Sökt på: Böcker av Roger A. Grimes
totalt 16 träffar
Cryptography Apocalypse
Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in …
Hacking the Hacker
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, …
Fighting Phishing
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing …
Honeypots for Windows
Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a …
Hacking Multifactor Authentication
Protect your organization from scandalously easy-to-hack MFA security solutions Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. …
Professional Windows Desktop and Server Hardening
Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security productsEducates readers about the most …
Malicious Mobile Code
Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried …
Ransomware Protection Playbook
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, …
Hackear al hacker
Cada día, los hackers de sombrero blanco se encuentran con los de sombrero negro en el ciberespacio, batallando por el control de la tecnología que impulsa nuestro mundo. Los …
Hacking the Hacker
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, …
Honeypots for Windows
The Book will cover installing, configuring, and maintaining security Honeypots on Windows platforms. The Book will specifically cover the popular open source Honeypot product …
Cryptography Apocalypse
Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in …