FreeBSD群魔亂舞
1,408円 「FreeBSD群魔亂舞」一書最主要的寫作目地是橋接其他電腦作業系統使用者,一起墜進深入FreeBSD這套 Unix 類電腦開機作業系統的魔窟,以期將來完全使用FreeBSD作業系統來滿足完成讀者所有的電腦作業需求產生熱戀此系統的作用。 最後發揚光大這套優秀的作業系統市場佔有率,看看能不能捍動圖利為主的商業軟體發展公司,去...
Setup of a Graphical User Interface Deskt...
1,300円 Cloud Platforms provide VM images in the Linux OS as well. Linux has always been operated via terminal or shell through a keyboard and a terminal. Even with GUIs around, Linux continues to be operated from the shell. Linux VMs are also operated from the command line of your desktop via an SSH (se...
Review of the Specifications and Features...
1,734円 A smartphone is a portable device that combines mobile telephone and computing functions into one unit. It is a cellular telephone with an integrated computer and other features not originally associated with telephones such as an operating system, web browsing, multimedia functionality, the abil...
Review of the Specifications and Features...
1,907円 A smartphone is a portable device that combines mobile telephone and computing functions into one unit. It is a cellular telephone with an integrated computer and other features not originally associated with telephones such as an operating system, web browsing, multimedia functionality, the abil...
The Executive's Cybersecurity Advisor
2,113円 Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and go undetected. These attacks succeed; they steal data and disrupt organizations. The fact that attacks succeed makes Response the most business-critical discipline. Prevention and Detec...
Agile Security Operations
5,073円 Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile threat intelligence Key Features • Explore robust and predictable security operations based on measurable service performance • Learn how to improve the security posture and work on se...
Corporate Cybersecurity
15,056円 CORPORATE CYBERSECURITY An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits a...
Ransomware Protection Playbook
2,695円 Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran an...
Cybersafe For Humans
1,000円 Are you ready to protect your online life but don't know where to start? From keeping your kids and finances safe on the internet to stopping your sex toys from spying on you, Cybersafe For Humans gives you examples and practical, actionable advice on cybersecurity and how to stay safe online. Th...
Cybersafe for Business
1,000円 By the time you finish reading this, your business could be a victim of one of the hundreds of cyber attacks that are likely to have occured in businesses just like yours. Are you ready to protect your business online but don't know where to start? These days, if you want to stay in business, you...
Advanced Cybersecurity Technologies
12,103円 Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides o...
Hands-on Incident Response and Digital Fo...
5,834円 Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and bal...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!