Зарегистрироваться
Восстановить пароль
FAQ по входу

Риски и угрозы ИБ

C
Independently published, 2024. — 408 p. — ASIN: B0D3CWVYZC. "Mastering CMMC 2.0: A Comprehensive Guide to Implementing Cybersecurity Maturity in Defense Contracting" is the ultimate resource for IT professionals and organizations seeking to understand and implement the Cybersecurity Maturity Model Certification (CMMC) framework. This book comprehensively explores CMMC 2.0,...
  • №1
  • 2,26 МБ
  • добавлен
  • описание отредактировано
H
O’Reilly Media, 2020. – 325 p. — ISBN: 978-1-492-05311-8. While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security...
  • №2
  • 6,16 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — O’Reilly Media, Inc., 2023 — 99 p. — (Second Early Release). — ISBN 978-1-098-14393-0. In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and...
  • №3
  • 342,12 КБ
  • добавлен
  • описание отредактировано
K
Packt Publishing Ltd, 2019. — 784 p. — ISBN: 978-1-78961-078-9. Master malware analysis to protect your systems from getting infected With the ever-growing proliferation of technology, the risk of encountering malicious code or malware has also increased. Malware analysis has become one of the most trending topics in businesses in recent years due to multiple prominent...
  • №4
  • 50,66 МБ
  • добавлен
  • описание отредактировано
M
No Starch Press, 2020. — 196 p. — ISBN13: 978-1-59327-989-9 (ebook). A hands-on guide to improving an organization's computer security and developing scanning tools on a budget. Practical Vulnerability Management discusses the components of a vulnerability management program and shows the reader how to build a free or low-cost system to automatically handle the repetitive...
  • №5
  • 2,30 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2024. — 334 p. — ISBN 978-1633438262. When you launch an application on the web, every hacker in the world has access to it. Are you sure your web apps can stand up to the most sophisticated attacks? Trying to teach yourself about web security from the internet can feel like walking into a huge disorganized library—one where you can never find what you...
  • №6
  • 10,55 МБ
  • добавлен
  • описание отредактировано
P
Packt Publishing, 2021. — 398 p. — ISBN 9781838556372. Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting Carry out atomic hunts to start the threat hunting process and...
  • №7
  • 69,34 МБ
  • добавлен
  • описание отредактировано
S
Apress, 2019. — 177 p. — ISBN13: (electronic): 978-1-4842-5391-5. Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how...
  • №8
  • 13,60 МБ
  • добавлен
  • описание отредактировано
В этом разделе нет файлов.

Комментарии

В этом разделе нет комментариев.