*Imparts good security doctrine, methodology, and strategies

*Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application.

...

Buy Now From Amazon

*Imparts good security doctrine, methodology, and strategies

*Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application.

*Offers users a selection of resources (websites, mailing lists, and books) to further their knowledge.



  • Used Book in Good Condition
  • Used Book in Good Condition

Similar Products

Linux Security CookbookMastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threatsSELinux System Administration - Second EditionLinux Command Line and Shell Scripting Bible, 3rd EditionUNIX and Linux System Administration Handbook (5th Edition)Linux Hardening in Hostile Networks: Server Security from TLS to Tor (Pearson Open Source Software Development Series)Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat HunterAutomate the Boring Stuff with Python: Practical Programming for Total Beginners