Blue Team Field Manual

Author: Alan White
Publisher: Createspace Independent Publishing Platform
ISBN: 9781541016361
Size: 39.80 MB
Format: PDF, ePub, Mobi
View: 2511
Download Read Online
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical ...

Rtfm

Author: Ben Clark
Publisher:
ISBN: 9781494295509
Size: 63.62 MB
Format: PDF, Kindle
View: 2404
Download Read Online
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell.

Blue Team Handbook

Author: Don Murdoch
Publisher: CreateSpace
ISBN: 9781500734756
Size: 29.26 MB
Format: PDF, ePub, Docs
View: 5384
Download Read Online
Complete details below! Two new sections, five protocol header illustrations, improved formatting, and other corrections. The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike.

Defensive Security Handbook

Author: Lee Brotherston
Publisher: "O'Reilly Media, Inc."
ISBN: 1491960337
Size: 63.32 MB
Format: PDF, ePub, Docs
View: 2211
Download Read Online
Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, ...

Advanced Penetration Testing

Author: Wil Allsopp
Publisher: John Wiley & Sons
ISBN: 1119367662
Size: 38.89 MB
Format: PDF, ePub, Mobi
View: 782
Download Read Online
Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and ...

Network Security Assessment

Author: Chris McNab
Publisher: "O'Reilly Media, Inc."
ISBN: 9780596551575
Size: 49.87 MB
Format: PDF, ePub
View: 5524
Download Read Online
With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.

Crafting The Infosec Playbook

Author: Jeff Bollinger
Publisher: "O'Reilly Media, Inc."
ISBN: 1491913606
Size: 53.96 MB
Format: PDF
View: 124
Download Read Online
This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements.

Wireshark For Security Professionals

Author: Jessey Bullock
Publisher: John Wiley & Sons
ISBN: 1118918215
Size: 58.19 MB
Format: PDF, Docs
View: 4828
Download Read Online
This book is designed to help you quicklynavigate and leverage Wireshark effectively, with a primer forexploring the Wireshark Lua API as well as an introduction to theMetasploit Framework.

Hacking The Hacker

Author: Roger A. Grimes
Publisher: John Wiley & Sons
ISBN: 1119396220
Size: 48.26 MB
Format: PDF, Docs
View: 4924
Download Read Online
Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

The Hacker Playbook 2

Author: Peter Kim
Publisher: CreateSpace
ISBN: 9781512214567
Size: 71.47 MB
Format: PDF, ePub
View: 3941
Download Read Online
Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.