Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Japanese  (2)
  • Computer networks ; Security measures
Datasource
Material
Language
Years
Keywords
  • 1
    Orig.schr. Ausgabe: 初版.
    Title: セキュリティエンジニアのための機械学習 : : AI技術によるサイバーセキュリティ対策入門 /
    Publisher: オライリー・ジャパン,
    ISBN: 9784873119076 , 4873119073
    Language: Japanese
    Pages: 1 online resource (312 pages)
    Edition: Shohan.
    Uniform Title: Mastering machine learning for penetration testing
    DDC: 005.8
    Keywords: Computer security ; Computer networks Security measures ; Penetration testing (Computer security) ; Machine learning ; Python (Computer program language) ; Computer networks ; Security measures ; Computer security ; Machine learning ; Penetration testing (Computer security) ; Python (Computer program language)
    Note: Includes bibiographical references , In Japanese.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Orig.schr. Ausgabe: 初版.
    Title: 実践bashによるサイバーセキュリティ対策 : : セキュリティ技術者のためのシェルスクリプト活用術 /
    Publisher: オライリー・ジャパン,
    ISBN: 9784873119052 , 4873119057
    Language: Japanese
    Pages: 1 online resource (352 pages)
    Edition: Shohan.
    Uniform Title: Cybersecurity Ops with bash
    DDC: 005.8
    Keywords: Computer security ; Computer networks Security measures ; Computer crimes Economic aspects ; Computer Security ; Sécurité informatique ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Criminalité informatique ; Aspect économique ; Computer networks ; Security measures ; Computer security ; Electronic books
    Abstract: If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations.
    Note: Online resource; title from title details screen (O’Reilly, viewed April 20, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...