115,95 €
115,95 €
inkl. MwSt.
Erscheint vor. 27.12.24
58 °P sammeln
115,95 €
Als Download kaufen
115,95 €
inkl. MwSt.
Erscheint vor. 27.12.24
58 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
115,95 €
inkl. MwSt.
Erscheint vor. 27.12.24
Alle Infos zum eBook verschenken
58 °P sammeln
Unser Service für Vorbesteller - Ihr Vorteil ohne Risiko:
Sollten wir den Preis dieses Artikels vor dem Erscheinungsdatum senken, werden wir Ihnen den Artikel bei der Auslieferung automatisch zum günstigeren Preis berechnen.
Sollten wir den Preis dieses Artikels vor dem Erscheinungsdatum senken, werden wir Ihnen den Artikel bei der Auslieferung automatisch zum günstigeren Preis berechnen.
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book provides a structured learning path from basic security principles to advanced penetration testing techniques, tailored for both new and experienced cybersecurity practitioners. It is a crucial toolkit for defending against the rising tide of cyber threats.
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 51.98MB
Andere Kunden interessierten sich auch für
- Yassine MalehWeb Application PenTesting (eBook, PDF)115,95 €
- Jeffrey W. BrownThe Security Leader's Communication Playbook (eBook, ePUB)47,95 €
- William L. JenningsFraud Investigation and Forensic Accounting in the Real World (eBook, ePUB)47,95 €
- Varin KheraOpen Source Intelligence (OSINT) - A practical Introduction (eBook, ePUB)59,95 €
- David X MartinCyRM (eBook, ePUB)36,95 €
- Securing Cyber-Physical Systems (eBook, ePUB)47,95 €
- Meng-Chow KangResponsive Security (eBook, ePUB)70,95 €
-
-
-
This book provides a structured learning path from basic security principles to advanced penetration testing techniques, tailored for both new and experienced cybersecurity practitioners. It is a crucial toolkit for defending against the rising tide of cyber threats.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Erscheinungstermin: 27. Dezember 2024
- Englisch
- ISBN-13: 9781040259948
- Artikelnr.: 72236729
- Verlag: Taylor & Francis
- Erscheinungstermin: 27. Dezember 2024
- Englisch
- ISBN-13: 9781040259948
- Artikelnr.: 72236729
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Prof. Yassine Maleh is an Associate professor of cybersecurity and IT governance at Sultan Moulay Slimane University, Morocco, since 2019. He is the founding chair of IEEE Consultant Network Morocco and founding president of the African Research Center of Information Technology & Cybersecurity. He is a former CISO at the National Port Agency between 2012-2019. He is a senior member of IEEE and a member of the International Association of Engineers IAENG and The Machine Intelligence Research Labs. Dr Maleh has made contributions in the fields of information security and privacy, Internet of things security, wireless and constrained networks security. His research interests include information security and privacy, Internet of things, networks security, information system, and IT governance. He has published over than 200 papers (book chapters, international journals, and conferences/workshops), 40 edited books, and 5 authored books. He is the editor-in-chief of the International Journal of Information Security and Privacy (IJISP, IF: 0.8), and the International Journal of Smart Security Technologies (IJSST). He serves as an associate editor for IEEE Access, since 2019 (Impact Factor 4.098), the International Journal of Digital Crime and Forensics (IJDCF), and the International Journal of Information Security and Privacy (IJISP). He is a series editor of Advances in Cybersecurity Management, by CRC Taylor & Francis. He was also a guest editor for many special issues with prestigious journals (IEEE transactions on industrial informatics, IEEE Engineering Management Review, Sensors, Big Data Journal). He has served and continues to serve on executive and technical program committees and as a reviewer of numerous international conferences and journals such as Elsevier Ad Hoc Networks, IEEE Network Magazine, IEEE Sensor Journal, ICT Express, and Springer Cluster Computing. He was the General chair and publication chair of many international conferences (BCCA 2019, MLBDACP 19, ICI2C'21, ICACNGC 2022, CCSET'22, IEEE ISC2 2022, ISGTA'24, etc...). He received Publons Top 1% reviewer award for the years 2018 and 2019. He holds numerous certifications demonstrating his knowledge and expertise in the field of cybersecurity from major organisations such as ISC2, Fortinet, CEH, Cisco, IBM, Microsoft, CompTIA and others.
Preface About the Editor 1.Introduction to Penetration Testing and
Methodologies 2.Understanding Web Application Security 3. Information
Gathering and OSINT for Pentesting 4. Web Vulnerability assessment 5. Web
Applications Pentesting Basics 6. Mastering Web Application Penetration
Testing with Burp Suite 7.Mastering DevSecOps for Web Application
Penetration Testing 8.Insights into Penetration Testing Reports: A
Comprehensive Guide
Methodologies 2.Understanding Web Application Security 3. Information
Gathering and OSINT for Pentesting 4. Web Vulnerability assessment 5. Web
Applications Pentesting Basics 6. Mastering Web Application Penetration
Testing with Burp Suite 7.Mastering DevSecOps for Web Application
Penetration Testing 8.Insights into Penetration Testing Reports: A
Comprehensive Guide
Preface About the Editor 1.Introduction to Penetration Testing and
Methodologies 2.Understanding Web Application Security 3. Information
Gathering and OSINT for Pentesting 4. Web Vulnerability assessment 5. Web
Applications Pentesting Basics 6. Mastering Web Application Penetration
Testing with Burp Suite 7.Mastering DevSecOps for Web Application
Penetration Testing 8.Insights into Penetration Testing Reports: A
Comprehensive Guide
Methodologies 2.Understanding Web Application Security 3. Information
Gathering and OSINT for Pentesting 4. Web Vulnerability assessment 5. Web
Applications Pentesting Basics 6. Mastering Web Application Penetration
Testing with Burp Suite 7.Mastering DevSecOps for Web Application
Penetration Testing 8.Insights into Penetration Testing Reports: A
Comprehensive Guide