Home | Amazing | Today | Tags | Publishers | Years | Search 
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Qt 5 Projects: Develop cross-platform applications with modern UIs using the powerful Qt framework
Qt 5 Projects: Develop cross-platform applications with modern UIs using the powerful Qt framework

Design, build, and deploy powerful applications with amazing user interfaces on embedded, mobile, and desktop platforms

Key Features

  • Easily compile, run, and debug your applications from the powerful Qt Creator IDE
  • Future-proof your applications with Qt Test and modern...
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications...
Pro DevOps with Google Cloud Platform: With Docker, Jenkins, and Kubernetes
Pro DevOps with Google Cloud Platform: With Docker, Jenkins, and Kubernetes
Use DevOps principles with Google Cloud Platform (GCP) to develop applications and services. This book builds chapter by chapter to a complete real-life scenario, explaining how to build, monitor, and maintain a complete application using DevOps in practice.

Starting with core DevOps concepts, continuous...
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity

Key Features

  • Understand the concept of Dark Net and Deep Web
  • Use Tor to extract data and maintain anonymity
  • Develop a security framework using Deep web evidences
  • ...
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes is a recent platform, based on more than ten years of experience in cloud computing by big companies like Google, its creator. It is considered complex as it includes all the concepts to run diverse applications in a large variety of environments.

This book, based on the curricula of the two Kubernetes
...
Introducing Azure Kubernetes Service: A Practical Guide to Container Orchestration
Introducing Azure Kubernetes Service: A Practical Guide to Container Orchestration
This book is a practical guide to Microsoft’s Azure Kubernetes Service (AKS), a container orchestration platform. The goal of this book is to take the reader from 0 to 100 deploying and running a Kubernetes cluster on Microsoft Azure cloud. For anyone embarking on this book, it is ideal to have experience in the...
Beginning Bazel: Building and Testing for Java, Go, and More
Beginning Bazel: Building and Testing for Java, Go, and More
Discover Bazel, a new build and software test set of tools for today's programmers and developers.  This book shows you how to speed up your builds and tests, and how to use Bazel in the context of your favorite programming language. You'll see that the languages and SDKs supported include Java, Android, iOS, and...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Hands-On Networking with Azure: Build large-scale, real-world apps using Azure networking solutions
Hands-On Networking with Azure: Build large-scale, real-world apps using Azure networking solutions

A step-by-step guide to get you up and running with Azure Networking Services and help you build solutions that leverage effective design patterns

Key Features

  • Learn best practices for designing and implementing Azure Networking for Azure VMs
  • Figure out the hidden secrets...
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Networking All-in-One For Dummies
Networking All-in-One For Dummies

Your ultimate one-stop networking reference 

Designed to replace that groaning shelf-load of dull networking books you’d otherwise have to buy and house, Networking All-in-One For Dummies covers all the basic and not-so-basic information you need to get a...

Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy