You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Find security flaws in any architecture effectively through emulation and fuzzing with QEMU and AFL Purchase of the print or Kindle book includes a free PDF eBook Key Features Understand the vulnerability landscape and useful tools such as QEMU and AFL Explore use cases to find vulnerabilities and execute unknown firmware Create your own firmware emulation and fuzzing environment to discover vulnerabilities Book Description Emulation and fuzzing are among the many techniques that can be used to improve cybersecurity; however, utilizing these efficiently can be tricky. Fuzzing Against the Machine is your hands-on guide to understanding how these powerful tools and techniques work. Using a var...
Science and Empire in the Atlantic World is the first book in the growing field of Atlantic Studies to examine the production of scientific knowledge in the Atlantic world from a comparative and international perspective. Rather than focusing on a specific scientific field or single national context, this collection captures the multiplicity of practices, people, languages, and agendas that characterized the traffic in knowledge around the Atlantic world, linking this knowledge to the social processes fundamental to colonialism, such as travel, trade, ethnography, and slavery.
Plan, design, and build resilient security architectures to secure your organization's hybrid networks, cloud-based workflows, services, and applications Key Features Understand the role of the architect in successfully creating complex security structures Learn methodologies for creating architecture documentation, engaging stakeholders, and implementing designs Understand how to refine and improve architecture methodologies to meet business challenges Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionCybersecurity architecture is the discipline of systematically ensuring that an organization is resilient against cybersecurity threats. Cybersecurity architects w...
Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation with this comprehensive guide Key Features Gain hands-on experience with reputable and reliable tools such as KAPE and FTK Imager Explore artifacts and techniques for successful cybercrime investigation in Microsoft Teams, email, and memory forensics Understand advanced browser forensics by investigating Chrome, Edge, Firefox, and IE intricacies Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIn this digitally driven era, safeguarding against relentless cyber threats is non-negotiable. This guide will enable you to enhance your skills a...
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale Key Features Use the ethical hacking methodology and thought process to perform a successful ethical hack Explore the various stages of an ethical hack and the tools related to each phase Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionThe Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools. By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understand...
Take your penetration testing career to the next level by discovering how to set up and exploit cost-effective hacking lab environments on AWS, Azure, and GCP Key Features Explore strategies for managing the complexity, cost, and security of running labs in the cloud Unlock the power of infrastructure as code and generative AI when building complex lab environments Learn how to build pentesting labs that mimic modern environments on AWS, Azure, and GCP Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionThe significant increase in the number of cloud-related threats and issues has led to a surge in the demand for cloud security professionals. This book will help yo...
This volume aims to show through various case studies how the interrelations between Jews, Muslims and Christians in Iberia were negotiated in the field of images, objects and architecture during the Later Middle Ages and Early Modernity. . By looking at the ways pre-modern Iberians envisioned diversity, we can reconstruct several stories, frequently interwoven with devotional literature, poetry or Inquisitorial trials, and usually quite different from a binary story of simple opposition. The book’s point of departure narrates the relationship between images and conversions, analysing the mechanisms of hybridity, and proposing a new explanation for the representation of otherness as the complex outcome of a negotiation involving integration. Contributors are: Cristelle Baskins, Giuseppe Capriotti, Ivana Čapeta Rakić, Borja Franco Llopis, Francisco de Asís García García, Yonatan Glazer-Eytan, Nicola Jennings, Fernando Marías, Elena Paulino Montero, Maria Portmann, Juan Carlos Ruiz Souza, Amadeo Serra Desfilis, Maria Vittoria Spissu, Laura Stagno, Antonio Urquízar-Herrera.
Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud security monitoring from scratch Key Features Get a thorough overview of Wazuh’s features and learn how to make the most of them Detect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behavior Build a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPR Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionExplore the holistic solution that Wazuh offers to improve your organization’s cybersecurity posture with this insightful guide. Security...
A practical guide to establishing a risk-based, business-focused information security program to ensure organizational success Key Features Focus on business alignment, engagement, and support using risk-based methodologies Establish organizational communication and collaboration emphasizing a culture of security Implement information security program, cybersecurity hygiene, and architectural and engineering best practices Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionInformation Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional ...