Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in San Francisco Public Library.
The Resource
Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in San Francisco Public Library.
- Label
- Computer networks -- Security measures
- Authority link
- http://id.worldcat.org/fast/00872341
- Source
- fast
A sample of Items that share the Concept Computer networks -- Security measures See All
Context
Context of Computer networks -- Security measuresSubject of
No resources found
No enriched resources found
- (ISC)2 CISSP : Certified Information Systems Security Professional : official practice tests
- 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
- 125 sposobów na bezpieczeństwo sieci
- 24 deadly sins of software security : programming flaws and how to fix them
- 8 steps to better security : a simple cyber resilience guide for business
- 802.11 Security
- A machine learning approach to phishing detection and defense
- A multidisciplinary introduction to information security
- A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security
- A practical guide to computer forensics investigations
- A study of black hole attack solutions : on AODV routing protocol in MANET
- AAA identity management security
- AVIEN malware defense guide for the Enterprise
- AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS
- Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
- Adaptive Security Management Architecture
- Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers
- Advanced penetration testing for highly-secured environments : employee the most advanced pentesting techniques and tools to build highly-secured systems and environments
- Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
- Advanced persistent threat : understanding the danger and how to protect your organization
- Advanced persistent training : take your security awareness program to the next level
- Advances in Network Management
- Agile security : an introduction for developers
- Ajax security
- Anomaly detection for monitoring : a statistical approach to time series anomaly detection
- Anonymous Communication Networks
- Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtual
- Anti-hacker tool kit
- Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software
- Apache : receptury
- Apache cookbook
- Apache cookbook
- Application security in the ISO 27001:2013 environment
- Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure
- Applied incident response
- Applied network security : master the art of detecting and averting advanced network security attacks and techniques
- Applied network security monitoring : collection, detection, and analysis
- Applied security visualization
- Are your bits flipped? : overcoming tech misconceptions
- Artificial Intelligence, Cybersecurity and Cyber Defence
- Assessing information security : strategies, tactics, logic and framework
- Assessing network security
- Asset protection through security awareness
- Beautiful security
- Becoming the hacker : the playbook for getting inside the mind of an attacker
- Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks
- Beyond cybersecurity : protecting your digital business
- Bezpieczenstwo tozsamosci i danych w projektach Web
- Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks
- Biometrics for Network Security
- Botnets : the killer web app
- Breached! : why data security law fails and how to improve it
- Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications
- Building Internet Firewalls : Internet and Web security
- Building a computer network : LiveLessons
- Building a modern security program : adapting security for DevOps and cloud
- Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques
- Building an intelligence-led security program
- Building secure servers with Linux
- Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
- Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suite
- Business continuity & disaster recovery for IT professionals
- Business continuity and disaster recovery for infosec managers
- Business continuity and disaster recovery planning for IT professionals
- CCIE collaboration lab exam
- CCIE collaboration quick reference
- CCIE routing and switching v5.0 exam roundup : networking talks
- CCIE security v3.0 quick reference
- CCIE security v4.0 : (video training)
- CCNA Cyber Ops SECOPS 210-255 complete video course
- CCNA Security 640-554 Official Cert Guide
- CCNA security live lessons : a hands-on guide to implementing security on Cisco routers and switches
- CCNP Security Firewall 642-617 official cert guide
- CCNP Security Firewall 642-617 quick reference
- CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
- CCNP security IPS 642-627 quick reference
- CCNP security VPN 642-647 official cert guide
- CCNP security VPN 642-647 quick reference
- CCNP security secure 642-637 quick reference
- CCSP Certified Cloud Security Professional exam guide
