If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration.
Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations.
In four parts, security practitioners, administrators, and students will examine:
"synopsis" may belong to another edition of this title.
Paul Troncone has over 15 years of experience in the cybersecurity and information technology fields. For the past 4 years Paul has served as a Distinguished Visiting Professor to the United States Naval Academy, instructing cybersecurity courses in the Computer Science Department. In 2009 Paul founded the Digadel Corporation where he performs independent cybersecurity consulting and software development.Carl Albing is a software engineer and teacher with a breadth of industry experience. A co-author of O'Reilly's "bash Cookbook", he has worked in software for companies large and small, across a variety of software industries. He has a B.A. in Mathematics, Masters in International Management, and a Ph.D. in Computer Science. He has recently spent time in academia as a Distinguished Visiting Professor in the Department of Computer Science at the US Naval Academy where he taught courses on Programming Languages, Compilers, High Performance Computing, and Advanced Shell Scripting.
"About this title" may belong to another edition of this title.
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_386922745
Seller: Bookmans, Tucson, AZ, U.S.A.
paperback. Condition: Good. Satisfaction 100% guaranteed. Seller Inventory # mon0002740082
Seller: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condition: New. 1st Edition. Ships in a BOX from Central Missouri! UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Seller Inventory # 002329490N
Seller: The Maryland Book Bank, Baltimore, MD, U.S.A.
paperback. Condition: Very Good. 1st Edition. Used - Very Good. Seller Inventory # 14-G-5-0217
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 34072636-n
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Cybersecurity Ops with Bash: Attack, Defend, and Analyze from the Command Line. Book. Seller Inventory # BBS-9781492041313
Seller: Lakeside Books, Benton Harbor, MI, U.S.A.
Condition: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books! Seller Inventory # OTF-S-9781492041313
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
Paperback. Condition: New. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O'Reilly), provide insight into command line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into every version of Linux to enable offensive operations. With this book, security practitioners, administrators, and students will learn how to: Collect and analyze data, including system logs Search for and through files Detect network and host changes Develop a remote access toolkit Format output for reporting Develop scripts to automate tasks. Seller Inventory # LU-9781492041313
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 34072636
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # WO-9781492041313