Markedets billigste bøger
Levering: 1 - 2 hverdage

Bøger af Jeremy Martin

Filter
Filter
Sorter efterSorter Populære
  • - Adventure Under the Stairs!
    af Jeremy Martin
    123,95 kr.

    When the problems are unsolvable, sometimes you need a big solution. Mr. Big Toe ventures out at night to solve the problem of the squeaky stair. With the help of some the mice friends and a new one, Hey Hay Horse, he will venture into the dark space under the stairs. Before he can solve and get home, he will have to get past a silky and sticky new villain, The Corner Spider. Join the adventure of a lifetime, or at least the span of a staircase.

  • - The Attack and Defense Way
    af Jeremy Martin
    238,95 kr.

    Containerization is increasing widely with the adoption of Docker for container workloads. It's always easy to spin a container and start working on it. But wait! Have you ever thought of the security of your container workloads? Did your Docker Container ecosystems can defend themselves against latest sophisticated attacks? Or, you might be relying on legacy security systems to make them do the security work for you. If you are still thinking the same, you need to cope up with the existing solutions since container security concerns impose huge risks to the IT infrastructure. Malwares like Doki and Kinsing have already targeted and exploited vulnerable Docker containers and host systems and there are more attacks to come in future too. In such times, this little book can help you in your quest to understand the Docker Container Attack patterns and to devise the strategy for securing and hardening your container environments with a couple of research articles and a lot of tools and hands-on exercises.

  • af Jeremy Martin
    83,95 kr.

    There is within us a longing to achieve greatness. To reach to the heavens and pluck the stars. To romance and be loved without question. It is all folly.

  • - Build a portable Cyber Live Fire Range (CLFR)
    af Jeremy Martin
    123,95 kr.

    Do you want to learn how to conduct vulnerability assessments or penetration tests but don't know where to start? Are you getting into computer forensics and want some more hands on practice with more tools and environments? Well, we have something that might just save you some time and money.Information Warfare Center not only offers ethical hacking, penetration testing, and digital forensics training, we now have a standalone lab environment prebuilt for both training and operational use. This mobile lab has been designed to boot off of a USB drive and works with almost any PC. This e-book walks you though how to build one yourself. It is a step by step guide to building your own Portable, encrypted, Kali based lab.With a number of vulnerable virtual servers and forensic labs already installed, you can sharpen your skills with no Internet or network setup required. That's right, your own testing lab right in the palm of your hand without the cost of expensive hardware or tedious troubleshooting. This custom environment is an optimized and more secure build of the well-known Kali Linux with a few extras. Yes, you will have all the tools of Kali at your fingertips. This has been set up with an encrypted persistent drive to protect all of your sensitive data. The drive also has a second password to destroy the data instantly if ever needed. Focusing on training and testing systems, the vulnerable virtual machines and evidence files are perfect for ethical hacking and computer forensics practice. Many of the exercises have walkthroughs so you can test your skills and learn at the same time.This bootable USB has also been enhanced for a penetration tester or forensic analyst to do their job more effectively and efficiently. When time is money, having the tools you need makes a world of difference. So, don't waste your time reinventing the wheel. Build your own lab today!Message from the author: "At this point, you now have a fully portable, scalable lab to practice your tradecraft. Whether it be cyber warfare operations, ethical hacking, penetration testing, reverse engineering, or incident response, you can train in the safety of your standalone cyber live range. Thank you for your support. Stay safe and have a blast!"

  • - Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more.
    af Jeremy Martin
    238,95 kr.

