white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Cybersecurity Incident & Vulnerability Response Playbooks Operational by Cybersecurity and Infrastructure Security Agency, 2023

Procedures for Planning and Conducting Cybersecurity Incident and Vulnerability Response Activities in FCEB Information Systems

#docs
👍4
Cybersecurity_Incident_&_Vulnerability_Response_Playbooks.pdf
1.1 MB
Cybersecurity Incident & Vulnerability Response Playbooks Operational by Cybersecurity and Infrastructure Security Agency, 2023
🔥2
Forwarded from CyberSecBastion
Introduction to Kubernetes by Vikram IoT Application Dev, 2023

#K8s
👍3
Forwarded from CyberSecBastion
Introduction to Kubernetes_pdf.pdf
7.5 MB
Introduction to Kubernetes by Vikram IoT Application Dev, 2023
👍1
Forwarded from CyberSecBastion
Kubernetes Best Practices by Microsoft, 2023 (e-book series)

This guide gives recommendations around multi-tenancy, security, network and storage, and running enterprise-ready workloads. It is aimed at developers and application owners who are familiar with Kubernetes and have a good understanding of Azure Kubernetes Service (AKS) core concepts. The following best practices are based on real-world deployments of Kubernetes that we have gathered directly from our experience in the field.

#K8s
👍3
Forwarded from CyberSecBastion
Kubernetes Best Practices_Microsoft_2023.pdf
2.4 MB
Kubernetes Best Practices by Microsoft, 2023 (e-book series)
👍1
CEH – Certification Guide - updated 8-5-21

Here is the Latest Exam practice questions and answers for the CEH Certification Exam (with detailed explanation to each of the answers), Crafted by expert.

#docs
👍5
CEH – Certification Guide - updated 8-5-21.pdf
7.2 MB
CEH – Certification Guide - updated 8-5-21
👍6
Blockchain Security from the Bottom Up - Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, Howard E. Poston III, 2023

You’ll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.

You’ll also find:

(+) Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem
(+) Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts
(+) Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of work

#book
👍5
Blockchain.Security.from.the.Bottom.Up.pdf
8 MB
Blockchain Security from the Bottom Up - Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, Howard E. Poston III, 2023
👍5
🔥6😢3🤔1😱1
Windows Privileges HD_[w2hack].png
3.1 MB
Windows Privileges HD (PNG) for download
👍4🤔2😢1