Data-Driven Security: Analysis, Visualization and Dashboards
Uncover hidden patterns of data and respond with countermeasures
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to...
Python Web Penetration Testing Cookbook
Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
About This Book
Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
Find the script you need to deal with any...
Wireshark® 101: Essential Skills for Network Analysis
This book is written for beginner analysts and includes 46 step-by-step labs to walk you through many of the essential skills contained herein. This book provides an ideal starting point whether you are interested in analyzing traffic to learn how an application works, you need to troubleshoot slow network performance, or determine whether a...
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...
The Network Security Test Lab: A Step-by-Step Guide
The ultimate hands-on guide to IT security and proactivedefense
The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...
Windows Virus and Malware Troubleshooting (Windows Troubleshooting)
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.
Whatever version of Windows you’re using, the threat of virus and malware infection is always a common danger. From key...
|Result Page: 11 10 9 8 7 6 5 4 3 2 |