Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Linux essentials for cybersecurity lab manual, Rothwell, William


Варианты приобретения
Цена: 6684.00р.
Кол-во:
 о цене
Наличие: Отсутствует. Возможна поставка под заказ.

При оформлении заказа до: 2025-08-04
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Rothwell, William
Название:  Linux essentials for cybersecurity lab manual
ISBN: 9780789760555
Издательство: Pearson Education
Издательство: Pearson education (us)
Классификация:



ISBN-10: 078976055X
Обложка/Формат: Paperback
Страницы: 160
Вес: 0.36 кг.
Дата издания: 01.10.2018
Язык: English
Размер: 203 x 252 x 10
Читательская аудитория: Professional & vocational
Рейтинг:
Поставляется из: Англии
Описание: This lab manual accompanies the textbook Linux Essentials for Cybersecurity, which teaches people how to use Linux systems and ensures that the Linux systems they work on are as secure as possible.


To really become a Linux cybersecurity expert, you need practice.


In this book, there are three different types of labs to practice your skills:

  • Labs in which you are presented with a short problem that requires only a single operation to complete.
  • Labs that are more complex but in which we provide you with a guide to perform each step, one at a time.
  • Scenario labs in which you are asked to solve a problem entirely on your own. These labs are designed to pose a greater challenge.
No matter the type, these labs are designed to be performed on live Linux systems to give you hands-on practice and develop critical thinking and complex problem-solving skills.




SIMD Programming Manual for Linux and Windows

Автор: Cockshott Paul, Renfrew Kenneth
Название: SIMD Programming Manual for Linux and Windows
ISBN: 185233794X ISBN-13(EAN): 9781852337940
Издательство: Springer
Рейтинг:
Цена: 14184.00 р. 20263.00 -30%
Наличие на складе: Есть (1 шт.)
Описание: The book is intended as a programmer’s introduction to the use of SIMD on PCs. It presents the underlying technology of SIMD processing on current PCs and looks at tools to exploit this including the Intel SIMD library and the Parallel Processing Language Vector Pascal. It explains how to cast algorithms in parallel to exploit the parallel processing capability of standard PCs obtaining large performance gains relative to conventional sequential compilers. It assumes a familiarity with imperative programming but not specifically with Pascal. It does not assume any prior familiarity with the SIMD programming model. The language translation system will be available either as a downloadable for Linux or Windows in association with the book. This book will be particularly useful for programmers in the rapidly growing area of games and multi-media entertainment, and it would also to academics interested in parallel programming techniques or array programming languages.

Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including

Автор: Scripting Alan
Название: Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including
ISBN: 191410501X ISBN-13(EAN): 9781914105012
Издательство: Неизвестно
Рейтинг:
Цена: 3028.00 р.
Наличие на складе: Нет в наличии.

Описание:

You Are A Few Steps Away From Securing Your Online Transactions And Hacking Your Data Will Be A Thing Of The Past


Do you know that hackers are big threats to your business only and they are ready to damage and destroy you and your data by snooping at everything you are doing without knowing anything?Do you want to give yourself peace of mind, freedom, choice, and security in all your dealings on the internet? Do you want to know how you can protect your server and your data no matter how skillful a hacker can be?


This easy-to-use, step-by-step book goes a step further to show you about different techniques and methods as well as ways hackers can get into your network, steal your data, and cause severe damages to you. No matter what you do online, some bad actors are keeping a close look at you, ready to devour you and your assets.

If you are tired of spinning the wheel about your security online, buy this book. Its approach draws from various ways, guidelines, tips, and examples about how hackers can tap into any form of your vulnerabilities on the internet and steal your data. This book teaches how you can secure yourself from these bad actors so they will never crack into your network. What are the steps to take so you can be safe and secure? This book walks you through the entire process.


Some of the things that this book discusses include:

  • Deep understanding of hacking and hackers
  • Different types of hackers and how they operate
  • The process of hacking
  • How to prepare before hacking (with the detailed process)
  • The five phases of hacking
  • How you can delete tracks in a system and stay anonymous
  • How you can become exposed to the internet
  • The process of installing Kali Linux
  • How you can work with Kali Linux
  • What is a wireless network and how you can scan networks and servers
  • Everything you need to know about WEP cracking and the tools to do the job
  • The best way you can use to install Nmap on Linux
  • How you can understand the risks your system is facing
  • How to know your enemies on the internet and how you can win when you have the right tools
  • Everything you need to know about wireless hacking domination as well as testing methodology and the best tools for the job
  • How you can crack WEP/WPA encryptions
  • What are the hacking techniques?
  • How you can scan and map your network
  • How you can defend against attacks
  • Some facts you need to know about cybersecurity and cyber-attacks
  • What is cryptography, and how does it work?
  • Symmetric and asymmetric encryption
  • Different ways you can use to secure important files online without hacking coming near them not to talk of touching them
  • How you can use VPN to protect internet traffic
  • How you can crack the encryption
  • What are the flaws in web applications and websites

Plus tons of more examples and details.


