Słuchaj i czytaj

Witaj w nieskończonym świecie literatury

  • Czytaj i słuchaj jak chcesz i ile chcesz
  • Ponad 500 000 tytułów
  • Tytuły dostępne wyłącznie w Storytel oraz Storytel Originals
  • 7-dniowy bezpłatny okres próbny
  • Łatwa rezygnacja w dowolnym momencie
Wypróbuj
PL - Details page - Device banner - 894x1036

Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments

Język
angielski
Format
Kategoria

Literatura Faktu

Tagi

    Inni polubili także ...

    1. An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments Kushantha Gunawardana
    2. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Benjamin Kovacevic
    3. The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs Jeremy Thompson
    4. Implementing DevSecOps Practices: Supercharge your software security with DevSecOps excellence Vandana Verma Sehgal
    5. Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
    6. TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS Dr. Paul Duplys
    7. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide: Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. Lee Allen
    8. Windows APT Warfare: Identify and prevent Windows APT attacks effectively Sheng-Hao Ma
    9. Digital Forensics with Kali Linux: Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x, 3rd Edition Shiva V. N. Parasram
    10. Windows Forensics Analyst Field Guide: Engage in proactive cyber defense using digital forensics techniques Muhiballah Mohammed