If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration.
Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations.
In four parts, security practitioners, administrators, and students will examine:
"Sinopsis" puede pertenecer a otra edición de este libro.
Paul Troncone has over 15 years of experience in the cybersecurity and information technology fields. For the past 4 years Paul has served as a Distinguished Visiting Professor to the United States Naval Academy, instructing cybersecurity courses in the Computer Science Department. In 2009 Paul founded the Digadel Corporation where he performs independent cybersecurity consulting and software development.Carl Albing is a software engineer and teacher with a breadth of industry experience. A co-author of O'Reilly's "bash Cookbook", he has worked in software for companies large and small, across a variety of software industries. He has a B.A. in Mathematics, Masters in International Management, and a Ph.D. in Computer Science. He has recently spent time in academia as a Distinguished Visiting Professor in the Department of Computer Science at the US Naval Academy where he taught courses on Programming Languages, Compilers, High Performance Computing, and Advanced Shell Scripting.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: The Happy Book Stack, Murfreesboro, TN, Estados Unidos de America
Condición: good. Book may have some writing and or underlining inside, and is in overall good condition. Cover may have some cosmetic wear. Book has dust jacket if applicable. Nº de ref. del artículo: 5ALWH0000CL1_ns
Cantidad disponible: 1 disponibles
Librería: HPB-Red, Dallas, TX, Estados Unidos de America
Paperback. Condición: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Nº de ref. del artículo: S_386922745
Cantidad disponible: 1 disponibles
Librería: Better World Books: West, Reno, NV, Estados Unidos de America
Condición: Good. Former library copy. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Nº de ref. del artículo: 53647002-75
Cantidad disponible: 1 disponibles
Librería: Textbooks_Source, Columbia, MO, Estados Unidos de America
paperback. Condición: New. 1st Edition. Ships in a BOX from Central Missouri! UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Nº de ref. del artículo: 002329490N
Cantidad disponible: 1 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 34072636-n
Cantidad disponible: 3 disponibles
Librería: BargainBookStores, Grand Rapids, MI, Estados Unidos de America
Paperback or Softback. Condición: New. Cybersecurity Ops with Bash: Attack, Defend, and Analyze from the Command Line. Book. Nº de ref. del artículo: BBS-9781492041313
Cantidad disponible: 5 disponibles
Librería: Lakeside Books, Benton Harbor, MI, Estados Unidos de America
Condición: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books! Nº de ref. del artículo: OTF-S-9781492041313
Cantidad disponible: Más de 20 disponibles
Librería: Rarewaves USA, OSWEGO, IL, Estados Unidos de America
Paperback. Condición: New. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O'Reilly), provide insight into command line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into every version of Linux to enable offensive operations. With this book, security practitioners, administrators, and students will learn how to: Collect and analyze data, including system logs Search for and through files Detect network and host changes Develop a remote access toolkit Format output for reporting Develop scripts to automate tasks. Nº de ref. del artículo: LU-9781492041313
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 34072636
Cantidad disponible: 3 disponibles
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: WO-9781492041313
Cantidad disponible: 1 disponibles