Cybersecurity Ops with bash

Cybersecurity Ops with bash
Author :
Publisher : O'Reilly Media
Total Pages : 306
Release :
ISBN-10 : 9781492041283
ISBN-13 : 1492041289
Rating : 4/5 (289 Downloads)

Book Synopsis Cybersecurity Ops with bash by : Paul Troncone

Download or read book Cybersecurity Ops with bash written by Paul Troncone and published by O'Reilly Media. This book was released on 2019-04-02 with total page 306 pages. Available in PDF, EPUB and Kindle. Book excerpt: If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O’Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations. In four parts, security practitioners, administrators, and students will examine: Foundations: Principles of defense and offense, command-line and bash basics, and regular expressions Defensive security operations: Data collection and analysis, real-time log monitoring, and malware analysis Penetration testing: Script obfuscation and tools for command-line fuzzing and remote access Security administration: Users, groups, and permissions; device and software inventory


Cybersecurity Ops with bash Related Books

Cybersecurity Ops with bash
Language: en
Pages: 306
Authors: Paul Troncone
Categories: Computers
Type: BOOK - Published: 2019-04-02 - Publisher: O'Reilly Media

DOWNLOAD EBOOK

If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line
Bash Cookbook
Language: en
Pages: 632
Authors: Carl Albing
Categories: Computers
Type: BOOK - Published: 2007-05-24 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

The key to mastering any Unix system, especially Linux and Mac OS X, is a thorough knowledge of shell scripting. Scripting is a way to harness and customize the
Adversarial Tradecraft in Cybersecurity
Language: en
Pages: 247
Authors: Dan Borges
Categories: Computers
Type: BOOK - Published: 2021-06-14 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to ga
Software Quality Assurance
Language: en
Pages: 448
Authors: Nina S. Godbole
Categories: Computers
Type: BOOK - Published: 2004 - Publisher: Alpha Science Int'l Ltd.

DOWNLOAD EBOOK

Software Quality Assurance (SQA) as a professional domain is becoming increasingly important. This book provides practical insight into the topic of Software Qu
Red Hat RHCSA 8 Cert Guide
Language: en
Pages: 1174
Authors: Sander van Vugt
Categories: Computers
Type: BOOK - Published: 2019-11-04 - Publisher: Pearson IT Certification

DOWNLOAD EBOOK

This is the eBook version of the print title. Learn, prepare, and practice for Red Hat RHCSA 8 (EX200) exam success with this Cert Guide from Pearson IT Certifi