- CCSP Certified Cloud Security Professional practice exams
- CCSP SNAA quick reference
- CCSP SNAF quick reference
- CCSP self-study : Cisco secure intrusion detection system (CSIDS)
- CEH v11 certified ethical hacker study guide
- CISSP official (ISC)2 practice tests
- CISSP practice exams
- CISSP video mentor
- CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
- Case studies in secure computing : achievements and trends
- Certified ethical hacker v11
- Chained exploits : advanced hacking attacks from start to finish
- Check Point VPN-1/FireWall-1 on AIX : a cookbook for stand-alone and high availability solutions
- Cisco ASA 5500-X series next-generation firewalls : LiveLessons
- Cisco ASA : all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance
- Cisco ASA : all-in-one firewall, IPS, and VPN adaptive security appliance
- Cisco ASA : all-in-one next-generation firewall, IPS, and VPN services
- Cisco ASA and PIX firewall handbook
- Cisco ASA, PIX, and FWSM firewall handbook
- Cisco CCSP SNRS quick reference
- Cisco FirePOWER and Advanced Malware Protection : LiveLessons
- Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)
- Cisco IOS access lists
- Cisco ISE for BYOD and secure unified access
- Cisco Intelligent WAN (IWAN)
- Cisco NAC appliance : enforcing host security with clean access
- Cisco Network Admission Control, Vol. 1, NAC architecture and design
- Cisco Security Agent
- Cisco bring your own device (BYOD) networking
- Cisco firewall : video mentor
- Cisco firewall technology
- Cisco network security troubleshooting handbook
- Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP
- Cisco router and switch forensics : investigating and analyzing malicious network activity
- Cisco router firewall security
- Cisco secure Internet security solutions
- Cisco secure firewall services module (FWSM)
- Cisco security professional's guide to secure intrusion detection systems
- Client-side attacks and defense
- Cloud Computing Security, 2nd Edition
- Cloud computing security : foundations and challenges
- Cloud security and privacy
- Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack
- Cloud security for dummies
- Cloud security for dummies
- CompTIA PenTest+ Certification For Dummies
- CompTIA PenTest+ Practice Tests
- CompTIA security+ (SYO-401) : complete video course
- CompTIA security+ SYO-201 video mentor : learn exam essentials from the expert
- Comptia security+ certification practice exams, (Exam SY0-601)
- Computational network science : an algorithmic approach
- Computer Network Security
- Computer and information security handbook
- Computer and information security handbook
- Computer and information security handbook, second edition
- Computer forensics : a pocket guide
- Computer forensics : incident response essentials
- Computer forensics jumpstart
- Computer incident response and product security
- Computer security : art and science
- Computer security basics
- Computer security fundamentals
- Computer security fundamentals
- Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklären
- Conducting network penetration and espionage in a global environment
- Configuring Check Point NGX VPN-1/FireWall-1
- Configuring Juniper Networks NetScreen & SSG firewalls
- Container security : fundamental technology concepts that protect containerized applications
- Continuation of the national emergency with respect to securing the information and communications technology and supply chain : message from the President of the United States transmitting continuation of the national emergency with respect to securing the information and communications technology and services supply chain that was declared in Executive Order 13873 of May 15, 2019, is to continue in effect beyond May 15, 2021, pursuant to 50 U.S.C. 1622(d); Public law 94-412, Sec. 202(d); (90 Stat. 1257)
- Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
- Cracking security misconceptions : untangling common myths about modern information security
- Cryptography and network security
- Cryptography and network security
- Cyber Warfare - Truth, Tactics, and Strategies
- Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners
- Cyber conflict : competing national perspectives
- Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
- Cyber operations : building, defending, and attacking modern computer networks
- Cyber operations : building, defending, and attacking modern computer networks
- Cyber resiliency solution for IBM Spectrum Scale
- Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar
- Cyber security : endpoint defense
- Cyber security and network security
- Cyber security on Azure : an IT professionals guide to Microsoft Azure security center
- Cyber smart : five habits to protect your family, money, and identity from cyber criminals
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cyber warfare : techniques, tactics and tools for security practitioners
