Credits

Figure 1-1  Screenshot of The Exploit Database (Exploit-DB) © OffSec Services Limited 2020

Figure 1-2  Screenshot of Using searchsploit © OffSec Services Limited 2020

Figure 1-4  Screenshot of Ghidra Software Reverse Engineering Framework, ghidra

Figure 1-6  Screenshot of SQL injection vulnerability © Webgoat SQL Injection

Figure 3-27 Screenshot of Installing the Python requests package using pip © Python Software Foundation

Figure 3-28 Screenshot of Using the Python requests package © Python Software Foundation

Figure 3-29 Screenshot of Using curl to obtain information from an API © GitHub, Inc.

Figure 3-30 Screenshot of Using curl to obtain additional information from the Deck of Cards API © GitHub, Inc.

Figure 9-11 Screenshot of AWS Lamda © 2020, Amazon Web Services, Inc

Figure 9-14 Screenshot of Docker © 2020 Docker Inc.

Figure 9-15 Screenshot of Docker © 2020 Docker Inc.

Figure 9-16 Screenshot of Docker © 2020 Docker Inc.

Figure 9-17 Deploying your first app on Kubernetes, Google Inc.

Figure 9-19 Screenshot of The Kubernetes Authors © Google Inc.

Figure 9-20 Screenshot of The Kubernetes Authors © Google Inc.

Figure 9-21 Screenshot of The Kubernetes Authors © Google Inc.

Figure 10-2 Screenshot of macOS © Apple 2019

The International Organization for Standardization (ISO), ISO/IEC 27001:2005(en)

The International Organization for Standardization (ISO)

Malware Tunneling in IPv6, June 22, 2012. United States Department of Homeland Security

The International Organization for Standardization (ISO)

NIST Special Publication 800-61

NIST Special Publication 800-61

NIST Special Publication 800-61

NIST Special Publication 800-61

US-CERT Description Document - RFC 2350

Cybersecurity and Infrastructure Security Agency (CISA), U.S. Department of Homeland Security

NIST Special Publication 800-63B

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.215.16.238