    Have you ever found yourself questioning whether your network is in good hands? Did you do everything you could to defend against exploits on your network? Is your employer safe because you have one of the best Security Information Event Management (SIEM) setups you can use monitoring the network for you? Or, maybe you are new to Information Security and you want to learn how to employ a robust Intrusion Detection System (IDS) but you do not know where to start. If you have ever asked yourself any of these questions, or you just want to learn about ELK Stack and Zeek (Bro), you have come to the right place. A quick Google search will show you there isn't a lot of information for configuring Zeek (Bro), ElasticSearch, Logstash, Filebeat, and Kibana- it is rather complicated because the websites will describe how to install, but they don't really lead you to specifics on what else you need to do, or they are really outdated. That is where you must piece together the information yourself, and really research - lucky for you, I did the leg work for you and decided to write this book. Whether you have been in the Information Security industry for many years or you're just getting started this book has something for you. In my time studying over the years I've always found that a lot of books are interesting reads, but they add a lot of fluff. That was not my goal with this book; I wanted to provide you with a straight forward book without the fluff, that will show you exactly what you need - I cover the basics, and then explain the intricacies involved with configuring a SIEM that is reliable. I also provide a step-by-step process, while including any pertinent notes that you need to pay attention to, and lastly providing a breakdown of what is occurring at that time. Having background to each section and knowing what is happening is extremely important to learning and understanding what is happening on your network. Likewise, this book covers a brief overview of different programming languages, and their configuration nuances when applied to Zeek (Bro) and Elk Stack. I tried my best to approach this as if you did not know anything, so that anyone can read this and understand what is happening throughout the installation and configuration process. Let us get to the basics of what will be covered in this book so that you have a good idea of what you will learn. The first section of this book covers the Zeek(Bro) IDS installation and configuration. Furthermore, you will learn about the origin of Zeek (Bro), and the many features that Zeek (Bro) has to offer. This section will walk you through the entire installation process, while providing explanations for the configuration changes that we make on the system. There are a lot of dependencies needed to install Zeek (bro), and I will walk you through that entire process. We will also go over installing PF_ring - a tool for increased capture speeds and network capture optimization. The tool is very useful when capturing data on large networks, and from multiple nodes. In the next section we will go over installing Tor, and Privoxy for network anonymity. You're probably asking yourself why you would want to do that when setting up a SIEM or IDS. The simple answer is that in order to know what's traversing the network, you need to understand what it is doing and how to use it yourself. Sometimes the best defense comes from knowing what the offense is using. Once we install Tor, you can generate some Tor traffic on your network, and watch as one of the custom Zeek (Bro) signatures - I will teach you about in this book - detects this traffic so you can see what it looks like once a notice is generated. It's also good to know how to remain anonymous on the network if you're ever doing any type of forensic investigations too, so learning this is always a plus. ...

  • af Jeremy Martin
    123,95 kr.

    Mr. Big Toe returns in search of a missing ring! After the house has been cleaned, the ring turns up missing. A call to action, and Mr. Big Toe is hot on the trail. With the help of old and new house dwellers such as the Gerbil Don and Polly the bird, Mr. Big Toe is quickly on the search. This is no easy task, as it takes him all over the house, secretly pursued by a pair of mice who want the ring for themselves. Join Mr. Big Toe and see if he can get the ring back.

  • af Addie K. Martin & Jeremy Martin
    408,95 kr.

  • - Book 1: Math 9 & 10
    af Jeremy Martin
    103,95 kr.

  • - Math 11 and 12
    af Jeremy Martin
    233,95 kr.

  • - Math 9, 10, 11, and 12
    af Jeremy Martin
    232,95 kr.

  • af Jeremy Martin
    41,95 - 53,95 kr.

  • af Jeremy Martin
    133,95 kr.

  • af Jeremy Martin
    183,95 kr.

    The harmony between humans and fianna, a species of shapeshifting deer, begins to wither as racial tensions and deeply rooted resentment turns violent.Ruthless hunter Finn Hail and prophesied liberator Adelaide may be heroes to their own species, but they are enemies to each other. With war on the horizon, the reluctant pair must team up to find the most elusive of prey: the god of the Forest.As enemies press in from all sides, true intentions begin to show. For Finn to save the boy he cares for most, he might need to aim his gun at the very god he seeks. And Adelaide, with her festering hatred for mankind, will have to determine if peace holds true salvation for her people.

  • - Creating Space to Discuss Life & Faith
    af Jeremy Martin
    163,95 kr.

    Build a Bigger Table offers a better way to approach church strategy and meaningful discussion for the modern church that wants to have a place of influence within current culture. By creating a "bigger table"-a space where people can come together to discuss life and faith, even if they disagree-we create a place where new ideas can be born. New friendships, trips, and tips all happen when you combine tables and chairs and people and energy. The first and most difficult thing we must do is decide the shape, size, texture, and scope of our tabletop. This is where the bread and wine will sit. This is where the sound of our stories will reverberate as we share and listen. This is where our elbows will rest as we lean in to one another. And where our heads will rest as we struggle with the pain of community. We must craft this tabletop to endure!

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.