Packt.com

Subscribe to our online digital library for full access to over 7,000 books and videos, as well as industry leading tools to help you plan your personal development and advance your career. For more information, please visit our website.

Why subscribe?

  • Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals
  • Improve your learning with Skill Plans built especially for you
  • Get a free eBook or video every month
  • Fully searchable for easy access to vital information
  • Copy and paste, print, and bookmark content

Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at packt.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at [email protected] for more details.

At www.packt.com, you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.

Other Books You May Enjoy

If you enjoyed this book, you may be interested in these other books by Packt:

CompTIA Security+: SY0-601 Certification Guide – Second Edition

Ian Neil

ISBN: 978-1-80056-424-4

  • Get to grips with security fundamentals, from the CIA triad through to IAM
  • Explore cloud security and techniques used in penetration testing
  • Discover different authentication methods and troubleshoot security issues
  • Secure the devices and applications that are used by your company
  • Identify and protect against various types of malware and virus
  • Protect your environment against social engineering and advanced attacks
  • Understand and implement PKI concepts
  • Delve into secure application development, deployment, and automation concepts

Cisco Certified CyberOps Associate 200-201 Certification Guide

Glen D. Singh

ISBN: 978-1-80056-087-1

  • Incorporate security into your architecture to prevent attacks
  • Discover how to implement and prepare secure designs
  • Identify access control models for digital assets
  • Identify point of entry, determine scope, contain threats, and remediate
  • Find out how to perform malware analysis and interpretation
  • Implement security technologies to detect and analyze threats

Packt is searching for authors like you

If you're interested in becoming an author for Packt, please visit authors.packtpub.com and apply today. We have worked with thousands of developers and tech professionals, just like you, to help them share their insight with the global tech community. You can make a general application, apply for a specific hot topic that we are recruiting an author for, or submit your own idea.

Leave a review - let other readers know what you think

Please share your thoughts on this book with others by leaving a review on the site that you bought it from. If you purchased the book from Amazon, please leave us an honest review on this book's Amazon page. This is vital so that other potential readers can see and use your unbiased opinion to make purchasing decisions, we can understand what our customers think about our products, and our authors can see your feedback on the title that they have worked with Packt to create. It will only take a few minutes of your time, but is valuable to other potential customers, our authors, and Packt. Thank you!

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.229.253