- Cyberjutsu : cybersecurity for the modern ninja
- Cybersecurity : managing systems, conducting testing, and investigating intrusions
- Cybersecurity For Dummies
- Cybersecurity Ops with bash : attack, defend, and analyze from the command line
- Cybersecurity attacks (Red Team activity)
- Cybersecurity essentials
- Cybersecurity for dummies
- Cybersecurity for dummies
- Cybersecurity for executives : a practical guide
- Cybersecurity incident response : how to contain, eradicate, and recover from incidents
- Cybersecurity lexicon
- Cybersecurity of industrial systems
- Cybersecurity pevention and detection (Video collection)
- Cybersecurity program development for business : the essential planning guide
- Cybersecurity program development for business : the essential planning guide
- Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics
- Data analytics for IT networks : developing innovative use cases
- Data breach preparation and response : breaches are certain, impact is not
- Data breaches : crisis and opportunity
- Data networks : routing, security, and performance optimization
- Defend I.T. : security by example
- Defense acquisitions : Cyber Command needs to develop metrics to assess warfighting capabilities : report to congressional committees
- Defensive cybersecurity fundamentals
- Defensive security handbook : best practices for securing infrastructure
- Deploying Microsoft Forefront Protection 2010 for Exchange Server
- Deploying Microsoft Forefront Threat Management Gateway 2010
- Deploying Microsoft Forefront Unified Access Gateway 2010
- Deploying zone-based firewalls
- Designing Network Security Second Edition
- Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events
- Designing an IAM framework with Oracle Identity and access management suite
- DevOpsSec : securing software through continuous delivery
- Developer's guide to web application security
- Digital forensics and cyber crime with Kali Linux fundamentals
- Digital forensics and incident response : an intelligent way to respond to attacks
- Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data
- Digital forensics for pentesters : hands-on learning
- Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
- Digital identity
- Digital resilience : is your company ready for the next cyber threat?
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding, steganography & watermarking
- Dissecting the hack : the V3rb0ten network
- Dissecting the hack : the f0rb1dd3n network
- Distributed Networks
- Docker security : using containers safely in production
- EVPN in the data center
- Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000
- Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
- Elsevier's dictionary of information security in English, German, French and Russian
- End-to-end network security : defense-in-depth
- Endpoint security
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Engineering trustworthy systems : get cybersecurity design right the first time
- Enterprise Single Sign-On design guide : using IBM Security Access Manager for Enterprise Single Sign-On 8.2
- Enterprise business portals II with IBM tivoli access manager
- Enterprise cloud security and governance : efficiently set data protection and privacy principles
- Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons
- Enterprise software security : a confluence of disciplines
- Essential cybersecurity science : build, test, and evaluate secure systems
- Ethereal : packet sniffing
- Ethical Hack
- Ethical hacking : learning the basics
- Ethical hacking : networks and websites
- Ethical hacking : orchestrating attacks
- Ethical hacking and penetration testing guide
- Ethical hacking masterclass
- Executive's guide to cyber risk : securing the future today
- Exploiting online games : cheating massively distributed systems
- FISMA and the risk management framework : the new practice of federal cyber security
- Finding your cyber security path
- Firewall policies and VPN configurations
- Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition
- Fixing an insecure software life cycle : practical techniques for building security into existing software development programs
- Foundations of Mac OS X Leopard security
- Foundations of information security : a straightforward introduction
- Foundations of modern networking : SDN, NFV, QoE, IoT, and Cloud
- Fraud detection without feature engineering
- Fuzzing : brute force vulnerabilty discovery
- GFI network security and PCI compliance power tools
- Getting started with IBM Hyper Protect Data Controller
- Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in tools
- Google hacking for penetration testers
- Google hacking for penetration testers, Volume 2
- Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systems
- Googling security : how much does Google know about you?