If you'd like to know new ways hackers manipulate their ways into your server and how you can guard against these attacks, buy this book

If you'd like to know everything about framework attacks and penetration testing measures, buy this book

If you'd like to know simple yet powerful ways to protect your website so it can run smoothly without the fear of perpetrators, buy this book

Not only will this book change your life forever, but it will also change the way you look at online security, hackers, and how you need to stay secure online


Get your copy of this book by clicking the "Buy Now" button

Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including

Автор: Scripting Alan
Название: Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including
ISBN: 1914105095 ISBN-13(EAN): 9781914105098
Издательство: Неизвестно
Рейтинг:
Цена: 4551.00 р.
Наличие на складе: Нет в наличии.

Описание:

You Are A Few Steps Away From Securing Your Online Transactions And Hacking Your Data Will Be A Thing Of The Past


Do you know that hackers are big threats to your business only and they are ready to damage and destroy you and your data by snooping at everything you are doing without knowing anything?Do you want to give yourself peace of mind, freedom, choice, and security in all your dealings on the internet? Do you want to know how you can protect your server and your data no matter how skillful a hacker can be?


This easy-to-use, step-by-step book goes a step further to show you about different techniques and methods as well as ways hackers can get into your network, steal your data, and cause severe damages to you. No matter what you do online, some bad actors are keeping a close look at you, ready to devour you and your assets.

If you are tired of spinning the wheel about your security online, buy this book. Its approach draws from various ways, guidelines, tips, and examples about how hackers can tap into any form of your vulnerabilities on the internet and steal your data. This book teaches how you can secure yourself from these bad actors so they will never crack into your network. What are the steps to take so you can be safe and secure? This book walks you through the entire process.


Some of the things that this book discusses include:

  • Deep understanding of hacking and hackers
  • Different types of hackers and how they operate
  • The process of hacking
  • How to prepare before hacking (with the detailed process)
  • The five phases of hacking
  • How you can delete tracks in a system and stay anonymous
  • How you can become exposed to the internet
  • The process of installing Kali Linux
  • How you can work with Kali Linux
  • What is a wireless network and how you can scan networks and servers
  • Everything you need to know about WEP cracking and the tools to do the job
  • The best way you can use to install Nmap on Linux
  • How you can understand the risks your system is facing
  • How to know your enemies on the internet and how you can win when you have the right tools
  • Everything you need to know about wireless hacking domination as well as testing methodology and the best tools for the job
  • How you can crack WEP/WPA encryptions
  • What are the hacking techniques?
  • How you can scan and map your network
  • How you can defend against attacks
  • Some facts you need to know about cybersecurity and cyber-attacks
  • What is cryptography, and how does it work?
  • Symmetric and asymmetric encryption
  • Different ways you can use to secure important files online without hacking coming near them not to talk of touching them
  • How you can use VPN to protect internet traffic
  • How you can crack the encryption
  • What are the flaws in web applications and websites

Plus tons of more examples and details.


If you'd like to know new ways hackers manipulate their ways into your server and how you can guard against these attacks, buy this book

If you'd like to know everything about framework attacks and penetration testing measures, buy this book

If you'd like to know simple yet powerful ways to protect your website so it can run smoothly without the fear of perpetrators, buy this book

Not only will this book change your life forever, but it will also change the way you look at online security, hackers, and how you need to stay secure online


Get your copy of this book by clicking the "Buy Now" button

A Leader`s Guide to Cybersecurity: Why Boards Need to Lead--And How to Do It

Автор: Parenty Thomas, Domet Jack
Название: A Leader`s Guide to Cybersecurity: Why Boards Need to Lead--And How to Do It
ISBN: 1633697991 ISBN-13(EAN): 9781633697997
Издательство: NBN International
Рейтинг:
Цена: 5280.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe.

Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide.

Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable net that covers everything an organization does--from its business operations, models, and strategies to its products and intellectual property. And boards are in the best position to oversee the needed changes to strategy and hold their companies accountable. Not surprisingly, many boards aren't prepared to assume this responsibility.

In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who have spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. This includes:

  • Understanding cyber risks and how best to control them
  • Planning and preparing for a crisis--and leading in its aftermath
  • Making cybersecurity a companywide initiative and responsibility
  • Drawing attention to the nontechnical dynamics that influence the effectiveness of cybersecurity measures
  • Aligning the board, executive leadership, and cybersecurity teams on priorities

Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.

