Rapid Cybersecurity Ops

Regular price €65.99
A01=Carl Albing
A01=Paul Troncone
Age Group_Uncategorized
Age Group_Uncategorized
Author_Carl Albing
Author_Paul Troncone
automatic-update
Category1=Non-Fiction
Category=UNF
COP=United States
cyber security cyber operations pen testing penetration testing Linux bash Bash cybersecurity security operations security ops analysis automation scripting cyber ops
Delivery_Delivery within 10-20 working days
eq_computing
eq_isMigrated=2
eq_non-fiction
Inc
Language_English
PA=Available
Price_€50 to €100
PS=Active
softlaunch
USA

Product details

  • ISBN 9781492041313
  • Dimensions: 178 x 233mm
  • Publication Date: 30 Apr 2019
  • Publisher: O'Reilly Media
  • Publication City/Country: US
  • Product Form: Paperback
  • Language: English
Delivery/Collection within 10-20 working days

Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock

10-20 Working Days
: On Backorder

Will Deliver When Available
: On Pre-Order or Reprinting

We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!

If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O’Reilly), provide insight into command line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into every version of Linux to enable offensive operations. With this book, security practitioners, administrators, and students will learn how to: Collect and analyze data, including system logs Search for and through files Detect network and host changes Develop a remote access toolkit Format output for reporting Develop scripts to automate tasks
Paul Troncone has over 15 years of experience in the cybersecurity and information technology fields. For the past 4 years Paul has served as a Distinguished Visiting Professor to the United States Naval Academy, instructing cybersecurity courses in the Computer Science Department. In 2009 Paul founded the Digadel Corporation where he performs independent cybersecurity consulting and software development.Carl Albing is a software engineer and teacher with a breadth of industry experience. A co-author of O'Reilly's "bash Cookbook", he has worked in software for companies large and small, across a variety of software industries. He has a B.A. in Mathematics, Masters in International Management, and a Ph.D. in Computer Science. He has recently spent time in academia as a Distinguished Visiting Professor in the Department of Computer Science at the US Naval Academy where he taught courses on Programming Languages, Compilers, High Performance Computing, and Advanced Shell Scripting.