- Group theoretic cryptography
- Guide: : Reporting on an Entity's Cyberse
- HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONT
- Hack proofing your network
- Hack the stack : using snort and ethereal to master the 8 layers of an insecure network
- Hacking
- Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11
- Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10
- Hacking : the art of exploitation
- Hacking : the next generation
- Hacking VoIP
- Hacking exposed 7 : network security secrets & solutions
- Hacking exposed : malware and rootkits : security secrets & solutions
- Hacking exposed : mobile security secrets & solutions
- Hacking exposed : unified communications & VoIP security secrets & solutions
- Hacking exposed : web applications : web application security secrets and solutions
- Hacking for Dummies
- Hacking for dummies
- Hacking for dummies
- Hacking for dummies
- Hacking point of sale : payment application secrets, threats, and solutions
- Hacking the code : ASP.NET web application security
- Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques
- Hacking web performance : moving beyond the basics of web performance optimization
- Hacking with Kali : practical penetration testing techniques
- Handbook of SCADA/control systems security
- Handbook of information security , Volume 1, Key concepts, infrastructure, standards, and protocols
- Handbook of information security, Volume 2, Information warfare ; social, legal, and international issues ; and security foundations
- Handbook of information security, Volume 3, Threats, vulnerabilities, prevention, detection, and management
- Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
- Handbook on securing cyber-physical critical infrastructure : foundation and challenges
- Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation
- Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
- Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flaws
- Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
- Hands-on incident response and digital forensics
- Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools
- Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
- Hands-on pfSense 2.x for firewalls and routers
- Hands-on red team tactics : a practical guide to mastering red team operations
- Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps
- Hands-on threat modeling
- Hardening Cisco routers
- Hei ke wang luo ying yong : wang luo qin ru ying yong
- Homeland cybersecurity : assessing cyber threats and building resilience : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Seventeenth Congress, first session, February 10, 2021
- Honeypot : a new paradigm to information security
- Host integrity monitoring : using Osiris and Samhain
- How Lyft migrated to a service mesh with Envoy
- How cybersecurity really works : a hands-on guide for total beginners
- How to Cheat at Configuring Open Source Security Tools
- How to attack and defend your website
- How to break Web software : functional and security testing of Web applications and Web services
- How to cheat at VoIP security
- How to cheat at designing security for a Windows Server 2003 network
- How to cheat at securing your network
- How to defeat advanced malware : new tools for protection and forensics
- How to define and build an effective cyber threat intelligence capability
- How to hack like a ghost
- Hunting security bugs
- IBM DS8000 Encryption for data at rest, Transparent Cloud Tiering, and Endpoint Security (DS8000 Release 9.0)
- IBM QRadar Version 7.3 : planning and installation guide
- IBM Spectrum Protect Plus : practical guidance for deployment, configuration, and usage
- IBM Tivoli storage productivity center for replication for System z
- IBM system z9 109 technical introduction
- IBM z/OS V2R2 : security
- IPv6 security
- ISO 37001 : an Introduction to Anti-Bribery Management Systems
- ISO27001 / ISO27002 : a pocket guide / Alan Calder
- IT auditing : using controls to protect information assets
- IT auditing : using controls to protect information assets
- IT compliance and controls : best practices for implementation
- IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflage
- Identity and access management : business performance through connected intelligence
- Identity and data security for web development : best practices
- Implementing Cisco IOS network security (IINS)
- Implementing DirectAccess with Windows Server 2016
- Implementing NAP and NAC security technologies : the complete guide to network access control
- Implementing SSL/TLS using cryptography and PKI
- Incident Response : a Strategic Guide to Handling System and Network Security Breaches
- Incident response primer : how to keep from getting pwned too hard
- Industrial cybersecurity : efficiently secure critical infrastructure systems
- Information assurance : dependability and security in networked systems
- Information assurance handbook : effective computer security and risk management strategies
- Information security : principles and practices
- Information security : the complete reference
- Information security breaches : avoidance treatment based on ISO27001
- Information security handbook
- Information security handbook : develop a threat model and incident response strategy to build a strong information security framework
- Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
- Information security risk management for ISO27001/ISO27002
- Information theft prevention : theory and practice
- Inside network perimeter security
- Inside network security assessment : guarding your IT infrastructure
- Inside the Security Mind : Making the Tough Decisions
- Insider threat : protecting the enterprise from sabotage, spying, and theft
- Insider threat study : illicit cyber activity in the information technology and telecommunications sector
- Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day
- Integrated Security Systems Design : Concepts, Specifications, and Implementation
- Integrated Security Systems Design, 2nd Edition
- Integrated security technologies and solutions, Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security
- Integrated security technologies and solutions, Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization
- Integrating ISA Server 2006 with Microsoft Exchange 2007
- Intelligent systems for security informatics
- Internet Denial of Service: : Attack and Defense Mechanisms
- Internet security : a jumpstart for systems administrators and IT managers
- Introduction to computer and network security : navigating shades of gray
- Introduction to computer networks and cybersecurity
- Introduction to network security : theory and practice
- Intrusion detection networks : a key to collaborative security
- Intrusion detection with Snort
- Intrusion prevention fundamentals
- Investigating the Cyber Breach : the digital forensics guide for the network engineer
- IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices
- Iris biometric model for secured network access
- Is it safe? : protecting your computer, your business, and yourself online
- Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu
- Journal of cyber security & information systems
- Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
- Kali Linux tutorial for beginners
- Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
- Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing
- Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen
- Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen
- Kerberos : the definitive guide
- Kismet hacking
- Kubernetes security : operating Kubernetes clusters and applications safely
- Large scale network design : LiveLessons
- Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
- Learn Wireshark : Confidently Navigate the Wireshark Interface and Solve Real-World Networking Problems
- Learn ethical hacking from scratch
- Learn ethical hacking from scratch : your stepping stone to penetration testing
- Learn social engineering : learn the art of human hacking with an internationally renowned expert
- Learn social engineering from scratch
- Learn website hacking : penetration testing from scratch
- Learning Kali Linux : security testing, penetration testing, and ethical hacking
- Learning PHP security
- Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppet
- Learning Python for forensics : leverage the power of Python in forensic investigations
- Learning Python web penetration testing : automate web penetration testing activities using Python
- Learning Whitehat hacking and penetration testing
- Learning computer forensics
- Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks
- Learning network penetration testing with Kali Linux
- Learning network technology and security fundamentals
- Learning node embeddings in transaction networks
- Learning path : Networking for sysadmins
- Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests
- Linux essentials for cybersecurity lab manual
- Linux security and hardening : the practical security guide
- Linux security cookbook
- Linux troubleshooting course with real life examples
- Linux® hardening in hostile networks : server security from TLS to TOR
- MPLS VPN security
- Mac OS X security
- Mac Security Bible
- Malware : Fighting Malicious Code
- Malware diffusion models for modern complex networks : theory and applications
- Managing Cisco network security
- Managing Information Security Risks : the OCTAVESM Approach
- Managing Trust in Cyberspace
- Managing a network vulnerability assessment
- Managing information security
- Managing information security breaches : studies from real life
- Managing online risk : apps, mobile, and social media security
- Managing security with Snort and IDS tools
- Mapping security : the corporate security sourcebook for today's global economy
- Mastering Active Directory - Second Edition
- Mastering Active Directory - Third Edition
- Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016
- Mastering Azure security : keeping your Microsoft Azure workloads safe
- Mastering Kali Linux for Web penetration testing : test and evaluate all aspects of the design and implementation
- Mastering Kali Linux for advanced penetration testing : apply a proactive approach to secure your cyber infrastructure and enchance your pentesting skills
- Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkit
- Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenal
- Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
- Mastering System Center Data Protection Manager 2007
- Mastering Wireshark 2 : develop skills for network analysis and address a wide range of information security threats
- Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data
- Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments
- Mastering machine learning for penetration testing : develop an extensive skill set to break self-learning systems using Python
- Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
- Mastering network security
- Mastering reverse engineering : re-engineer your ethical hacking skills
- Maximum Security, Fourth Edition
- Maximum Security, Third Edition
- Microsoft
- Microsoft AZ-301 certification : Azure architect design
- Microsoft AZ-500 Certification : Azure Security Technologies
- Microsoft Azure security center
- Microsoft Enterprise Mobility and Security training
- Microsoft Forefront Threat Management Gateway 2010 : das Handbuch
- Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices
- Microsoft Internet security and acceleration (ISA) server 2004 administrator's pocket consultant
- Microsoft System Center Data Protection Manager 2007 with SP1
- Microsoft Windows XP networking and security : also covers Windows 2000
