Ghost-IT
  • Security

    Wireshark Network Security

    ShelockMay 24, 2020
    Book Description: Wireshark is the world’s foremost network protocol analyzer for network analysis and troubleshooting. This book will walk ...Read More
    Wireshark Network Security Wireshark Network Security Reviewed by Shelock on May 24, 2020 Rating: 5
    Security

    The IoT Hacker’s Handbook

    ShelockMay 24, 2020
    Book Description: Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT archi...Read More
    The IoT Hacker’s Handbook The IoT Hacker’s Handbook Reviewed by Shelock on May 24, 2020 Rating: 5
    Security

    Cracking Codes and Cryptograms For Dummies

    ShelockMay 24, 2020
    Book Description: The fast and easy way to crack codes and cryptograms Did you love Dan Brown’s The Lost Symbol? Are you fascinated by secre...Read More
    Cracking Codes and Cryptograms For Dummies Cracking Codes and Cryptograms For Dummies Reviewed by Shelock on May 24, 2020 Rating: 5
    Security

    CEH Certified Ethical Hacker Practice Exams, 4th Edition

    ShelockMay 24, 2020
    Book Description: Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticit...Read More
    CEH Certified Ethical Hacker Practice Exams, 4th Edition CEH Certified Ethical Hacker Practice Exams, 4th Edition Reviewed by Shelock on May 24, 2020 Rating: 5
    Security

    Waging Cyber War

    ShelockMay 24, 2020
    Book Description: Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the k...Read More
    Waging Cyber War Waging Cyber War Reviewed by Shelock on May 24, 2020 Rating: 5
    Security

    Demystifying Internet of Things Security

    ShelockMay 24, 2020
    Book Description: Break down the misconceptions of the Internet of Things by examining the different security building blocks available in I...Read More
    Demystifying Internet of Things Security Demystifying Internet of Things Security Reviewed by Shelock on May 24, 2020 Rating: 5
    Security

    System Administration Ethics

    ShelockMay 24, 2020
    Book Description: Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration princip...Read More
    System Administration Ethics System Administration Ethics Reviewed by Shelock on May 24, 2020 Rating: 5
    Security

    Bug Bounty Hunting for Web Security

    ShelockMay 24, 2020
    Book Description: Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in...Read More
    Bug Bounty Hunting for Web Security Bug Bounty Hunting for Web Security Reviewed by Shelock on May 24, 2020 Rating: 5
    Security

    Advanced API Security, 2nd Edition

    ShelockMay 24, 2020
    Book Description: Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public a...Read More
    Advanced API Security, 2nd Edition Advanced API Security, 2nd Edition Reviewed by Shelock on May 24, 2020 Rating: 5
    Security

    Identity Attack Vectors

    ShelockMay 24, 2020
    Book Description: Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an orga...Read More
    Identity Attack Vectors Identity Attack Vectors Reviewed by Shelock on May 24, 2020 Rating: 5
    Older Posts Home
    Subscribe to: Posts ( Atom )

    Categories

    • Certification
    • Marketing & SEO
    • Networking & Cloud Computing
    • Python
    • Security
    • Trading

    Popular Posts

    • Mastering Machine Learning with Python in Six Steps, 2nd Edition
      Mastering Machine Learning with Python in Six Steps, 2nd Edition
    • Python Data Analytics, 2nd Edition
      Python Data Analytics, 2nd Edition
    • Pro Python 3, 3rd Edition
      Pro Python 3, 3rd Edition
    • Network Warrior
      Network Warrior

    Recent Posts

    Comments

    Featured Posts

    Blog Archive

    Recent in IT

  • Design By Ghost-IT | Powered By Ghost-IT © 2019