Category: Security & Encryption

Security & Encryption

Security Automation with Python 0

Security Automation with Python

eBook Details: Paperback: 284 pages Publisher: WOW! eBook (February 7, 2025) Language: English ISBN-10: 1805125109 ISBN-13: 978-1805125105 eBook Description: Security Automation with Python: Practical Python solutions for automating and scaling security operations. Automate vulnerability scanning, network monitoring, and web application security using Python scripts, while exploring real-world case studies and emerging trends like AI and ML in security automation. Designed to address the most common pain point for security teams scalability Security Automation with Python leverages the author’s years of experience in vulnerability management to provide you with actionable guidance on automating security workflows to streamline your operations and improve your organization’s...

AI-Enabled Programming, Networking, and Cybersecurity (Video Course) 0

AI-Enabled Programming, Networking, and Cybersecurity (Video Course)

AI-Enabled Programming, Networking, and Cybersecurity (Video Course) English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 2h 39m | 678 MB AI-Enabled Programming, Networking, and Cybersecurity (Video Course): Learn practical applications with ChatGPT, Claude, Copilot, LangChain, LlamaIndex, and AI models. Learn to use AI for cybersecurity, networking, and programming tasks. Use examples of practical, hands-on activities and demos that emphasize real-world tasks. Implement AI tools as a programmer, developer, networking, or security professional. AI-Enabled Programming, Networking, and Cybersecurity (Video Course) is for programmers, developers, networking, or security professionals looking to use AI tools. AI-powered tools like ChatGPT, GitHub...

Certified Ethical Hacker (CEH), 4th Edition (Video Course) 0

Certified Ethical Hacker (CEH), 4th Edition (Video Course)

Certified Ethical Hacker (CEH), 4th Edition (Video Course) English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 12h 4m | 3.06 GB Certified Ethical Hacker (CEH), 4th Edition (Video Course): Prepare for the Certified Ethical Hacker (CEH) certification exam. Get exam topics and skills to successfully prepare for the Certified Ethical Hacker (CEH) certification exam Step-by-step examples of security penetration testing methodologies and concepts Sample questions for each of the topics covered in the exam Certified Ethical Hacker (CEH), 4th Edition (Video Course) gives a complete overview of the topics in the EC-Councils updated Certified Ethical Hacker (CEH)...

Full Stack Python Security, Video Edition 0

Full Stack Python Security, Video Edition

Full Stack Python Security, Video Edition English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 8h 1m | 1.19 GB Full Stack Python Security, Video Edition: No-nonsense techniques, libraries, and best practices you can use to keep your Python applications safe and secure. In Full Stack Python Security, Video Edition: Cryptography, TLS, and attack resistance, you’ll learn how to: Use algorithms to encrypt, hash, and digitally sign data Create and install TLS certificates Implement authentication, authorization, OAuth 2.0, and form validation in Django Protect a web application with Content Security Policy Implement Cross Origin Resource Sharing Protect against...

Microsoft Defender for Identity in Depth 0

Microsoft Defender for Identity in Depth

eBook Details: Paperback: 380 pages Publisher: WOW! eBook (December 20, 2024) Language: English ISBN-10: 1835884482 ISBN-13: 978-1835884492 eBook Description: Microsoft Defender for Identity in Depth: An exhaustive guide to ITDR, breach prevention, and cyberattack response. Become an MDI expert and transform your IT security with advanced identity protection strategies to safeguard against evolving cyber threats. Written by a recognized cybersecurity expert, Microsoft Defender for Identity in Depth not only lays the groundwork for deploying and managing MDI, but also takes your knowledge to expert levels, enabling you to strengthen your organization against the most advanced cyber threats. You’ll familiarize yourself with the...