- Microsoft Windows server 2008 security resource kit
- Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management
- Microsoft forefront security administration guide
- Microsoft security fundamentals LiveLessons
- Microsoft windows security resource kit
- Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysis
- Monitoring anti-patterns
- Monitoring i bezpieczeństwo sieci
- Multi-site network and security services with NSX-T : implement network security, stateful services, and operations
- My online privacy for seniors
- NX-OS configuration fundamentals
- Nessus, Snort, & Ethereal power tools : customizing open source security applications
- Netcat power tools
- Network Attacks and Defenses : a Hands-on Approach
- Network Intrusion Detection, Third Edition
- Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats
- Network access control for dummies
- Network and data security for non-engineers
- Network and system security
- Network and system security
- Network defense and countermeasures : principles and practices
- Network forensics
- Network functions virtualization (NFV) with a touch of SDN
- Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
- Network performance and security : testing and analyzing using open source and low-cost tools
- Network scanning cookbook : practical network security using Nmap and Nessus 7
- Network security : a practical approach
- Network security : know it all
- Network security : private communications in a public world
- Network security architectures
- Network security assessment
- Network security assessment : from vulnerability to patch
- Network security auditing
- Network security bible
- Network security first-step
- Network security first-step
- Network security fundamentals
- Network security hacks
- Network security hacks
- Network security principles and practices
- Network security technologies and solutions
- Network security through data analysis : building situational awareness
- Network security through data analysis : from data to action
- Network security tools
- Network security with NetFlow and IPFIX : big data analytics for information security
- Network security with OpenSSL
- Network security with pfSense : architect, deploy, and operate enterprise-grade firewalls
- Netzsicherheit : Grundlagen & Protokolle - Mobile & drahtlose Kommunikation - Schutz von Kommunikationsinfrastrukturen
- Netzwerkangriffe von innen
- Netzwerkprotokolle hacken : Sicherheislücken verstehen, analysieren und schützen
- Netzwerksicherheit für Dummies
- Next generation SSH2 implementation : securing data in motion
- O'Reilly Security Conference 2016, Amsterdam, Netherlands
- O'Reilly Security Conference 2017, New York, NY
- O'Reilly Velocity Conference 2019, San Jose, California
- OSSEC host-based intrusion detection guide
- Once more unto the breach : managing information security in an uncertain world
- Once more unto the breach : managing information security in an uncertain world
- Open source intelligence methods and tools : a practical guide to online intelligence
- Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorow
- Orchestrating and automating security for the Internet of Things : delivering advanced security capabilities from Edge to Cloud for IoT
- PCI DSS : a Practical Guide to implementing and Maintaining Compliance
- PCI DSS : a pocket guide
- PCI DSS : a pocket guide
- PCI compliance : implementing effective PCI data security standards
- PCI compliance : understand and implement effective PCI data security standard compliance
- PCI compliance : understand and implement effective PCI data security standard compliance
- PCI compliance : understand and implement effective PCI data security standard compliance, third edition
- PKI uncovered
- Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis
- Penetration Testing Azure for Ethical Hackers
- Penetration tester's open source toolkit
- Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules
- Penetration testing : protecting networks and systems
- Penetration testing and network defense
- Penetration testing bootcamp : quickly get up and running with pentesting techniques
- Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes
- People-centric security : transforming your enterprise security culture
- Post-incident reviews : learning from failure for improved incident response
- Practical Industrial Internet of Things security : a practitioner's guide to securing connected industries
- Practical Windows forensics : leverage the power of digital forensics for Windows systems
- Practical anonymity : hiding in plain sight online
- Practical cloud security : a guide for secure design and deployment
- Practical cyber forensics : an incident-based approach to forensic investigations
- Practical cyber intelligence : how action-based intelligence can be an effective response to incidents
- Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments
- Practical embedded security : building secure resource-constrained systems
- Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
- Practical internet of things security : design a security framework for an Internet connected ecosystem
- Practical intrusion analysis : prevention and detection for the twenty-first century
- Practical monitoring : effective strategies for the real world
- Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus
- Practical risk management for the CIO
- Practical security : simple practices for defending your systems
- Practical security automation and testing : tools and techniques for automated security scanning and testing in DevSecOps
- Practical vulnerability management : a strategic approach to managing cyber risk
- Practical web penetration testing : secure web applications using Burp Suite, Nmap, Metasploit, and more
- Predicting malicious behavior : tools and techniques for ensuring global security