Bash and Cybersecurity. Attack, Defense, and Analysis from the Linux Command Line
The command line can become an ideal tool for ensuring cybersecurity. Incredible flexibility and absolute accessibility turn the standard command line interface (CLI) into a fundamental solution, provided you have the relevant experience. Authors Paul Tronkone and Karl Olbing discuss the...
tools and tricks of the command line that help gather data during proactive protection, analyze logs, and monitor network states. Pen testers will learn how to conduct attacks using the colossal functionality built into almost every version of Linux.
The command line can become an ideal tool for ensuring cybersecurity. Incredible flexibility and absolute accessibility turn the standard command line interface (CLI) into a fundamental solution, provided you have the relevant experience. Authors Paul Tronkone and Karl Olbing discuss the tools and tricks of the command line that help gather data during proactive protection, analyze logs, and monitor network states. Pen testers will learn how to conduct attacks using the colossal functionality built into almost every version of Linux.
Be the first to know about our current discounts, offers and new products!
Check icon
You have added to your basket
Check icon
You have added to favourites
Sold out
The item is currently out of stock.
In stock
Available in warehouse. You will receive the exact delivery date from the operator after the order confirmation.
To order
The product is delivered directly from the publisher. The order processing time is up to 14 days, you will receive the exact delivery date from the operator after the order confirmation.