Linux Essentials Study Guide: Exam 010 V1.6

Автор: Bresnahan Christine, Blum Richard
Название: Linux Essentials Study Guide: Exam 010 V1.6
ISBN: 1119657695 ISBN-13(EAN): 9781119657699
Издательство: Wiley
Рейтинг:
Цена: 6018.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Analyzes Chile`s political economy over the last 30 years and the country`s attempt to build a market society in a highly inegalitarian society, now as a member country of the Organization for Economic Cooperation and Development (OECD). It documents the growing concentration of economic power among small groups of elites in Chile and discusses the limits of the democratic system post-Pinochet.

Linux: 2 in 1: Beginners guide + command line Understand the basics and essentials of security, networking, administration an

Автор: Blunt Jason
Название: Linux: 2 in 1: Beginners guide + command line Understand the basics and essentials of security, networking, administration an
ISBN: 1914092201 ISBN-13(EAN): 9781914092206
Издательство: Неизвестно
Рейтинг:
Цена: 4000.00 р.
Наличие на складе: Нет в наличии.

Описание: If you are interested in learning more about Linux, then keep reading...



Linux is a technical topic, and is especially difficult to grasp for a beginner. Learning a new operating system, command lines, and a new environment to work on and deal with every day can be frustrating. But, it's possible to simplify this process with a step-by-step approach.


Here you are going to learn:


The basics of LinuxHow to install itBasic command lines you'll use oftenExercises to get started and improve your knowledge
  1. FAQ


  • Can I start programming after reading this book?


Yes. This book includes basics command lines to start programming even as a beginner.


  • Are there many technical concepts to learn about?


This book includes all the basics about Linux in a simplified and easy-to-understand manner.


  • Does this book have a focus on practical application?


Yes, the book includes many exercises to practice and improve your skills in Linux programming.


SCROLL UP AND CLICK ON THE "BUY NOW" BUTTON


Lab Manual for Eckert`s Linux+ Guide to Linux Certification, 3rd

Автор: Eckert
Название: Lab Manual for Eckert`s Linux+ Guide to Linux Certification, 3rd
ISBN: 1111541558 ISBN-13(EAN): 9781111541552
Издательство: Cengage Learning
Рейтинг:
Цена: 10453.00 р.
Наличие на складе: Нет в наличии.

Описание: The Lab Manual provides students with the hands-on instruction necessary to prepare for the certification exam. Designed for classroom-led or self-paced study, labs complement main text content and offer a unique, practical approach to learning that is a key component to the exams.

Hacking with Kali Linux: A Beginner`s Guide to Ethical Hacking with Kali & Cybersecurity, Includes Linux Command Line, Penetration Testing, Sec

Автор: Fletcher Stephen
Название: Hacking with Kali Linux: A Beginner`s Guide to Ethical Hacking with Kali & Cybersecurity, Includes Linux Command Line, Penetration Testing, Sec
ISBN: 191392274X ISBN-13(EAN): 9781913922740
Издательство: Неизвестно
Рейтинг:
Цена: 2479.00 р.
Наличие на складе: Нет в наличии.

Описание: By the time you come to the end of this book, you will have mastered the basics of computer hacking alongside many advanced concepts in social engineering attack mechanisms.

Hacking with Kali Linux. A Guide to Ethical Hacking: A Beginner`s Guide with Practical Examples to Learn the Basics of Cybersecurity and Ethical Hacki

Автор: Nowak Grzegorz
Название: Hacking with Kali Linux. A Guide to Ethical Hacking: A Beginner`s Guide with Practical Examples to Learn the Basics of Cybersecurity and Ethical Hacki
ISBN: 1801137730 ISBN-13(EAN): 9781801137737
Издательство: Неизвестно
Рейтинг:
Цена: 3476.00 р.
Наличие на складе: Поставка под заказ.

Описание:

▶ Are you interested in learning more about hacking and how you can use these techniques to keep yourself and your network as safe as possible?

▶ Would you like to work with Kali Linux to protect your network and to make sure that hackers are not able to get onto your computer and cause trouble or steal your personal information?

▶ Have you ever been interested in learning more about the process of hacking, how to avoid being taken advantage of, and how you can use some of techniques for your own needs?

This guidebook is going to provide us with all of the information that we need to know about Hacking with Linux. Many people worry that hacking is a bad process and that it is not the right option for them. The good news here is that hacking can work well for not only taking information and harming others but also for helping you keep your own network and personal information as safe as possible.

Inside this guidebook, we are going to take some time to explore the world of hacking, and why the Kali Linux system is one of the best to help you get this done. We explore the different types of hacking, and why it is beneficial to learn some of the techniques that are needed to perform your own hacks and to see the results that we want with our own networks.

In this guidebook, we will take a look at a lot of the different topics and techniques that we need to know when it comes to working with hacking on the Linux system. Some of the topics that we are going to take a look at here include:

  • The different types of hackers that we may encounter and how they are similar and different.
  • How to install the Kali Linux onto your operating system to get started.
  • The basics of cybersecurity, web security, and cyberattacks and how these can affect your computer system and how a hacker will try to use you.
  • The different types of malware that hackers can use against you.
  • How a man in the middle, DoS, Trojans, viruses, and phishing can all be tools of the hacker.
  • And so much more.

Hacking is often an option that most people will not consider because they worry that it is going to be evil, or that it is only used to harm others. But as we will discuss in this guidebook, there is so much more to the process than this.

Hacking with Kali Linux: Master Ethical Hacking and Improve Cybersecurity with a Beginner`s Guide. Step-by-Step Tools and Methods Including Bas

Автор: Coding Mark
Название: Hacking with Kali Linux: Master Ethical Hacking and Improve Cybersecurity with a Beginner`s Guide. Step-by-Step Tools and Methods Including Bas
ISBN: 1801153450 ISBN-13(EAN): 9781801153454
Издательство: Неизвестно
Рейтинг:
Цена: 2752.00 р.
Наличие на складе: Нет в наличии.

Описание:

Are you interested in finding new and effective ways to keep your system safe and secure?Do you want to make sure you are not going to be attacked online, and that you won't have to worry about your personal or financial information getting into the wrong hands?

Are you worried about some of the attacks and the headlines going around right now concerning data breaches and hackers, and you want to make sure you stay safe and secure?

The Kali Linux operating system is one of the best options to work with when you are ready to try out some hacking in an ethical and safe manner.

Using some of the same techniques that many hackers are going to rely on, you can learn some of the different methods they are going to use, and figure out where your potential vulnerabilities are right from the start. When you know where these vulnerabilities are, it is so much easier to fix them and keep your network as safe as possible.


Inside this guidebook, we are going to spend some time taking a look at the Kali Linux system and how we are able to use it to help with protecting our systems. From learning how to work with a VPN to completing our own penetration test and network scan, this system is going to help keep you as safe and secure as possible. Some of the different topics we will explore to help out with this goal include:


-History of Kali Linux and some of the benefits of working with this operating system.

-Some of the basics and the commands you need to use in order to get started with this language.

-How to download and install the Kali Linux operating system.

-The importance of working on your cybersecurity and keeping your system safe.

-How to handle your own penetration testing to make sure your computer system is safe and to figure out where we can fix some vulnerabilities

-The different types of hackers we need to be aware of and how they all work differently from one another.

-The different types of attacks that can happen when we are going to work with a hacker and that we need to be prepared for.

-Some of the steps you are able to take in order to keep your system safe and secure from others.


Protecting your system and your computer safe from hackers can be important in ensuring your personal information is going to stay as safe and secure as possible. When you are ready to learn how to use the Kali Linux operating system, to make this happen, make sure to check out this guidebook to help you get started.


Cybersecurity :

Автор: Harvard Business Review
Название: Cybersecurity :
ISBN: 1633697878 ISBN-13(EAN): 9781633697874
Издательство: TBS/GBS
Рейтинг:
Цена: 2968.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

No data is completely safe.

Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone's responsibility, from the boardroom to the break room.

Cybersecurity: The Insights You Need from Harvard Business Review brings you today's most essential thinking on cybersecurity, from outlining the challenges to exploring the solutions, and provides you with the critical information you need to prepare your company for the inevitable hack. The lessons in this book will help you get everyone in your organization on the same page when it comes to protecting your most valuable assets.

Business is changing. Will you adapt or be left behind?
Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues--blockchain, cybersecurity, AI, and more--each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas--and prepare you and your company for the future.

Red Hat Enterprise Linux 8 Essentials: Learn to Install, Administer and Deploy RHEL 8 Systems

Автор: Smyth Neil
Название: Red Hat Enterprise Linux 8 Essentials: Learn to Install, Administer and Deploy RHEL 8 Systems
ISBN: 0986027391 ISBN-13(EAN): 9780986027390
Издательство: Неизвестно
Рейтинг:
Цена: 6803.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Arguably one of the most highly regarded and widely used enterprise level operating systems available today is the Red Hat Enterprise Linux 8 distribution. Not only is it considered to be among the most stable and reliable operating systems, it is also backed by the considerable resources and technical skills of Red Hat, Inc.

Red Hat Enterprise Linux 8 Essentials is designed to provide detailed information on the installation, use and administration of the Red Hat Enterprise Linux 8 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers and installing packages and system updates using App Streams. Additional installation topics such as dual booting with Microsoft Windows are also covered, together with all important security topics such as configuring a firewall and user and group administration.

For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия