Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cybersecurity Ops with bash : attack, defend, and analyze from the command line
by
Troncone, Paul, author
, Albing, Carl, author
in
Computer security.
/ Computer networks Security measures.
/ Computer crimes Economic aspects.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cybersecurity Ops with bash : attack, defend, and analyze from the command line
by
Troncone, Paul, author
, Albing, Carl, author
in
Computer security.
/ Computer networks Security measures.
/ Computer crimes Economic aspects.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Cybersecurity Ops with bash : attack, defend, and analyze from the command line
Book
Cybersecurity Ops with bash : attack, defend, and analyze from the command line
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations.
Publisher
O'Reilly Media, Inc.
Subject
ISBN
1492041319, 9781492041313
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| QA76.9.A25 T76 2019 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.