Bash and cybersecurity: attack, defense and analysis from the Linux command line. Tronkon P.
$61.83
In Stock
Characteristics
A country
Russia
Age
From 16 years old
Author
Tronkon Paul
Editor
Gerasimenko A.
Kit
No
The command line can be an ideal tool for ensuring cybersecurity. Incredible flexibility and absolute accessibility turn the standard command line interface (CLI) into a fundamental solution if you have appropriate experience. The authors Paul Tronkon and Karl Olbing talk about the instruments and tricks of the command line that help to collect data with proactive protection, analyze the logs and monitor the state of networks. Pentesters learn how to conduct attacks using colossal functionality, built into almost any version of Linux.
| Characteristics | |
| A country | Russia |
| Age | From 16 years old |
| Author | Tronkon Paul |
| Editor | Gerasimenko A. |
| Kit | No |
| Number of pages | 288 |
| The year of publishing | 2022 |
| Type of cover | Soft binding |
| Type of paper | Offset |
Write a review
There are no reviews for this product.