Marknadens största urval
Snabb leverans

Böcker av Kim Crawley

Filter
Filter
Sortera efterSortera Populära
  • av Kim Crawley
    686,-

    Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectivelyKey Features:Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platformUnderstand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes)Get acquainted with the penetration testing tools and security measures specific to each platformPurchase of the print or Kindle book includes a free PDF eBookBook Description:With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively.In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.What You Will Learn:Familiarize yourself with the evolution of cloud networksNavigate and secure complex environments that use more than one cloud serviceConduct vulnerability assessments to identify weak points in cloud configurationsSecure your cloud infrastructure by learning about common cyber attack techniquesExplore various strategies to successfully counter complex cloud attacksDelve into the most common AWS, Azure, and GCP services and their applications for businessesUnderstand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentestingWho this book is for:This book is for pentesters, aspiring pentesters, and red team members seeking specialized skills for leading cloud platforms-AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.

  • av Kim Crawley
    466,-

    Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones. Understand the relationship between hacker culture and cybersecurity Get to know the ideas behind the hacker ethos, like "knowledge should be free" Explore topics and publications central to hacker culture, including 2600 Magazine Appreciate the history of cybersecurity Learn about key figures in the history of hacker culture Understand the difference between hackers and cybercriminals

  • - A Simple Cyber Resilience Guide for Business
    av Kim Crawley
    310,-

    Harden your business against internal and external cybersecurity threats with a single accessible resource.In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to:* Foster a strong security culture that extends from the custodial team to the C-suite* Build an effective security team, regardless of the size or nature of your business* Comply with regulatory requirements, including general data privacy rules and industry-specific legislation* Test your cybersecurity, including third-party penetration testing and internal red team specialistsPerfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.