Filter
Datasikkerhet
Filter
Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threatsPurchase of the print or Kindle book includes a free PDF …
Over 100 recipes for penetration testing using Metasploit and virtual machines About This Book • Special focus on the latest operating systems, exploits, and penetration testing …
A comprehensive guide to building a deeper understanding of the product, its capabilities, and successful implementationPurchase of the print or Kindle book includes a free PDF …
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques …
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldKey FeaturesLearn …
Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malwareKey FeaturesInvestigate, detect, …
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to centralize all data in …
Get to grips with Microsoft’s enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book …
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscapeKey FeaturesUpdated for ransomware prevention, security …
Improve information security by learning Social Engineering. About This Book • Learn to implement information security using social engineering • Get hands-on experience of using …