Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Sebastopol, California] : O'Reilly Media, Inc.
    ISBN: 9781098145644 , 109814564X
    Language: English
    Pages: 1 online resource
    Edition: First edtion.
    Parallel Title: Erscheint auch als
    DDC: 005.8/7
    Keywords: Hacking ; Computer security
    Abstract: Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (50 pages)
    Edition: First edition.
    DDC: 005.1/12
    Keywords: Kubernetes ; Modular programming Computer programs ; Global software development Computer programs ; Open source software ; Component software
    Abstract: Zero trust is a security framework that relies on authenticating, authorizing, and continuously validating access for every transaction. For organizations that use Kubernetes to develop and deliver applications, zero trust is the only practical way to keep your systems safe from potential external and internal threats. This insightful report provides a high-level overview of what zero trust in Kubernetes looks like and why it's so important. Author Kim Crawley explains considerations specific to Kubernetes and describes best practices for implementing a zero trust model. With this architecture, all components in your Kubernetes system will be secured by default; no endpoint, server, application, or service will interact with anything else without proper authentication, authorization, and nonrepudiation. You'll learn how to: Secure computer systems with effective authentication and authorization functionality Use integrity verification to secure Kubernetes applications in zero trust architecture Create an observable state in your Kubernetes network for robust security monitoring Establish an effective zero trust architecture to run Kubernetes Initiate time management in a Kubernetes implementation Apply role-based access control to your Kubernetes network Establish end-to-end encryption for zero trust security Explore effective zero trust security scenarios with Kubernetes.
    Note: Online resource; title from title details screen (O'Reilly, viewed November 14, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (43 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Is your small-to-medium enterprise ready to leverage the power of the cloud? When used properly, the cloud can revolutionize your business. You can double your storage and bandwidth overnight by gaining access to a sizable high tech computer network without having to buy servers and additional networking equipment. But if your business is to thrive in the cloud with solid network performance and strong cybersecurity, you need sound professional advice. In this report, JumpCloud's cloud IT specialists share their insights on how to deploy your cloud network efficiently and effectively. You'll learn how to build your team; understand directory basics; examine your policies, best practices, and management frameworks; and build organizational tools for monitoring, troubleshooting, remediation, and running a helpdesk. This report examines a variety of needs you must fulfill to deploy a cloud network, including: Enabling secure identity and access management A robust cloud to address the challenges of employees working from home Providing well-organized directory services Efficient use of computing resources Ensuring full cloud visibility for auditing, compliance, and management Continuous, uninterrupted network uptime A fully modern directory-as-a-platform
    Note: Online resource; Title from title page (viewed November 25, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Wiley | Boston, MA : Safari
    ISBN: 9781119811237
    Language: English
    Pages: 1 online resource (224 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business , cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.
    Note: Online resource; Title from title page (viewed October 5, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Wiley | Boston, MA : Safari
    ISBN: 9781119684305
    Language: English
    Pages: 1 online resource (192 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties
    Note: Online resource; Title from title page (viewed November 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9781803248868 , 1803248866 , 9781803248486
    Language: English
    Pages: 1 online resource
    Edition: 1st edition.
    Parallel Title: Erscheint auch als
    DDC: 004.67/82
    Keywords: Cloud computing Security measures ; Cloud computing Testing ; Computer security
    Abstract: Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectively Key Features Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes) Get acquainted with the penetration testing tools and security measures specific to each platform Purchase of the print or Kindle book includes a free PDF eBook Book Description With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively. In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set. By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments. What you will learn Familiarize yourself with the evolution of cloud networks Navigate and secure complex environments that use more than one cloud service Conduct vulnerability assessments to identify weak points in cloud configurations Secure your cloud infrastructure by learning about common cyber attack techniques Explore various strategies to successfully counter complex cloud attacks Delve into the most common AWS, Azure, and GCP services and their applications for businesses Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentesting Who this book is for This book is for pentesters, aspiring pentesters, and red team members seeking specialized skills for leading cloud platforms--AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9781663732552 , 1663732558
    Language: English
    Pages: 1 online resource (1 sound file (11 hr., 18 min.))
    Edition: [First edition].
    DDC: 005.8
    Keywords: Hacking ; Hackers ; Computer literacy ; Computer science ; Piratage informatique ; Pirates informatiques ; Connaissances en informatique ; Informatique ; Audiobooks ; Livres audio
    Abstract: "Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like ""knowledge should be free""; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminals.".
    Note: Online resource; title from title details screen (O'Reilly, viewed January 17, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...