Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 9166

Leverage Docker to deploying software at scale Key Features Leverage practical examples to manage containers efficiently Integrate with orchestration tools such as Kubernetes for controlled deployments Learn to implement best practices on improving efficiency and security of containers Book Description Docker is an open source platform for building, shipping, managing, and securing containers. Docker has become the... more...

Develop a solid understanding of the important command-line tools and utilities in Linux Key Features Delve into the fundamentals of Linux Explore and work with virtualization, command lines, and Bash shell scripts Use special file permission flags such as setuid and setgid Book Description Linux is a Unix-like operating system assembled under the model of free and open source software development and... more...

Your one-stop guide to learning and implementing Red Team tactics effectively Key Features Target a complex enterprise environment in a Red Team activity Detect threats and respond to them with a real-world cyber-attack simulation Explore advanced penetration testing tools and techniques Book Description Red Teaming is used to enhance security by performing simulated attacks on an organization in order to detect... more...

Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge... more...

Make the most of GCP's offerings to manage your data center workload and optimize deployments Key Features Discover new techniques to administer, manage, and deploy applications on GCP Understand effective solutions for storing, retrieving, and deploying your container images Explore various offerings of GCP for operations and security Book Description On-premise data centers are costly to manage. If you need a... more...


Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service. This fourth edition includes troubleshooting recipes for Windows Server 2012, Windows 8, and... more...

Discover network vulnerabilities and threats to design effective network security strategies Key Features Plunge into scanning techniques using the most popular tools Effective vulnerability assessment techniques to safeguard network infrastructure Explore the Nmap Scripting Engine (NSE) and the features used for port and vulnerability scanning Book Description Network scanning is a discipline of network security... more...

by Mohit
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1. Key Features Detect and avoid various attack types that put the privacy of a system at risk Leverage Python to build efficient code and eventually build a robust environment Learn about securing wireless applications and information... more...

Enhance file system security and learn about network attack, security tools and different versions of Linux build. Key Features Hands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use various security tools and different versions of Linux for different tasks Book Description Over the last few years, system security has gained a lot... more...

Start a career in networking Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of taking the CCENT Cisco Certified Entry Networking Technician ICND1 Exam 100-101? This book has you covered! With coverage of important topics and... more...