🍂 Autumn reading time! Let our AI Librarian find your perfect cozy read 🫖
Explore the literary world of this author
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement profes...
Quickly learn the ropes with the Rust programming language using this practical, step-by-step guide In Beginning Rust Programming, accomplished progra...
As protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, even...
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quick...
As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even...
Security Testing, Penetration Testing, and Ethical Hacking
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals ali...
Certified Ethical Hacker Version 11 Practice Tests
Master CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exa...
The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and pers...
"Incorporating real-world examples and exercises throughout, Security Strategies in Linux Platforms and Applications discusses every major aspect of s...
A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this sh...
"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 ...
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive re...
"All-in-One Is All You Need." Get complete coverage of all the objectives on Global Information Assurance Certification's Security Essentials (GSEC) e...
Security, Social Media, and Unified Communications
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with exp...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online e...
Exam Guide
...
....
The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world...