to build web security testing tools for your application Web penetration testing is the use of tools and code to attack a website or web app in order to assess its vulnerability to external threats. While there are an increasing number of sophisticated,...
Amazon Digital Services LLC, 2016. — 18 p. — ASIN: B01L4LE4XM Do you sometimes encounter sudden drops in your Wi-Fi internet connection speed? It is possible that someone could be messing around with your Wi-Fi. No, one does not need to be a hacker to hack Wi-Fi networks. There are many FREE Wi-Fi hacking software flying around. One such example is "WEPCrack - An 802.11 key...
Independently published, 2023. — 176 p. — SBN-10: B0CB1X8B5N. Unleash the Power of Web Penetration Testing: Safeguard Your Applications from Cyber Threats In an increasingly interconnected world, the security of web applications is of paramount importance. Dive into the captivating realm of web penetration testing and become a master of safeguarding your applications against...
2nd Edition. — Rais Razi, Morillo Christina, Gilman Evan, Doug Barth. — O’Reilly Media, 2024. — 332 p. — ISBN: 978-1-492-09659-7. This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never...
4th Edition. — Books On Demand, 2023-05-17. — 364 p. — ISBN-13: 978-3757805364. Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Firewalls. OPNsense is a top player when it comes to intrusion detection, application control, web filtering, and Antivirus. No network is too insignificant to be spared by an...
М.: СОЛОН-Р, 2001. — 468 с. — ISBN: 5-93455-078-0. Книга в доступной форме рассказывает о проблемах безопасности сетевых сообщений. Излагаемый материал рассчитан в том числе и на неподготовленного читателя; значительную часть книги занимает описание базовых принципов функционирования сети, основных команд протоколов, архитектур операционных систем и т.д. "Техника сетевых атак"...
Комментарии