Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
SQL Server Advanced Data Types: JSON, XML, and Beyond
SQL Server Advanced Data Types: JSON, XML, and Beyond
SQL Server Advanced Data Types attempts to demystify the complex data types that are available to developers in modern versions of SQL Server. Over the last couple of years, I have noticed that many SQL developers have heard of each of the complex data types available in SQL Server but often avoid using them, as they are not sure...
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Hacking for Dummies
Hacking for Dummies
Find out if your system is vulnerable to hack attacks!

"The coverage of security topics in this book can help you avoid a hack attack."
— Stuart McClure

"To catch a thief, think like a thief." Here’s the guide that will help you do just that! It shows you how to become a "white hat...

ITIL Service Operation 2011 Edition (Best Management Practices)
ITIL Service Operation 2011 Edition (Best Management Practices)

The ITIL Editions 2011 has been updated for clarity, consistency, correctness and completeness. By focusing on delivery and control process activities, ITIL Service Operation describes how a highly desirable steady state of managing services can be achieved on a day-to-day basis. Key Features The updated ITIL publications share a similar...

Honeypots: Tracking Hackers
Honeypots: Tracking Hackers

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...

Pulsed Laser Ablation of Solids: Basics, Theory and Applications
Pulsed Laser Ablation of Solids: Basics, Theory and Applications

The book introduces ‘the state of the art' of pulsed laser ablation and its applications. It is based on recent theoretical and experimental studies. The book reaches from the basics to advanced topics of pulsed laser ablation. Theoretical and experimental fundamental phenomena involved in pulsed laser ablation are discussed with...

Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
The increasing complexity and diversity of systems, applications, and networks has made them more difficult to defend. As companies continue to experience losses due to security breaches, security professionals must take a new approach in protecting their assets. By using monitoring and detection measures with prompt intervention, you can...
Chemical Process Safety: Learning from Case Histories
Chemical Process Safety: Learning from Case Histories
"Given his extensive background in an industrial setting as a team leader at the PPG Chlor-Alkali Plant in Louisiana and the safety course that he taught for AIChE with the well-known safety expert Trevor Kletz, the quantity of information of a practical nature contained in this book is not surprising."
 - Gary Bennett,
...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy