Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey, 3rd Edition, 2020
Third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by industry experts, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
#book #cisco
Third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by industry experts, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
#book #cisco
👍5
Network Security, Firewall and VPNs.pdf
26.2 MB
Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey, 3rd Edition, 2020
👍6
Malware Sandboxing (Build your own Sandbox) by Mostafa Yahia
The guide provides an introduction to both static and dynamic malware analysis tools and techniques, which can be useful for SOC analysts, information security analysts, and investigators who want to learn how to perform initial malware analysis.
By following the steps outlined in this guide, you can learn how to build your own sandbox and use various tools to analyze malware.
This knowledge can help you better understand the behavior of malware and how to detect and respond to it in a timely manner.
#malware
The guide provides an introduction to both static and dynamic malware analysis tools and techniques, which can be useful for SOC analysts, information security analysts, and investigators who want to learn how to perform initial malware analysis.
By following the steps outlined in this guide, you can learn how to build your own sandbox and use various tools to analyze malware.
This knowledge can help you better understand the behavior of malware and how to detect and respond to it in a timely manner.
#malware
👍5
Malware Sandboxing (Build your own Sandbox).pdf
2.4 MB
Malware Sandboxing (Build your own Sandbox) by Mostafa Yahia
👍6❤2
Cybersecurity Checklist by NIST Framework
This handy task checklist is based on the NIST Framework. For each item, it has a checkbox labeled CURRENT ASSESSMENT with another labeled YEAR 1 ASSESSMENT
#docs
This handy task checklist is based on the NIST Framework. For each item, it has a checkbox labeled CURRENT ASSESSMENT with another labeled YEAR 1 ASSESSMENT
#docs
👍4
Секреты Python. 59 рекомендаций по написанию эффективного кода, А.Г. Гузикевич, Бретт Слаткин, 2016
Книга приобщит вас к стилю программирования, выдержанному в истинном "духе Python", и поможет научиться писать исключительно надежный и высокопроизводительный код.
Используя сжатый стиль изложения, пионером которого был Скотт Мейерс, автор приводит 59 описаний лучших методик программирования, дает советы и показывает кратчайшие пути решения различных задач.
#book #python
Книга приобщит вас к стилю программирования, выдержанному в истинном "духе Python", и поможет научиться писать исключительно надежный и высокопроизводительный код.
Используя сжатый стиль изложения, пионером которого был Скотт Мейерс, автор приводит 59 описаний лучших методик программирования, дает советы и показывает кратчайшие пути решения различных задач.
#book #python
👍5
sekrety_python_59.pdf
8.9 MB
Секреты Python. 59 рекомендаций по написанию эффективного кода, А.Г. Гузикевич, Бретт Слаткин, 2016
👍5
JavaScript for hackers. Learn to think like a hacker by Gareth Heyes, 2022
Have you ever wondered how a hacker approaches finding flaws in the browser and JavaScript? This book shares the thought processes and gives you tools to find your own flaws. It shares the basics of JavaScript hacking, then dives in and explains how to construct JavaScript payloads that don't use parentheses.
(+) Shows how you can find flaws with fuzzing and how to quickly fuzz millions of characters in seconds.
(+) Want to hack the DOM? This book has you covered.
(+) Read about various browser SOP bypasses that the author found in detail.
(+) No idea about client-side prototype pollution? This is the book for you!
(+) Want to learn the latest & greatest XSS techniques? You need to buy this book.
#book #AppSec
Have you ever wondered how a hacker approaches finding flaws in the browser and JavaScript? This book shares the thought processes and gives you tools to find your own flaws. It shares the basics of JavaScript hacking, then dives in and explains how to construct JavaScript payloads that don't use parentheses.
(+) Shows how you can find flaws with fuzzing and how to quickly fuzz millions of characters in seconds.
(+) Want to hack the DOM? This book has you covered.
(+) Read about various browser SOP bypasses that the author found in detail.
(+) No idea about client-side prototype pollution? This is the book for you!
(+) Want to learn the latest & greatest XSS techniques? You need to buy this book.
#book #AppSec
👍5❤1
javanoscriptforhackers.pdf
2.4 MB
JavaScript for hackers. Learn to think like a hacker by Gareth Heyes, 2022
👍7❤1🔥1
Keycloak – Identity and Access Management for Modern Applications, second edition by Stian Thorgersen and
Pedro Igor Silva, 2023
Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications. Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.
#book
Pedro Igor Silva, 2023
Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications. Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.
#book
👍5
Packt.Keycloak.pdf
7.8 MB
Keycloak – Identity and Access Management for Modern Applications, second edition by Stian Thorgersen and
Pedro Igor Silva, 2023
Pedro Igor Silva, 2023
👍5
Ethical Hacking with Go programming language: Build tools, Fahad Sarwar, Udemy, 2020
Learn Hacking from Scratch with Go programming language, Build tools for Ethical hacking
Official page
Russian denoscription
#education #coding
Learn Hacking from Scratch with Go programming language, Build tools for Ethical hacking
Official page
Russian denoscription
#education #coding
👍4🔥2
Этический взлом с Go (2020).zip
3.4 GB
Ethical Hacking with Go programming language: Build tools, Fahad Sarwar, Udemy, 2020
👍4❤3
Как составить качественное резюме для поиска работы в «первом мире», 2023
Результат 1,5 лет бесплатных консультаций — теперь в формате краткого руководства
Автор — technical product manager из Берлина, 6 лет опыта работы в Германии. Помог уже 20 людям найти работу в разных странах Европы.
Контакты автора: cv.guide.2023@gmail.com или в In.sta.gram @typemismatch
#job
Результат 1,5 лет бесплатных консультаций — теперь в формате краткого руководства
Автор — technical product manager из Берлина, 6 лет опыта работы в Германии. Помог уже 20 людям найти работу в разных странах Европы.
Контакты автора: cv.guide.2023@gmail.com или в In.sta.gram @typemismatch
#job
👍8🤡7🔥3